Handbook of Research on Threat Detection and Countermeasures in Network Security, 1st Edition

  • Alaa Hussein Al-Hamami
  • Published By:
  • ISBN-10: 146666584X
  • ISBN-13: 9781466665842
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 347 Pages | eBook
  • Original Copyright 2015 | Published/Released December 2015
  • This publication's content originally published in print form: 2015

  • Price:  Sign in for price



Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Other Frontmatter.
Editorial Advisory Board and List of Reviewers.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Security Concepts, Developments, and Future Trends.
2: Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection.
3: Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat.
4: Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites.
5: Authentication Model for Enterprise Resource Planning Network.
6: Cryptographic Hash Function: A High Level View.
7: Crime Profiling System.
8: Proposals to Win the Battle Against Cyber Crime.
9: Cyber Crimes: Types, Sizes, Defence Mechanism, and Risk Mitigation.
10: Cyber Space Security Assessment Case Study.
11: Biometric Security.
12: Data Hiding Schemes Based on Singular Value Decomposition.
13: Malay Language Text-Based Anti-Spam System Using Neural Network.
14: Virtualization Technology and Security Challenges.
15: The Impact of Big Data on Security.
16: 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback.
17: A New Approach in Cloud Computing User Authentication.
18: Trust Determination in Wireless Ad Hoc Networks.
19: Security in Mobile Computing.
20: The Security Impacts on Social Media Platforms.
21: Security in Digital Images: From Information Hiding Perspective.
Compilation of References.
About the Contributors.