↓ Skip to main content

Security and Trust Management

Overview of attention for book
Cover of 'Security and Trust Management'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns
  3. Altmetric Badge
    Chapter 2 Integrating Privacy and Safety Criteria into Planning Tasks
  4. Altmetric Badge
    Chapter 3 Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments
  5. Altmetric Badge
    Chapter 4 A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies
  6. Altmetric Badge
    Chapter 5 How to Trust the Re-use of Data
  7. Altmetric Badge
    Chapter 6 Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business
  8. Altmetric Badge
    Chapter 7 The AC-Index: Fast Online Detection of Correlated Alerts
  9. Altmetric Badge
    Chapter 8 Intrusion Detection System for Applications Using Linux Containers
  10. Altmetric Badge
    Chapter 9 SUDUTA: Script UAF Detection Using Taint Analysis
  11. Altmetric Badge
    Chapter 10 Two-Factor Authentication for the Bitcoin Protocol
  12. Altmetric Badge
    Chapter 11 Private Proximity Testing on Steroids: An NTRU-based Protocol
  13. Altmetric Badge
    Chapter 12 Selecting a New Key Derivation Function for Disk Encryption
  14. Altmetric Badge
    Chapter 13 It’s My Privilege: Controlling Downgrading in DC-Labels
  15. Altmetric Badge
    Chapter 14 Obligations in PTaCL
  16. Altmetric Badge
    Chapter 15 Content and Key Management to Trace Traitors in Broadcasting Services
  17. Altmetric Badge
    Chapter 16 In Cyber-Space No One Can Hear You S $$\cdot $$ CREAM
  18. Altmetric Badge
    Chapter 17 A Socio-Technical Investigation into Smartphone Security
  19. Altmetric Badge
    Chapter 18 A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users
  20. Altmetric Badge
    Chapter 19 Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks
Attention for Chapter 8: Intrusion Detection System for Applications Using Linux Containers
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Average Attention Score compared to outputs of the same age and source

Mentioned by

twitter
1 X user
facebook
1 Facebook page
googleplus
1 Google+ user

Readers on

mendeley
45 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Intrusion Detection System for Applications Using Linux Containers
Chapter number 8
Book title
Security and Trust Management
Published in
Lecture notes in computer science, January 2015
DOI 10.1007/978-3-319-24858-5_8
Book ISBNs
978-3-31-924857-8, 978-3-31-924858-5
Authors

Amr S. Abed , Charles Clancy , David S. Levy, Amr Abed, Amr S. Abed, Charles Clancy

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 45 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 2%
Unknown 44 98%

Demographic breakdown

Readers by professional status Count As %
Student > Master 13 29%
Student > Ph. D. Student 8 18%
Researcher 6 13%
Student > Bachelor 5 11%
Lecturer 1 2%
Other 4 9%
Unknown 8 18%
Readers by discipline Count As %
Computer Science 32 71%
Engineering 3 7%
Immunology and Microbiology 1 2%
Agricultural and Biological Sciences 1 2%
Unknown 8 18%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 2. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 14 November 2016.
All research outputs
#13,996,981
of 22,899,952 outputs
Outputs from Lecture notes in computer science
#4,267
of 8,128 outputs
Outputs of similar age
#181,653
of 353,419 outputs
Outputs of similar age from Lecture notes in computer science
#146
of 257 outputs
Altmetric has tracked 22,899,952 research outputs across all sources so far. This one is in the 37th percentile – i.e., 37% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,128 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 47th percentile – i.e., 47% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 353,419 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 47th percentile – i.e., 47% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 257 others from the same source and published within six weeks on either side of this one. This one is in the 42nd percentile – i.e., 42% of its contemporaries scored the same or lower than it.