Muutke küpsiste eelistusi

Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings 2013 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 249 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 104 Illustrations, black and white; XII, 249 p. 104 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 381
  • Ilmumisaeg: 14-Aug-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642405967
  • ISBN-13: 9783642405969
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 249 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 104 Illustrations, black and white; XII, 249 p. 104 illus., 1 Paperback / softback
  • Sari: Communications in Computer and Information Science 381
  • Ilmumisaeg: 14-Aug-2013
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642405967
  • ISBN-13: 9783642405969

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.

Networking Security
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study
1(10)
Leovigildo Sanchez-Casado
Rafael Alejandro Rodriguez-Gomez
Roberto Magan-Carrion
Gabriel Macia-Fernandez
Clustering Based Group Key Management for MANET
11(16)
Ayman El-Sayed
Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN
27(17)
Alyaa Amer
Ayman Abdel-Hamid
Mohamad Abou El-Nasr
Hardware Advancements Effects on MANET Development, Application and Research
44(10)
Amr ElBanna
Ehab ElShafei
Khaled ElSabrouty
Marianne A. Azer
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing
54(11)
Khurram Shahzad
Steve Woodhead
Panos Bakalis
A Categorized Trust-Based Message Reporting Scheme for VANETs
65(19)
Merrihan Monir
Ayman Abdel-Hamid
Mohammed Abd El Aziz
Data and Information Security
Blind Watermark Approach for Map Authentication Using Support Vector Machine
84(14)
Mourad Raafat Mouhamed
Hossam M. Zawbaa
Eiman Tamah Al-Shammari
Aboul Ella Hassanien
Vaclav Snasel
High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression
98(13)
Mohamed Waleed Fakhr
An HMM-Based Reputation Model
111(11)
Ehab ElSalamouny
Vladimiro Sassone
Towards IT-Legal Framework for Cloud Computing
122(9)
Sameh Hussein
Nashwa Abdelbaki
A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps
131(12)
Mona M. Soliman
Aboul Ella Hassanien
Hoda M. Onsi
Authentication and Privacy
A Cattle Identification Approach Using Live Captured Muzzle Print Images
143(10)
Ali Ismail Awad
Aboul Ella Hassanien
Hossam M. Zawbaa
Algebraic Replay Attacks on Authentication in RFID Protocols
153(11)
Noureddine Chikouche
Foudil Cherif
Mohamed Benmohammed
A Privacy Preserving Approach to Smart Metering
164(13)
Merwais Shinwari
Amr Youssef
Walaa Hamouda
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
177(8)
Ammar Alazab
Michael Hobbs
Ansam Khraisat
Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study
185(11)
Mohamed Alfateh Badawy
Nawal El-Fishawy
Osama Elshakankiry
Security Applications
Elderly Healthcare Data Protection Application for Ambient Assisted Living
196(8)
Qing Tan
Nashwa El-Bendary
Frederique C. Pivot
Anthony Lam
A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics
204(15)
Miguel Salas
Machine Learning Techniques for Anomalies Detection and Classification
219(11)
Amira Sayed Abdel-Aziz
Aboul Ella Hassanien
Ahmad Taher Azar
Sanaa El-Ola Hanafi
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing
230(10)
Nor Fatimah Awang
Azizah Abd Manaf
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
240(9)
Heba F. Eid
About Ella Hassanien
Tai-hoon Kim
Soumya Banerjee
Author Index 249