Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/books/daglib/0025851.bht:"
@incollection{DBLP:books/daglib/p/AmrithaK11, author = {P. P. Amritha and T. Gireesh Kumar}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {A Survey on Digital Image Steganographic Methods}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {250--258}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch018}, doi = {10.4018/978-1-60960-123-2.CH018}, timestamp = {Wed, 18 Sep 2019 08:24:13 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/AmrithaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/AxelrodH11, author = {C. Warren Axelrod and Sukumar Haldar}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Combined Impact of Outsourcing and Hard Times on {BPO} Risk and Security}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {24--32}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch002}, doi = {10.4018/978-1-60960-123-2.CH002}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/AxelrodH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/ChakrabortyRKR11, author = {Rajarshi Chakraborty and Haricharan Rengamani and Ponnurangam Kumaraguru and H. Raghav Rao}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {The {UID} Project: Lessons Learned from the West and Challenges Identified for India}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {1--23}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch001}, doi = {10.4018/978-1-60960-123-2.CH001}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/ChakrabortyRKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/ChaudharyK11, author = {Charulata Chaudhary and Ishupal Singh Kang}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Pirates of the Copyright and Cyberspace: Issues Involved}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {59--68}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch005}, doi = {10.4018/978-1-60960-123-2.CH005}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/ChaudharyK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/GiulianiM11, author = {Kenneth J. Giuliani and V. Kumar Murty}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {An Examination of Identity Management Models in an Internet Setting}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {106--114}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch008}, doi = {10.4018/978-1-60960-123-2.CH008}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/GiulianiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/HariniSP11, author = {N. Harini and C. K. Shyamala and T. R. Padmanabhan}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Securing Cloud Environment}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {115--123}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch009}, doi = {10.4018/978-1-60960-123-2.CH009}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/HariniSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KaruppathA11, author = {Narayanankutty Karuppath and P. Achuthan}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {231--239}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch016}, doi = {10.4018/978-1-60960-123-2.CH016}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/KaruppathA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KaurGSL11, author = {Rajbir Kaur and Manoj Singh Gaur and P. Lalith Suresh and Vijay Laxmi}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {DoS Attacks in MANETs: Detection and Countermeasures}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {124--145}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch010}, doi = {10.4018/978-1-60960-123-2.CH010}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/KaurGSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KumarPP11, author = {S. Sajan Kumar and M. Hari Krishna Prasad and Suresh Raju Pilli}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {168--177}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch012}, doi = {10.4018/978-1-60960-123-2.CH012}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/KumarPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KumarSS11, author = {N. V. Narendra Kumar and Harshit J. Shah and R. K. Shyamasundar}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Towards Checking Tampering of Software}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {204--219}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch014}, doi = {10.4018/978-1-60960-123-2.CH014}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/KumarSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/MaheshwariHA11, author = {Himanshu Maheshwari and Harvey S. Hyman and Manish Agrawal}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {A Comparison of Cyber-Crime Definitions in India and the United States}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {33--45}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch003}, doi = {10.4018/978-1-60960-123-2.CH003}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/MaheshwariHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/RamachandranMBMS11, author = {Suja Ramachandran and R. S. Mundada and A. K. Bhattacharjee and C. S. R. C. Murthy and R. Sharma}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Classifying Host Anomalies: Using Ontology in Information Security Monitoring}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {70--86}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch006}, doi = {10.4018/978-1-60960-123-2.CH006}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/RamachandranMBMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/ShankarAR11, author = {Divya Shankar and Manish Agrawal and H. Raghav Rao}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {46--58}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch004}, doi = {10.4018/978-1-60960-123-2.CH004}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/ShankarAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/SindhuSS11, author = {M. Sindhu and S. Kumar Sajan and M. Sethumadhavan}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Error Linear Complexity Measures of Binary Multisequences}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {240--249}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch017}, doi = {10.4018/978-1-60960-123-2.CH017}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/SindhuSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/SrinivasanLS11, author = {Chungath Srinivasan and K. V. Lakshmy and Madathil Sethumadhavan}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Complexity Measures of Cryptographically Secure Boolean Functions}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {220--230}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch015}, doi = {10.4018/978-1-60960-123-2.CH015}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/SrinivasanLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/Talukder11, author = {Asoke K. Talukder}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Securing Next Generation Internet Services}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {87--105}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch007}, doi = {10.4018/978-1-60960-123-2.CH007}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/Talukder11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/VinodLG11, author = {P. Vinod and Vijay Laxmi and Manoj Singh Gaur}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Metamorphic Malware Analysis and Detection Methods}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {178--202}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch013}, doi = {10.4018/978-1-60960-123-2.CH013}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/VinodLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/VirendraDU11, author = {Mohit Virendra and Qi Duan and Shambhu J. Upadhyaya}, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks}, booktitle = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, pages = {146--167}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2.ch011}, doi = {10.4018/978-1-60960-123-2.CH011}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/VirendraDU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0025851, editor = {Raghu Santanam and M. Sethumadhavan and Mohit Virendra}, title = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives}, publisher = {{IGI} Global}, year = {2011}, url = {https://doi.org/10.4018/978-1-60960-123-2}, doi = {10.4018/978-1-60960-123-2}, isbn = {978-1-60960-123-2}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0025851.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.