↓ Skip to main content

Security and Privacy in Communication Networks

Overview of attention for book
Cover of 'Security and Privacy in Communication Networks'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams
  3. Altmetric Badge
    Chapter 2 Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks
  4. Altmetric Badge
    Chapter 3 Application Transiency: Towards a Fair Trade of Personal Information for Application Services
  5. Altmetric Badge
    Chapter 4 CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis
  6. Altmetric Badge
    Chapter 5 On the Security of TRNGs Based on Multiple Ring Oscillators
  7. Altmetric Badge
    Chapter 6 Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relay
  8. Altmetric Badge
    Chapter 7 Target Information Trading - An Economic Perspective of Security
  9. Altmetric Badge
    Chapter 8 Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System
  10. Altmetric Badge
    Chapter 9 The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooning
  11. Altmetric Badge
    Chapter 10 Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy
  12. Altmetric Badge
    Chapter 11 Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework
  13. Altmetric Badge
    Chapter 12 SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualization
  14. Altmetric Badge
    Chapter 13 A Behavior-Aware Profiling of Smart Contracts
  15. Altmetric Badge
    Chapter 14 A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait
  16. Altmetric Badge
    Chapter 15 Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity
  17. Altmetric Badge
    Chapter 16 Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV
  18. Altmetric Badge
    Chapter 17 Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces
  19. Altmetric Badge
    Chapter 18 Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs
  20. Altmetric Badge
    Chapter 19 IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications
  21. Altmetric Badge
    Chapter 20 Power Analysis and Protection on SPECK and Its Application in IoT
  22. Altmetric Badge
    Chapter 21 Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid
  23. Altmetric Badge
    Chapter 22 On Effectiveness of Adversarial Examples and Defenses for Malware Classification
  24. Altmetric Badge
    Chapter 23 PrivC—A Framework for Efficient Secure Two-Party Computation
  25. Altmetric Badge
    Chapter 24 CoRide : A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing
  26. Altmetric Badge
    Chapter 25 Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
  27. Altmetric Badge
    Chapter 26 A Study of the Multiple Sign-in Feature in Web Applications
  28. Altmetric Badge
    Chapter 27 Authenticated LSM Trees with Minimal Trust
  29. Altmetric Badge
    Chapter 28 Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
  30. Altmetric Badge
    Chapter 29 A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age

Mentioned by

twitter
2 X users
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security and Privacy in Communication Networks
Published by
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, January 2019
DOI 10.1007/978-3-030-37231-6
ISBNs
978-3-03-037230-9, 978-3-03-037231-6
Editors

Chen, Songqing, Choo, Kim-Kwang Raymond, Fu, Xinwen, Lou, Wenjing, Mohaisen, Aziz

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
As of 1 July 2024, you may notice a temporary increase in the numbers of X profiles with Unknown location. Click here to learn more.
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 2. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 12 December 2019.
All research outputs
#17,012,522
of 25,992,468 outputs
Outputs from Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
#1
of 1 outputs
Outputs of similar age
#270,317
of 450,184 outputs
Outputs of similar age from Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
#1
of 1 outputs
Altmetric has tracked 25,992,468 research outputs across all sources so far. This one is in the 33rd percentile – i.e., 33% of other outputs scored the same or lower than it.
So far Altmetric has tracked 1 research outputs from this source. They receive a mean Attention Score of 1.4. This one scored the same or higher as 0 of them.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 450,184 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 39th percentile – i.e., 39% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 1 others from the same source and published within six weeks on either side of this one. This one has scored higher than all of them