↓ Skip to main content

Security and Privacy in Communication Networks

Overview of attention for book
Cover of 'Security and Privacy in Communication Networks'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 FineDroid: Enforcing Permissions with System-Wide Application Execution Context
  3. Altmetric Badge
    Chapter 2 Detection, Classification and Characterization of Android Malware Using API Data Dependency
  4. Altmetric Badge
    Chapter 3 KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices
  5. Altmetric Badge
    Chapter 4 Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
  6. Altmetric Badge
    Chapter 5 SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications
  7. Altmetric Badge
    Chapter 6 Intrinsic Code Attestation by Instruction Chaining for Embedded Devices
  8. Altmetric Badge
    Chapter 7 Defeating Kernel Driver Purifier
  9. Altmetric Badge
    Chapter 8 Kernel Data Attack Is a Realistic Security Threat
  10. Altmetric Badge
    Chapter 9 RScam: Cloud-Based Anti-Malware via Reversible Sketch
  11. Altmetric Badge
    Chapter 10 TADOOP: Mining Network Traffic Anomalies with Hadoop
  12. Altmetric Badge
    Chapter 11 SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services
  13. Altmetric Badge
    Chapter 12 Authenticating Top- k Results of Secure Multi-keyword Search in Cloud Computing
  14. Altmetric Badge
    Chapter 13 Resource Efficient Privacy Preservation of Online Social Media Conversations
  15. Altmetric Badge
    Chapter 14 Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android
  16. Altmetric Badge
    Chapter 15 Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems
  17. Altmetric Badge
    Chapter 16 Remote Activation of Hardware Trojans via a Covert Temperature Channel
  18. Altmetric Badge
    Chapter 17 Route Leaks Identification by Detecting Routing Loops
  19. Altmetric Badge
    Chapter 18 Pulsar : Stateful Black-Box Fuzzing of Proprietary Network Protocols
  20. Altmetric Badge
    Chapter 19 You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic
  21. Altmetric Badge
    Chapter 20 Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing
  22. Altmetric Badge
    Chapter 21 An Improved Method for Anomaly-Based Network Scan Detection
  23. Altmetric Badge
    Chapter 22 Why Web Servers Should Fear Their Clients
  24. Altmetric Badge
    Chapter 23 An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications
  25. Altmetric Badge
    Chapter 24 Generation of Transmission Control Rules Compliant with Existing Access Control Policies
  26. Altmetric Badge
    Chapter 25 A Markov Random Field Approach to Automated Protocol Signature Inference
  27. Altmetric Badge
    Chapter 26 How to Prevent to Delegate Authentication
  28. Altmetric Badge
    Chapter 27 Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability
  29. Altmetric Badge
    Chapter 28 A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers
  30. Altmetric Badge
    Chapter 29 Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks
  31. Altmetric Badge
    Chapter 30 POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware
  32. Altmetric Badge
    Chapter 31 POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure
  33. Altmetric Badge
    Chapter 32 POSTER: A Security Adaptive Steganography System Applied on Digital Audio
  34. Altmetric Badge
    Chapter 33 POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths
  35. Altmetric Badge
    Chapter 34 POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks
  36. Altmetric Badge
    Chapter 35 POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems
  37. Altmetric Badge
    Chapter 36 POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts
  38. Altmetric Badge
    Chapter 37 POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET
  39. Altmetric Badge
    Chapter 38 POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection
  40. Altmetric Badge
    Chapter 39 POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis
  41. Altmetric Badge
    Chapter 40 Securing Application with Software Partitioning: A Case Study Using SGX
  42. Altmetric Badge
    Chapter 41 Image Spam Classification Using Neural Network
  43. Altmetric Badge
    Chapter 42 An Effective t-way Test Data Generation Strategy
  44. Altmetric Badge
    Chapter 43 A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering
  45. Altmetric Badge
    Chapter 44 Community-Based Collaborative Intrusion Detection
  46. Altmetric Badge
    Chapter 45 A Novel Clustering Algorithm for Database Anomaly Detection
  47. Altmetric Badge
    Chapter 46 Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks
  48. Altmetric Badge
    Chapter 47 Human Surveillance System for Security Application
  49. Altmetric Badge
    Chapter 48 Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Above-average Attention Score compared to outputs of the same age and source (63rd percentile)

Mentioned by

twitter
3 X users

Readers on

mendeley
61 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security and Privacy in Communication Networks
Published by
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, January 2015
DOI 10.1007/978-3-319-28865-9
ISBNs
978-3-31-928864-2, 978-3-31-928865-9
Authors

Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran

Editors

Thuraisingham, Bhavani, Wang, XiaoFeng, Yegneswaran, Vinod

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
As of 1 July 2024, you may notice a temporary increase in the numbers of X profiles with Unknown location. Click here to learn more.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 61 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 61 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 20%
Student > Master 11 18%
Student > Bachelor 6 10%
Researcher 5 8%
Student > Doctoral Student 3 5%
Other 9 15%
Unknown 15 25%
Readers by discipline Count As %
Computer Science 33 54%
Engineering 9 15%
Social Sciences 3 5%
Psychology 1 2%
Unknown 15 25%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 28 January 2018.
All research outputs
#15,331,889
of 26,213,016 outputs
Outputs from Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
#57
of 193 outputs
Outputs of similar age
#185,426
of 362,465 outputs
Outputs of similar age from Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
#4
of 11 outputs
Altmetric has tracked 26,213,016 research outputs across all sources so far. This one is in the 40th percentile – i.e., 40% of other outputs scored the same or lower than it.
So far Altmetric has tracked 193 research outputs from this source. They receive a mean Attention Score of 2.6. This one has gotten more attention than average, scoring higher than 69% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 362,465 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 48th percentile – i.e., 48% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 11 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 63% of its contemporaries.