Methods
Outline
Chapter 12 Advanced Security Network Metrics
Chapter 13 Designing Trustworthy Software Systems Using the NFR Approach
Chapter 15 Algebraic Approaches to a Network-Type Private Information Retrieval
Chapter 16 Using Event Reasoning for Trajectory Tracking
Chapter 17 Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Chapter 18 Real-time Network Intrusion Detection Using Hadoop-Based Bayesian Classifier
Chapter 19 Optimum Countermeasure Portfolio Selection
Chapter 21 Security through Emulation-Based Processor Diversification
Chapter 22 On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks