IPTV network security: threats and countermeasures
With the increasing popularity of high quality multimedia contents of Internet Protocol Television (IPTV), its attacks and threats are also increasing parallelly. Consequently, it remains an important concern and may arise in various points of IPTV environments, e.g., home and core networks, deliver...
| Main Authors: | M. S. A., Noman Ranak, Saiful Azad, B. M. F, Karnal, Ruhee, N. Nourin, Nisa, Nazrul, Kabir, M. M., Rahman, Kamal Z., Zamli |
|---|---|
| Format: | Book Chapter |
| Language: | English English |
| Published: |
John Wiley & Sons
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/21634/ http://umpir.ump.edu.my/id/eprint/21634/1/7.%20IPTV%20network%20security%20-threats%20and%20countermeasures.pdf http://umpir.ump.edu.my/id/eprint/21634/2/7.1%20IPTV%20network%20security%20-threats%20and%20countermeasures.pdf |
Similar Items
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Television Viewing in Asia: Is IPTV the Future?
by: Yesudhasan, Thomas, et al.
Published: (2010)
by: Yesudhasan, Thomas, et al.
Published: (2010)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
A review of cryptographic impact in cybersecurity on smart grid: threat, challenges and countermeasures
by: Hasan, Md Mehedi, et al.
Published: (2021)
by: Hasan, Md Mehedi, et al.
Published: (2021)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
by: Elhoseny, M., et al.
Published: (2021)
by: Elhoseny, M., et al.
Published: (2021)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
The Future of TV opportunities IPTV is facilitating for novel revenue streams
by: Insley, Matthew James
Published: (2007)
by: Insley, Matthew James
Published: (2007)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Security monitoring tool system using threat intelligence vs threat hunting
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
by: Wan Ikbal Ismat Wan Kamal,
Published: (2021)
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
Fine-granulated FEC code for IPTV I-frames over wireless DVB-T channels
by: Arif, Manar Sami, et al.
Published: (2011)
by: Arif, Manar Sami, et al.
Published: (2011)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Analyses of rain fade countermeasure technique time diversity at 38 GHz
by: M. Saad, Nor Wahida, et al.
Published: (2013)
by: M. Saad, Nor Wahida, et al.
Published: (2013)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
The study of dangers and countermeasures of fake news in social media
by: Xie, Yuting, et al.
Published: (2021)
by: Xie, Yuting, et al.
Published: (2021)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Press Code: A Shoulder Surfing Resistant Authentication Scheme for Smart Devices
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
by: Nur Nadiah Hanim, Mohd Nor, et al.
Published: (2016)
China's oil diplomacy: is it a global security threat?
by: Lai, Hongyi
Published: (2007)
by: Lai, Hongyi
Published: (2007)
The impact on non-traditional security threats in Sri Lanka
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
by: Azad, Saiful, et al.
Published: (2024)
by: Azad, Saiful, et al.
Published: (2024)
A Unified Classification Model of Insider Threats to Information Security.
by: Prabhu, sunitha, et al.
Published: (2020)
by: Prabhu, sunitha, et al.
Published: (2020)
The Vietminh threat and the security of Thailand: Anglo-Thai response and attitude
by: Nik Anuar Nik Mahmud,
Published: (1988)
by: Nik Anuar Nik Mahmud,
Published: (1988)
Similar Items
-
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017) -
Television Viewing in Asia: Is IPTV the Future?
by: Yesudhasan, Thomas, et al.
Published: (2010) -
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016) -
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009) -
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)