Muutke küpsiste eelistusi

Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers [Pehme köide]

  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009. The c- ference was organized as a meeting point for leading national and international - perts of information security and digital forensics. The conference was rewarding in many ways; ISDF 2009 was an exciting and vibrant event, with 4 keynote talks, 25 invited talks and 18 full-paper presentations and those attending had the opportunity to meet and talk with many distinguished people who are responsible for shaping the area of information security. This conference was organized as part of two major research projects funded by the UK Engineering and Physical Sciences Research Council in the areas of Security and Digital Forensics. I would like to thank all the people who contributed to the technical program. The most apparent of these are the Indian delegates who all accepted our invite to give presentations at this conference. Less apparent perhaps is the terrific work of the members of the Technical Program Committee, especially in reviewing the papers, which is a critical and time-consuming task. I would like to thank Raj Rajarajan (City University London) for making the idea of the ISDF 2009 conference a reality with his hard work. Last but not least, I would like to thank all the authors who submitted papers, making the conference possible, and the authors of accepted papers for their cooperation. Dasun Weerasinghe
Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
1(10)
Divya
Sanjeev Kumar
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
11(8)
Fei Peng
Re-Si Guo
Chang-Tsun Li
Min Long
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
19(7)
Chang-Tsun Li
Chih-Yuan Chang
Yue Li
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment
26(16)
Monis Akhlaq
Faeiz Alserhani
Irfan U. Awan
John Mellor
Andrea J. Cullen
Pravin Mirchandani
Face Recognition Using Balanced Pairwise Classifier Training
42(8)
Ziheng Zhou
Samuel Chindaro
Farzin Deravi
Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)
50(7)
Qin Zhou
Nigel Poole
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems
57(9)
Ahsan Subhan
Monis Akhlaq
Faeiz Alserhani
Irfan U. Awan
John Mellor
Andrea J. Cullen
Pravin Mirchandani
Parameter Based Access Control Model for Mobile Handsets
66(10)
Dasun Weerasinghe
Raj Muttukrishnan
Veselin Rakocevic
Ethical Dilemmas in Teaching Computer and Internet Security
76(6)
Brian Tompsett
Overview of SIP Attacks and Countermeasures
82(10)
Fadi El-Moussa
Parmindher Mudhar
Andy Jones
Security Challenges in Multihop Wireless Mesh Networks---A Survey
92(10)
Divya
Sanjeev Kumar
A Security Architecture to Protect Against Data Loss
102(9)
Clive Blackwell
A Simple Method for Improving Intrusion Detections in Corporate Networks
111(12)
Joshua Ojo Nehinbe
Detecting Sybils in Peer-to-Peer File Replication Systems
123(12)
K. Haribabu
Chittaranjan Hota
Saravana
Adaptive Clustering Method for Reclassifying Network Intrusions
135(12)
Nehinbe Ojo Joshua
Technology Perspective: Is Green It a Threat to IT Security?
147(8)
Dimitrios Frangiskatos
Mona Ghassemian
Diane Gan
An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics
155(8)
S. Chindaro
Z. Zhou
M.W.R. Ng
F. Deravi
Cross-Enterprise Policy Model for e-Business Web Services Security
163(9)
Tanko Ishaya
Jason R.C. Nurse
Challenges of Identity Management - A Context in Rural India
172(13)
Rajanish Dass
Sujoy Pal
Author Index 185