|
|
|
|
|
|
Date Reviewed |
|
|
1 - 5 of 5
reviews
|
|
|
|
|
|
|
|
Digital forensic science: issues, methods, and challenges Roussev V., Morgan & Claypool Publishers, San Rafael, CA, 2016. 156 pp. Type: Book (978-1-627059-59-6)
Digital forensics is a challenging field that is becoming even more challenging over time due to changing technologies and computing paradigms. As computing moves more and more to mobile devices and cloud services, and away from tradit...
|
Jul 12 2017 |
|
|
|
|
|
|
Digital watermarking: techniques and trends Nematollahi M., Vorakulpipat C., Rosales H., Springer International Publishing, New York, NY, 2016. 203 pp. Type: Book
Digital watermarking has many applications, including steganography, data authentication, and digital rights management. It is a challenging problem, since the techniques used are dependent on the type of media being watermarked, and t...
|
Jan 18 2017 |
|
|
|
|
|
|
Dynamic networks and cyber-security Heard N., Heard N., Adams N., WORLD SCIENTIFIC, Hackensack, NJ, 2016. 200 pp. Type: Book (978-1-786340-74-0)
Much of the existing work on network cyber security is based on analyzing previously observed attacks in order to determine attack signatures. This is certainly the predominant approach taken to intrusion detection. In contrast, the wo...
|
Aug 17 2016 |
|
|
|
|
|
|
Towards anomalous diffusion sources detection in a large network Zhang P., He J., Long G., Huang G., Zhang C. ACM Transactions on Internet Technology 16(1): 1-24, 2016. Type: Article
The identification of diffusion sources in a network is an interesting and important problem. A solution to this problem may be used, for example, for solving security problems such as finding the source of false or malicious informati...
|
Apr 21 2016 |
|
|
|
|
|
|
Privacy in a digital, networked world: technologies, implications and solutions Zeadally S., Badra M., Springer Publishing Company, Incorporated, New York, NY, 2015. 418 pp. Type: Book (978-3-319084-69-5), Reviews: (1 of 2)
As the world becomes more networked and an increasing amount of our everyday transactions involve the digital realm, the challenge involved in ensuring privacy greatly increases. This book explores the privacy challenges associated wit...
|
Mar 8 2016 |
|
|
|
|
|
|
|
|
|
|
|