Bio-inspiring cyber security and cloud services : trends and innovations (English)
- New search for: Hassanien, Aboul Ella
- Further information on Hassanien, Aboul Ella:
- http://d-nb.info/gnd/135922631
2014
-
ISBN:
- Book / Print
-
Title:Bio-inspiring cyber security and cloud services : trends and innovations
-
Contributors:Hassanien, Aboul Ella ( editor )
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , Heidelberg [u.a.]
-
Publication date:2014
-
Size:XXII, 585 S.
-
Remarks:235 mm x 155 mm
Ill., graph. Darst.
Literaturangaben
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Book
-
Type of material:Print
-
Language:English
- New search for: 42.11 / 54.00
- Further information on Basic classification
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and EventsBahaa-Eldin, Ayman M. et al. | 2014
- 2
-
Bio-inspired Evolutionary Sensory System for Cyber-Physical System SecurityAzab, Mohamed / Eltoweissy, Mohamed et al. | 2014
- 3
-
An Optimized Approach for Medical Image WatermarkingSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 4
-
Bio-inspiring Techniques in Watermarking Medical Images: A ReviewSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 5
-
Efficient Image Authentication and Tamper Localization Algorithm Using Active WatermarkingDadkhah, Sajjad / Manaf, Azizah Abd / Sadeghi, Somayeh et al. | 2014
- 6
-
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc NetworksBahaa-Eldin, Ayman M. et al. | 2014
- 7
-
An Overview of Self-Protection and Self-Healing in Wireless Sensor NetworksGaber, Tarek / Hassanien, Aboul Ella et al. | 2014
- 8
-
Cybercrime Investigation Challenges: Middle East and North AfricaSarrab, Mohamed / Alalwan, Nasser / Alzahrani, Ahmed / Kordestani, Mahdi et al. | 2014
- 9
-
Multilayer Machine Learning-Based Intrusion Detection SystemAziz, Amira Sayed A. / Hassanien, Aboul Ella et al. | 2014
- 10
-
An Improved Key Management Scheme with High Security in Wireless Sensor NetworksSatish kumar, D. / Nagarajan, N. / Taher Azar, Ahmad et al. | 2014
- 11
-
Key Pre-distribution Techniques for WSN Security ServicesFouad, Mohamed Mostafa M. / Hassanien, Aboul Ella et al. | 2014
- 12
-
Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and IrisManasa, N. L / Govardhan, A / Satyanarayana, Ch et al. | 2014
- 13
-
Biometric Recognition Systems Using Multispectral ImagingMeraoumia, Abdallah / Chitroub, Salim / Bouridane, Ahmed et al. | 2014
- 14
-
Electrocardiogram (ECG): A New Burgeoning Utility for Biometric RecognitionTantawi, Manal / Revett, Kenneth / Salem, Abdel-Badeeh / Tolba, M. Fahmy et al. | 2014
- 15
-
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCANazarbakhsh, Behzad / Manaf, Azizah Abd et al. | 2014
- 16
-
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open IssuesAmin, Reham / Gaber, Tarek / ElTaweel, Ghada / Hassanien, Aboul Ella et al. | 2014
- 17
-
Cloud Services Discovery and Selection: Survey and New Semantic-Based SystemAfify, Yasmine M. / Moawad, Ibrahim F. / Badr, Nagwa L. / Tolba, M. F. et al. | 2014
- 18
-
Data and Application Security in CloudBarnwal, Rajesh P. / Ghosh, Nirnay / Ghosh, Soumya K. et al. | 2014
- 19
-
Security Issues on Cloud Data ServicesZawawi, Nour / El-Eliemy, Mohamed Hamdy / El-Gohary, Rania / Tolba, Mohamed F. et al. | 2014
- 20
-
A Reputation Trust Management System for Ad-Hoc Mobile CloudsHammam, Ahmed / Senbel, Samah et al. | 2014
- 21
-
Secured and Networked Emergency Notification Without GPS Enabled DevicesMemon, Qurban A. et al. | 2014
- 22
-
Towards Cloud Customers Self-Monitoring and Availability-MonitoringHussein, Sameh / Abdelbaki, Nashwa et al. | 2014