Table of Contents
Table of Contents
Preface
Chapter 1. State-Of-The-Art Authentication Techniques: Threats and Vulnerabilities (pp. 1-12)
Chin Poo Lee and Kian Ming Lim
Chapter 2. Privacy Protection in Machine Learning: The State-of-the-Art for a Private Decision Tree (pp. 13-40)
Yee Jian Chew, Kok-Seng Wong and Shih Yin Ooi
Chapter 3. Key Distribution and Management in Cryptography (pp. 41-64)
Bachir Bendrissou and Yean Li Ho
Chapter 4. Targeted Image Forensics (pp. 65-86)
Rimba Whidiana Ciptasari
Chapter 5. Deep Learning for Abnormal Behavior Detection (pp. 87-116)
Nian Chi Tay, Pin Shen Teh and Siok Wah Tay
Chapter 6. Security Issues in Wireless Sensor Networks and IoT (pp. 117-130)
Jayakumar Vaithiyashankar
Chapter 7. Finger Vein Biometrics: The Future for a Mobile Authentication System (pp. 131-148)
Ahmad Syarif Munalih and William Ardianto
Chapter 8. Android Device Misplacement Remedy via Bluetooth-Enabled Technology (pp. 149-180)
Siew-Chin Chong and Kaven Raj S/O Manoharan
Chapter 9. A Labeled Network-Based Anomaly Intrusion Detection System (IDS) Dataset (pp. 181-216)
Nicholas Ming Ze Lee, Shih Yin Ooi, Yong Kian Lee and Ying Han Pang
Chapter 10. Seamless Biometrics for a Smart Office (pp. 217-240)
Soh Ting Yong and Michael Gah Kah Ong
Chapter 11. Hiding Information Within a QR Code Based on a Color Subcell (SQRC) (pp. 241-262)
Ari Moesriami Barmawi and Yudha Viki Alvionata
Index (pp. 263)