Search Results - University of Auckland

  • Showing 1 - 1 results of 1
Refine Results
  1. 1

    Security and privacy management, techniques, and protocols

    Published 2018
    Table of Contents: “…A lightweight authentication & encryption protocol for secure communications between resource limited devices without hardware modification : resource limited device authentication / Piotr Ksiazak, Letterkenny Institute of Technology, Ireland, Kevin Curran, Ulster University, United Kingdom -- Role of cryptography in security / Sarvesh Tanwar, Mody University of Science and Technology, Lakshmangarh, India, Anil Kumar, Mody University of Science & Technology, India -- Risk assessment in virtualization / Dev Pandey, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, India, Bharat Mishra, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalya, India -- Metamorphic malware detection using minimal opcode statistical patterns / Mahmood Fazlali, Shahid Beheshti University, Iran, Islamic Republic of Iran -- False alarm reduction : a profiling mechanism and new research directions / Salima Hacini, Constantine University, Algeria, Zahia Guessoum, Pierre et Marie Curie University, France, Mohamed Cheikh, Lire Laboratory, Constantine2 University, Algeria -- Trust-based analytical models for secure wireless sensor networks / Aminu Usman, Auckland University of Technology, Nigeria, Jairo Gutierrez, Auckland University of Technology, New Zealand, New Zealand -- Intrusion detection systems alerts reduction new approach for forensics readiness / Aymen Akremi, Umm Al-Qura University, Saudi Arabia, Hassen Sallay, Umm Al-Qura University, Saudi Arabia, Mohsen Rouached, Sultanate Qabus University, Oman -- Security visualization extended review issues,classifications, validation methods,trends, extensions / Ferda Özdemir Sönmez, Middle East Technical University, Turkey, Banu Günel, Middle East Technical University, Turkey…”
    Book