Dr. Erdal Ozkaya
Search
  • Home
  • Cybersecurity, Cloud Computing, News, Announcemets, My Books
  • Security and Privacy In Communication Network New Book :

Security and Privacy In Communication Network New Book :

Erdal2021-10-02T22:37:12-04:00

Security and Privacy In Communication Network

I am proud to announce an Academic book which I have contributed as researcher / Co author… The book ” Security and Privacy In Communication Network” is just being published from Springer Cybersecurity Privacy

To see all my books click here 

Security and Privacy in Communication Networks

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers  were carefully reviewed and selected from 105 submissions.

The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.

13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

  • Editors
  •  
  • (view affiliations)
  • Xiaodong Lin
  • Ali Ghorbani
  • Kui Ren
  • Sencun Zhu
  • Aiqing Zhang

Table of contents (22 chapters)

  • Privacy in Social Media

    Pages 3-10

    Ozkaya, Erdal (et al.)

    Preview Buy Chapter 25,95 €
  • SecControl: Bridging the Gap Between Security Tools and SDN Controllers

    Pages 11-31

    Wang, Li (et al.)

    Preview
  • An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development

    Pages 32-46

    Al-Saggaf, Yeslam

    Preview
  • Securing Websites Against Homograph Attacks

    Pages 47-59

    Abawajy, Jemal (et al.)

    Preview Buy Chapter 25,95 €
  • Privacy Threat Analysis of Mobile Social Network Data Publishing

    Pages 60-68

    Abawajy, Jemal H. (et al.)

    Security and Privacy in Communications Networks Dr Erdal Ozkaya
    Security and Privacy in Communications Networks Dr Erdal Ozkaya

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Learn from a Certified Hacker – Absolutely 4 Free

Learn from a Certified Hacker By Matthew Calder from Microsoft Learning  Lots! Especially when he's outlining the five steps every hacker follows! On... read more
Hacking Countermeasures Erdal Ozkaya

Free Hacking Course : Hacking Countermeasures 4 weeks

Free Hacking Course : Hacking Countermeasures In this FREE COURSE subject, students will learn how to scan, test, hack and secure... read more
World Cybersecurity Summit Oman Erdal Ozkaya

World Cybersecurity Summit Oman 2021 Free Rego

World Cybersecurity Summit Oman 2021 Free Event MITIGATING CYBER THREATS AND SECURING OMAN'S DATA NETWORK I am happy to announce I will... read more
EDR

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS ?

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS Let's start first with the definition of EDR or Endpoint Detection and Response. It... read more
International Cyber Warfare Erdal Ozkaya

International Cyber Warfare Conference

International Cyber Warfare Conference , proud to be awarded ! It was an honor speaking at The International Cyber Warfare Conference... read more
AusCERT Erdal

Advanced Windows Defence by AusCERT 2012 – Experience form the filed

Advanced Windows Defence This year AusCERT will host my latest course about Windows Defiance, which is going to be hands on... read more
Best Books on Cyber Security

18 Best Books to Learn Cyber Security

18 Best Books to Learn Cyber Security In today’s world, every single thing is done with the help of technology. Technology... read more
Social engineering

8 Principles of Influence in Social engineering – Great Security Guide

8 Principles of Influence in Social engineering Published on January 13, 2022 by  Manjeet Singh , reshare it here as... read more
Listed in the CISO Power list by Khaleej Times

Listed in the CISO Power list by Khaleej Times

I am really honored  to announce that I have been listed in the CISO Power list  by Khaleej Times. I am... read more
Network World Awards Erdal Ozkaya

Network World Awards – Thankful <3

Network World Awards Thank you very much Network World Middle East for awarding me as "Best Networking Security Professional" in the... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.