Cyber Security Standards, Practices and Industrial Applications Systems and Methodologies

Cyber Security Standards
 
Author:
Junaid Ahmed Zubairi & Athar Mahboob
Release at: 2012
Pages: 337
Edition:
First Edition
File Size: 16 MB
File Type: pdf
Language: English


Content of Cyber Security Standards, Practices, and Industrial Applications Systems and Methodologies



Section 1
Mobile and Wireless Security

Chapter 1
Securing Wireless Ad Hoc Networks: State of the Art and Challenges.. 1
Victor Pomponiu, University of Torino, Italy

Chapter 2
Smartphone Data Protection Using Mobile Usage Pattern Matching .. 23
Wen-Chen Hu, University of North Dakota, USA
Naima Kaabouch, University of North Dakota, USA
S. Hossein Mousavinezhad, Idaho State University, USA
Hung-Jen Yang, National Kaohsiung Normal University, Taiwan

Chapter 3
Conservation of Mobile Data and Usability Constraints.. 40
Rania Mokhtar, University Putra Malaysia (UPM), Malaysia
Rashid Saeed, International Islamic University Malaysia (IIUM), Malaysia


Section 2
Social Media, Botnets and Intrusion Detection

Chapter 4
Cyber Security and Privacy in the Age of Social Networks. 57
Babar Bhatti, MutualMind, Inc., USA

Chapter 5
Botnets and Cyber Security: Battling Online Threats 75
Ahmed Mansour Manasrah, National Advanced IPv6 Center, Malaysia
Omar Amer Abouabdalla, National Advanced IPv6 Center, Malaysia
Moein Mayeh, National Advanced IPv6 Center, Malaysia
Nur Nadiyah Suppiah, National Advanced IPv6 Center, Malaysia

Chapter 6
Evaluation of Contemporary Anomaly Detection Systems (ADSs). 90
Ayesha Binte Ashfaq, National University of Sciences & Technology (NUST), Pakistan
Syed Ali Khayam, National University of Sciences & Technology (NUST), Pakistan


Section 3
Formal Methods and Quantum Computing

Chapter 7
Practical Quantum Key Distribution 114
Sellami Ali, International Islamic University Malaysia (IIUM), Malaysia

Chapter 8
Automated Formal Methods for Security Protocol Engineering  138
Alfredo Pironti, Politecnico di Torino, Italy
Davide Pozza, Politecnico di Torino, Italy
Riccardo Sisto, Politecnico di Torino, Italy


Section 4
Embedded Systems and SCADA Security

Chapter 9
Fault Tolerant Remote Terminal Units (RTUs) in SCADA Systems.. 168
Syed Misbahuddin, Sir Syed University of Engineering and Technology, Pakistan
Nizar Al-Holou, University of Detroit Mercy, USA

Chapter 10
Embedded Systems Security 179
Muhammad Farooq-i-Azam, COMSATS Institute of Information Technology, Pakistan
Muhammad Naeem Ayyaz, University of Engineering and Technology, Pakistan


Section 5
Industrial and Applications Security

Chapter 11
Cyber Security in Liquid Petroleum Pipelines 200
Morgan Henrie, MH Consulting, Inc., USA

Chapter 12
Application of Cyber Security in Emerging C4ISR Systems and Related Technologies 223
Ashfaq Ahmad Malik, National University of Sciences & Technology, Pakistan
Athar Mahboob, National University of Sciences & Technology, Pakistan
Adil Khan, National University of Sciences & Technology, Pakistan
Junaid Zubairi, State University of New York at Fredonia, USA

Chapter 13
Practical Web Application Security Audit Following Industry Standards and Compliance 259
Shakeel Ali, Cipher Storm Ltd., UK

Compilation of References 280
About the Contributors 303
Index 310

GET THIS BOOK
Similar Books

0 comments: