Atjaunināt sīkdatņu piekrišanu

E-grāmata: International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Doctoral Symposium
A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor Networks
3(7)
Qun Wang
Huanyan Qian
Peiyu Ji
Yu Xie
Shuhui Yang
An Improved Authorization Model in Trust Network
10(7)
Xianming Gao
Xiaozhe Zhang
Baosheng Wang
Huiting Shi
KEMF: Key Management for Federated Sensor Networks
17(8)
Piers O'Hanlon
Joss Wright
Ian Brown
Tulio de Souza
CPS2: A Contextual Privacy Framework for Social Software
25(8)
Rula Sayaf
Dave Clarke
Richard Harper
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks
33(8)
Ben Niu
Xiuguang Li
Xiaoyan Zhu
Xiaoqing Li
Hui Li
RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
41(10)
Li Zhai
ChuanKun Wu
Intrusion Detection
METIS: A Two-Tier Intrusion Detection System for Advanced Metering Infrastructures
51(18)
Vincenzo Gulisano
Magnus Almgren
Marina Papatriantafilou
Online Detection of Concurrent Prefix Hijacks
69(15)
Shen Su
Beichuan Zhang
Binxing Fang
Countermeasures for Mitigating ICN Routing Related DDoS Attacks
84(9)
Eslam G. AbdAllah
Mohammad Zulkernine
Hossam S. Hassanein
A New Anomaly Detection Method Based on IGTE and IGFE
93(20)
Ziyu Wang
Jiahai Yang
Fuliang Li
International Workshop on Applications and Technologies in Cyber Security (ATCS)
Forensic Potentials of Solid State Drives
113(14)
Zubair Shah
Abdun Naser Mahmood
Jill Slay
Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis
127(14)
Saira Syed
Quazi Mamun
A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System
141(16)
Khandakar Rabbi
Mohammed Kaosar
Md Rafiqul Islam
Quazi Mamun
Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control
157(16)
Abdun Naser Mahmood
Md Enamul Kabir
Abdul K. Mustafa
Securing Sensor Networks by Moderating Frequencies
173(13)
Pinaki Sarkar
Priyatosh Mahish
Morshed Uddin Chowdhury
Kouichi Sakurai
Intelligent Financial Fraud Detection Practices: An Investigation
186(18)
Jarrod West
Maumita Bhattacharya
Rafiqul Islam
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection
204(16)
Mohiuddin Ahmed
Abdun Naser Mahmood
A Survey on Mining Program-Graph Features for Malware Analysis
220(17)
Md. Saiful Islam
Md. Rafiqul Islam
A.S.M. Kayes
Chengfei Liu
Irfan Altas
Defence Against Code Injection Attacks
237(15)
Hussein Alnabulsi
Quazi Mamun
Rafiqul Islam
Morshed U. Chowdhury
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation
252(15)
Adnan Anwar
Abdun Naser Mahmood
Mohiuddin Ahmed
A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network
267(18)
Ala' Aburumman
Kim-Kwang Raymond Choo
DAPRO 2014 and SSS 2014 International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO) International Workshop on Secure Smart Systems (SSS)
virtio-ct: A Secure Cryptographic Token Service in Hypervisors
285(16)
Le Guan
Fengjun Li
Jiwu Jing
Jing Wang
Ziqiang Ma
Blind Format String Attacks
301(14)
Fatih Kilic
Thomas Kittel
Claudia Eckert
An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs
315(14)
Felix C. Freiling
Mykola Protsenko
Yan Zhuang
Towards Privacy-Preserving Web Metering via User-Centric Hardware
329(12)
Fahad Alarifi
Maribel Fernandez
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage
341(18)
Weiyu Jiang
Zhan Wang
Limin Liu
Neng Gao
International Workshop on System Level Security of Smartphones
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms
359(8)
Heqing Huang
Kai Chen
Peng Liu
Sencun Zhu
Dinghao Wu
Transplantation Attack: Analysis and Prediction
367(8)
Zhongwen Zhang
Ji Xiang
Lei Wang
Lingguang Lei
Timing-Based Clone Detection on Android Markets
375(7)
Yingjun Zhang
Kezhen Huang
Yuling Liu
Kai Chen
Liang Huang
Yifeng Lian
A New Trust Chain Security Evaluation Model and Tool
382(10)
Wei Hu
Dongyao Ji
Ting Wang
Gang Yao
A System for Privacy Information Analysis and Safety Assessment of iOS Applications
392(7)
Bin Li
Zhijie Feng
How We Found These Vulnerabilities in Android Applications
399(8)
Bin Ma
Author Index 407