Title :
Table of contents
Abstract :
The following topics are dealt with: data integrity; iris features; cloud computing; port hopping; moving target defense; anonymized WiFi access point BSSID; e-navigation environment; cyber physical system security theories; sensitive information system security model analysis; dimensionality reduction methods; biometric recognition; anonymous network topology; and anonymous communication network attacks.
Keywords :
cloud computing; computer network security; data integrity; iris recognition; telecommunication network topology; wireless LAN; advanced evasion techniques; anonymized WiFi access point BSSID; anonymous communication network attacks; anonymous network topology; biometric recognition; cloud computing; combinatorial search; cyber physical system security theories; data integrity; dimensionality reduction methods; e-navigation environment; iris features; moving target defense; port hopping; sensitive information system security model analysis;
Conference_Titel :
Security Technology (SecTech), 2014 7th International Conference on
Conference_Location :
Haikou
Print_ISBN :
978-1-4799-7775-8
DOI :
10.1109/SecTech.2014.4