Emerging Trends in ICT Security, 1st Edition

  • Published By:
  • ISBN-10: 0124104878
  • ISBN-13: 9780124104877
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 650 Pages | eBook
  • Original Copyright 2013 | Published/Released June 2014
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Other Frontmatter.
About the Editors.
List of Contributors.
1: Information and Systems Security.
2: Theory/Reviews of the Field.
3: System Security Engineering for Information Systems.
4: Metrics and Indicators as Key Organizational Assets for ICT Security Assessment.
5: A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to Discovering Unintended Inferences and Situational Conceptual Defaults.
6: Methods.
7: An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications.
8: Gamification of Information Security Awareness Training.
9: A Conceptual Framework for Information Security Awareness, Assessment, and Training.
10: Security Projects for Systems and Networking Professionals.
11: Case Study.
12: Assessing the Role of Governments in Securing E-Business: The Case of Jordan.
13: Network and Infrastructure Security.
14: Theory Reviews of the Field.
15: A Survey of Quantum Key Distribution (QKD) Technologies.
16: Advances in Self-Security of Agent-Based Intrusion Detection Systems.
17: Secure Communication in Fiber-Optic Networks.
18: Methods.
19: Advanced Security Network Metrics.
20: Designing Trustworthy Software Systems Using the NFR Approach.
21: Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks Over Generalized Fading Channels.
22: Algebraic Approaches to a Network-Type Private Information Retrieval.
23: Using Event Reasoning for Trajectory Tracking.
24: Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain.
25: Real-Time Network Intrusion Detection Using Hadoop-Based Bayesian Classifier.
26: Optimum Countermeasure Portfolio Selection: A Knapsack Approach.
27: CSRF and Big Data: Rethinking Cross-Site Request Forgery in Light of Big Data.
28: Security through Emulation-Based Processor Diversification.
29: On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks.
30: Mobile and Cloud Computing.
31: Reviews of the Field.
32: Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure.
33: Methods.
34: Detection of Intent-Based Vulnerabilities in Android Applications.
35: Cyber Crime and Cyber Terrorism.
36: Theory.
37: A Quick Perspective on the Current State in Cybersecurity.
38: A Paradigm Shift in Cyberspace Security.
39: Methods.
40: Counter Cyber Attacks By Semantic Networks.
41: Man-in-the-Browser Attacks in Modern Web Browsers.
42: Improving Security in Web Sessions: Special Management of Cookies.
43: Leveraging Semantic Web Technologies for Access Control.
44: Cyber Security Education: The Merits of Firewall Exercises.
45: Case Study.
46: Surveillance without Borders: The Case of Karen Refugees in Sheffield.
47: Focus Topics: From Online Radicalisation to Online Financial Crime.
48: Theory.
49: A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals.
50: Preventing Terrorism Together: A Framework to Provide Social Media Anti-Radicalization Training for Credible Community Voices.
51: Methods.
52: Investigating Radicalized Individual Profiles Through Fuzzy Cognitive Maps.
53: Financial Security Against Money Laundering: A Survey.
54: Intelligent Banking XML Encryption Using Effective Fuzzy Logic.