Bio-inspiring cyber security and cloud services : trends and innovations (Englisch)
- Neue Suche nach: Hassanien, Aboul Ella
- Weitere Informationen zu Hassanien, Aboul Ella:
- http://d-nb.info/gnd/135922631
2014
-
ISBN:
- Buch / Print
-
Titel:Bio-inspiring cyber security and cloud services : trends and innovations
-
Beteiligte:Hassanien, Aboul Ella ( Herausgeber:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin , Heidelberg [u.a.]
-
Erscheinungsdatum:2014
-
Format / Umfang:XXII, 585 S.
-
Anmerkungen:235 mm x 155 mm
Ill., graph. Darst.
Literaturangaben
Langzeitarchivierung durch Badische Landesbibliothek -
ISBN:
-
Medientyp:Buch
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 42.11 / 54.00
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and EventsBahaa-Eldin, Ayman M. et al. | 2014
- 2
-
Bio-inspired Evolutionary Sensory System for Cyber-Physical System SecurityAzab, Mohamed / Eltoweissy, Mohamed et al. | 2014
- 3
-
An Optimized Approach for Medical Image WatermarkingSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 4
-
Bio-inspiring Techniques in Watermarking Medical Images: A ReviewSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 5
-
Efficient Image Authentication and Tamper Localization Algorithm Using Active WatermarkingDadkhah, Sajjad / Manaf, Azizah Abd / Sadeghi, Somayeh et al. | 2014
- 6
-
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc NetworksBahaa-Eldin, Ayman M. et al. | 2014
- 7
-
An Overview of Self-Protection and Self-Healing in Wireless Sensor NetworksGaber, Tarek / Hassanien, Aboul Ella et al. | 2014
- 8
-
Cybercrime Investigation Challenges: Middle East and North AfricaSarrab, Mohamed / Alalwan, Nasser / Alzahrani, Ahmed / Kordestani, Mahdi et al. | 2014
- 9
-
Multilayer Machine Learning-Based Intrusion Detection SystemAziz, Amira Sayed A. / Hassanien, Aboul Ella et al. | 2014
- 10
-
An Improved Key Management Scheme with High Security in Wireless Sensor NetworksSatish kumar, D. / Nagarajan, N. / Taher Azar, Ahmad et al. | 2014
- 11
-
Key Pre-distribution Techniques for WSN Security ServicesFouad, Mohamed Mostafa M. / Hassanien, Aboul Ella et al. | 2014
- 12
-
Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and IrisManasa, N. L / Govardhan, A / Satyanarayana, Ch et al. | 2014
- 13
-
Biometric Recognition Systems Using Multispectral ImagingMeraoumia, Abdallah / Chitroub, Salim / Bouridane, Ahmed et al. | 2014
- 14
-
Electrocardiogram (ECG): A New Burgeoning Utility for Biometric RecognitionTantawi, Manal / Revett, Kenneth / Salem, Abdel-Badeeh / Tolba, M. Fahmy et al. | 2014
- 15
-
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCANazarbakhsh, Behzad / Manaf, Azizah Abd et al. | 2014
- 16
-
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open IssuesAmin, Reham / Gaber, Tarek / ElTaweel, Ghada / Hassanien, Aboul Ella et al. | 2014
- 17
-
Cloud Services Discovery and Selection: Survey and New Semantic-Based SystemAfify, Yasmine M. / Moawad, Ibrahim F. / Badr, Nagwa L. / Tolba, M. F. et al. | 2014
- 18
-
Data and Application Security in CloudBarnwal, Rajesh P. / Ghosh, Nirnay / Ghosh, Soumya K. et al. | 2014
- 19
-
Security Issues on Cloud Data ServicesZawawi, Nour / El-Eliemy, Mohamed Hamdy / El-Gohary, Rania / Tolba, Mohamed F. et al. | 2014
- 20
-
A Reputation Trust Management System for Ad-Hoc Mobile CloudsHammam, Ahmed / Senbel, Samah et al. | 2014
- 21
-
Secured and Networked Emergency Notification Without GPS Enabled DevicesMemon, Qurban A. et al. | 2014
- 22
-
Towards Cloud Customers Self-Monitoring and Availability-MonitoringHussein, Sameh / Abdelbaki, Nashwa et al. | 2014