Search dblp for Publications

export results for "toc:db/books/daglib/0025851.bht:"

 download as .bib file

@incollection{DBLP:books/daglib/p/AmrithaK11,
  author       = {P. P. Amritha and
                  T. Gireesh Kumar},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {A Survey on Digital Image Steganographic Methods},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {250--258},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch018},
  doi          = {10.4018/978-1-60960-123-2.CH018},
  timestamp    = {Wed, 18 Sep 2019 08:24:13 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/AmrithaK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/AxelrodH11,
  author       = {C. Warren Axelrod and
                  Sukumar Haldar},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Combined Impact of Outsourcing and Hard Times on {BPO} Risk and Security},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {24--32},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch002},
  doi          = {10.4018/978-1-60960-123-2.CH002},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/AxelrodH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/ChakrabortyRKR11,
  author       = {Rajarshi Chakraborty and
                  Haricharan Rengamani and
                  Ponnurangam Kumaraguru and
                  H. Raghav Rao},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {The {UID} Project: Lessons Learned from the West and Challenges Identified
                  for India},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {1--23},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch001},
  doi          = {10.4018/978-1-60960-123-2.CH001},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/ChakrabortyRKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/ChaudharyK11,
  author       = {Charulata Chaudhary and
                  Ishupal Singh Kang},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Pirates of the Copyright and Cyberspace: Issues Involved},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {59--68},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch005},
  doi          = {10.4018/978-1-60960-123-2.CH005},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/ChaudharyK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/GiulianiM11,
  author       = {Kenneth J. Giuliani and
                  V. Kumar Murty},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {An Examination of Identity Management Models in an Internet Setting},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {106--114},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch008},
  doi          = {10.4018/978-1-60960-123-2.CH008},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/GiulianiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/HariniSP11,
  author       = {N. Harini and
                  C. K. Shyamala and
                  T. R. Padmanabhan},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Securing Cloud Environment},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {115--123},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch009},
  doi          = {10.4018/978-1-60960-123-2.CH009},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/HariniSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KaruppathA11,
  author       = {Narayanankutty Karuppath and
                  P. Achuthan},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology
                  with Some Applications},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {231--239},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch016},
  doi          = {10.4018/978-1-60960-123-2.CH016},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/KaruppathA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KaurGSL11,
  author       = {Rajbir Kaur and
                  Manoj Singh Gaur and
                  P. Lalith Suresh and
                  Vijay Laxmi},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {DoS Attacks in MANETs: Detection and Countermeasures},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {124--145},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch010},
  doi          = {10.4018/978-1-60960-123-2.CH010},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/KaurGSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KumarPP11,
  author       = {S. Sajan Kumar and
                  M. Hari Krishna Prasad and
                  Suresh Raju Pilli},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Extended Time Machine Design using Reconfigurable Computing for Efficient
                  Recording and Retrieval of Gigabit Network Traffic},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {168--177},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch012},
  doi          = {10.4018/978-1-60960-123-2.CH012},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/KumarPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KumarSS11,
  author       = {N. V. Narendra Kumar and
                  Harshit J. Shah and
                  R. K. Shyamasundar},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Towards Checking Tampering of Software},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {204--219},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch014},
  doi          = {10.4018/978-1-60960-123-2.CH014},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/KumarSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/MaheshwariHA11,
  author       = {Himanshu Maheshwari and
                  Harvey S. Hyman and
                  Manish Agrawal},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {A Comparison of Cyber-Crime Definitions in India and the United States},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {33--45},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch003},
  doi          = {10.4018/978-1-60960-123-2.CH003},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/MaheshwariHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/RamachandranMBMS11,
  author       = {Suja Ramachandran and
                  R. S. Mundada and
                  A. K. Bhattacharjee and
                  C. S. R. C. Murthy and
                  R. Sharma},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Classifying Host Anomalies: Using Ontology in Information Security
                  Monitoring},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {70--86},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch006},
  doi          = {10.4018/978-1-60960-123-2.CH006},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/RamachandranMBMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/ShankarAR11,
  author       = {Divya Shankar and
                  Manish Agrawal and
                  H. Raghav Rao},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {46--58},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch004},
  doi          = {10.4018/978-1-60960-123-2.CH004},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/ShankarAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/SindhuSS11,
  author       = {M. Sindhu and
                  S. Kumar Sajan and
                  M. Sethumadhavan},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Error Linear Complexity Measures of Binary Multisequences},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {240--249},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch017},
  doi          = {10.4018/978-1-60960-123-2.CH017},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/SindhuSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/SrinivasanLS11,
  author       = {Chungath Srinivasan and
                  K. V. Lakshmy and
                  Madathil Sethumadhavan},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Complexity Measures of Cryptographically Secure Boolean Functions},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {220--230},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch015},
  doi          = {10.4018/978-1-60960-123-2.CH015},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/SrinivasanLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/Talukder11,
  author       = {Asoke K. Talukder},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Securing Next Generation Internet Services},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {87--105},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch007},
  doi          = {10.4018/978-1-60960-123-2.CH007},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/Talukder11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/VinodLG11,
  author       = {P. Vinod and
                  Vijay Laxmi and
                  Manoj Singh Gaur},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Metamorphic Malware Analysis and Detection Methods},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {178--202},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch013},
  doi          = {10.4018/978-1-60960-123-2.CH013},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/VinodLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/VirendraDU11,
  author       = {Mohit Virendra and
                  Qi Duan and
                  Shambhu J. Upadhyaya},
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Detecting Cheating Aggregators and Report Dropping Attacks in Wireless
                  Sensor Networks},
  booktitle    = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  pages        = {146--167},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2.ch011},
  doi          = {10.4018/978-1-60960-123-2.CH011},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/VirendraDU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0025851,
  editor       = {Raghu Santanam and
                  M. Sethumadhavan and
                  Mohit Virendra},
  title        = {Cyber Security, Cyber Crime and Cyber Forensics - Applications and
                  Perspectives},
  publisher    = {{IGI} Global},
  year         = {2011},
  url          = {https://doi.org/10.4018/978-1-60960-123-2},
  doi          = {10.4018/978-1-60960-123-2},
  isbn         = {978-1-60960-123-2},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0025851.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics