Return to home page
Searching: Muskingum library catalog
We are currently experiencing delivery delays for items requested from other institutions while transitioning to a new statewide delivery service. Please contact your library with questions or advice about alternative resources. Thank you for your patience!
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
Conference SecNet (Conference) (1st : 2013 : Cairo, Egypt)
Title Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings / Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba (eds.).
Imprint Heidelberg : Springer, [2013]

View online
View online
Conference SecNet (Conference) (1st : 2013 : Cairo, Egypt)
Series Communications in computer and information science, 1865-0929 ; 381
Communications in computer and information science ; 381.
Subject Computer networks -- Security measures -- Congresses.
Computers -- Access control -- Congresses.
Computer Security.
Computer Communication Networks.
Alt Name Awad, Ali Ismail,
Hassanien, Aboul Ella,
Baba, Kensuke,
Description 1 online resource (xii, 249 pages) : illustrations.
Contents Networking Security. NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study / Leovigildo Sanchez-Casado, Rafael Alejandro Rodriguez-Gomez, Roberto Magan-Carrion -- Clustering Based Group Key Management for MANET / Ayman El-Sayed -- Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN / Alyaa Amer, Ayman Abdel-Hamid, Mohamad Abou El-Nasr -- Hardware Advancements Effects on MANET Development, Application and Research / Amr ElBanna [and others] -- A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing / Khurram Shahzad, Steve Woodhead, Panos Bakalis -- A Categorized Trust-Based Message Reporting Scheme for VANETs / Merrihan Monir, Ayman Abdel-Hamid, Mohammed Abd El Aziz.
Data and Information Security. Blind Watermark Approach for Map Authentication Using Support Vector Machine / Mourad Raafat Mouhamed [and others] -- High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression / Mohamed Waleed Fakhr -- An HMM-Based Reputation Model / Ehab ElSalamouny, Vladimiro Sassone -- Towards IT-Legal Framework for Cloud Computing / Sameh Hussein, Nashwa Abdelbaki -- A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps / Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi -- Authentication and Privacy. A Cattle Identification Approach Using Live Captured Muzzle Print Images / Ali Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa -- Algebraic Replay Attacks on Authentication in RFID Protocols / Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed.
A Privacy Preserving Approach to Smart Metering / Merwais Shinwari, Amr Youssef, Walaa Hamouda -- Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware / Ammar Alazab [and others] -- Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study / Mohamed Alfateh Badawy, Nawal El-Fishawy, Osama Elshakankiry -- Security Applications. Elderly Healthcare Data Protection Application for Ambient Assisted Living / Qing Tan [and others] -- A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics / Miguel Salas -- Machine Learning Techniques for Anomalies Detection and Classification / Amira Sayed Abdel-Aziz [and others] -- Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing / Nor Fatimah Awang, Azizah Abd Manaf -- Linear Correlation-Based Feature Selection for Network Intrusion Detection Model / Heba F. Eid [and others].
Bibliography Note Includes bibliographical references and index.
Summary This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.
Note Online resource; title from PDF title page (SpringerLink, viewed September 26, 2013).
ISBN 9783642405976 (electronic bk.)
3642405975 (electronic bk.)
ISBN/ISSN 10.1007/978-3-642-40597-6
OCLC # 858945327
Additional Format Printed edition: 9783642405969

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team