


default search action
Bio-inspiring Cyber Security and Cloud Services 2014
- Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad

:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library 70, Springer 2014, ISBN 978-3-662-43615-8
Bio-inspiring Systems in Cyber Security
- Ayman M. Bahaa Eldin

:
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events. 3-38 - Mohamed Azab, Mohamed Eltoweissy:

Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security. 39-69 - Mona M. Soliman

, Aboul Ella Hassanien, Hoda M. Onsi:
An Optimized Approach for Medical Image Watermarking. 71-91 - Mona M. Soliman

, Aboul Ella Hassanien, Hoda M. Onsi:
Bio-inspiring Techniques in Watermarking Medical Images: A Review. 93-114 - Sajjad Dadkhah

, Azizah Abd Manaf, Somayeh Sadeghi:
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. 115-148
Mobile Ad Hoc Networks and Key Managements
- Ayman M. Bahaa Eldin

:
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. 151-184 - Tarek Gaber

, Aboul Ella Hassanien:
An Overview of Self-Protection and Self-Healing in Wireless Sensor Networks. 185-202 - Mohamed Sarrab

, Nasser Alalwan, Ahmed Alzahrani, Mahdi Kordestani:
Cybercrime Investigation Challenges: Middle East and North Africa. 203-223 - Amira Sayed A. Aziz, Aboul Ella Hassanien:

Multilayer Machine Learning-Based Intrusion Detection System. 225-247 - D. Satish Kumar, N. Nagarajan, Ahmad Taher Azar

:
An Improved Key Management Scheme with High Security in Wireless Sensor Networks. 249-264 - Mohamed Mostafa M. Fouad

, Aboul Ella Hassanien:
Key Pre-distribution Techniques for WSN Security Services. 265-283
Biometrics Technology and Applications
- N. L. Manasa, A. Govardhan

, Ch. Satyanarayana:
Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and Iris. 287-320 - Abdallah Meraoumia

, Salim Chitroub, Ahmed Bouridane:
Biometric Recognition Systems Using Multispectral Imaging. 321-347 - Manal M. Tantawi

, Kenneth Revett, Abdel-Badeeh M. Salem, Mohamed Fahmy Tolba
:
Electrocardiogram (ECG): A New Burgeoning Utility for Biometric Recognition. 349-382 - Behzad Nazarbakhsh, Azizah Abd Manaf:

Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCA. 383-422 - Reham Amin, Tarek Gaber

, Ghada ElTaweel, Aboul Ella Hassanien:
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. 423-446
Cloud Security and Data Services
- Yasmine M. Afify

, Ibrahim F. Moawad, Nagwa L. Badr, Mohamed Fahmy Tolba
:
Cloud Services Discovery and Selection: Survey and New Semantic-Based System. 449-477 - Rajesh P. Barnwal

, Nirnay Ghosh, Soumya K. Ghosh:
Data and Application Security in Cloud. 479-495 - Nour Zawawi, Mohamed Hamdy El-Eliemy

, Rania El-Gohary
, Mohamed F. Tolba
:
Security Issues on Cloud Data Services. 497-517 - Ahmed Hammam, Samah Senbel:

A Reputation Trust Management System for Ad-Hoc Mobile Clouds. 519-539 - Qurban A. Memon

:
Secured and Networked Emergency Notification Without GPS Enabled Devices. 541-563 - Sameh Hussein, Nashwa Abdelbaki

:
Towards Cloud Customers Self-Monitoring and Availability-Monitoring. 565-585

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














