Research explorer tool

Date


Research Areas

Output Type

Download Available

6 results

Towards Trust and Governance in Integrated Health and Social Care Platforms

Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017)
Towards Trust and Governance in Integrated Health and Social Care Platforms
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...

Cloud Security, Privacy, and Trust Baselines

Book Chapter
Pitropakis, N., Katsikas, S., & Lambrinoudakis, C. (2016)
Cloud Security, Privacy, and Trust Baselines
According to ISO 27001, a threat is a potential event. When a threat turns into an actual event, it may cause an undesirable incident. It is undesirable because the incident...

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization

Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. In S. Qing, W. Susilo, G. Wang, & D. Liu (Eds.), Information and Communications Security; Lecture Notes in Computer Science, 388-398. Springer Verlag. https://doi.org/10.1007/978-3-642-25243-3_31
The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate ch...

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. In Neural Information Processing; Lecture Notes in Computer Science, (756-765). BMC. https://doi.org/10.1007/978-3-642-24965-5_85
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detecti...

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method

Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W. (2010)
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. In Information and Communications Security, (459-471). Springer. https://doi.org/10.1007/978-3-642-17650-0_32
The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detecti...

Software development

Book Chapter
Buchanan, W. J. (2002)
Software development. In The Complete Handbook of the Internet, (941-968). Boston, MA: BMC. https://doi.org/10.1007/978-0-306-48331-8_44
This chapter has been included to provide a foundation in software development. The following chapters will focus on WWW programs. Some programs provide a framework for a user...