Security and Management
Kevin Daimi (Redaktør) ; Hamid R. Arabnia (Redaktør) ; Michael R. Grimaila (Redaktør) ; Kathy Liszka (Redaktør) ; George Markowsky (Redaktør) ; Ashu M. G. Solo (Redaktør)
Security and Management is a compendium of articles and papers that were presented at SAM '13, an international conference
that serves researchers, scholars, professionals, students, and academicians.. Les mer
- Vår pris
- 912,-
(Paperback)
Fri frakt!
Leveringstid:
Sendes innen 21 dager
Paperback
Legg i
Paperback
Legg i
Vår pris:
912,-
(Paperback)
Fri frakt!
Leveringstid:
Sendes innen 21 dager
Security and Management is a compendium of articles and papers that were presented at SAM '13, an international conference
that serves researchers, scholars, professionals, students, and academicians.
Selected topics include:
Security Management, Security Education, and Hardware Security
Biometric And Forensics
Computer Security
Information Assurance
Cryptographic Technologies
Systems Engineering and Security
Computer and Network Security
Network Security
Cybersecurity Education
Cryptography + Malware and Spam Detection + Network Security and Cyber Security Education
Selected topics include:
Security Management, Security Education, and Hardware Security
Biometric And Forensics
Computer Security
Information Assurance
Cryptographic Technologies
Systems Engineering and Security
Computer and Network Security
Network Security
Cybersecurity Education
Cryptography + Malware and Spam Detection + Network Security and Cyber Security Education
- FAKTA
-
Utgitt:
2015
Forlag: C. S. R. E. A.
Innbinding: Paperback
Språk: Engelsk
ISBN: 9781601322593
Format: 28 x 20 cm
- KATEGORIER:
- VURDERING
-
Gi vurdering
Les vurderinger
Complexity Secure Linear Network Coding Protocol
5) A practical study of the problems of current Internet routing tables
Session: Network Security I
1) Private Proximity Testing for Location Based Services
2) DROP-FAST: Defending against DDoS Attacks using Cloud Technology
3) Simplified Network Traffic Visualization for Real-Time Security Analysis
4) Challenges of Kerberos Variance with High QoS Expectations
Session: Network Security II
1) Port Knocking- An Additional Layer of Security for SSH and HTTPS
2) Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Services
3) Privacy-Aware Proximity Based Service Using Hide and Crypt Protocol: Implementation
Session: Cybersecurity Education
1) The 2013 NECCDC - Lessons Learned
2) Experiences with the Promise and Potential of Service-Learning in an Online Information Security Curriculum
3) Visualizing Cybersecurity Events
4) XSS Cookie Injection Covert Channel
5) Composite Covert Channels through EVE Online
6) SSDP Covert Channel
Session: Posters
1) Integrative Security for JavaEE Web Applications
2) HPA Lab: An Open-Source Educational Tool to Explore Host Protected Areas Under Linux
3) An Automatic Botnet Detection and Notification System in Taiwan
4) Design and Implementation of Broker System for Protect Privacy Information
Session: Position Papers + Cryptography + Malware and Spam Detection + Network Security and Cyber Security Education
1) Feature Reduction for Optimum SMS Spam Filtering Using Domain Knowledge
2) Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security
3) Multi-disciplinary Approach to Cyber Security Education
4) A Load Service Structure Using a P2P Network Based Reputation System in Ad-hoc Networks
5) DES Based Educational Encryption System
6) Android Malware Detection Using Library API Call Tracing and Semantic-Preserving Signal Processing Techniques
5) A practical study of the problems of current Internet routing tables
Session: Network Security I
1) Private Proximity Testing for Location Based Services
2) DROP-FAST: Defending against DDoS Attacks using Cloud Technology
3) Simplified Network Traffic Visualization for Real-Time Security Analysis
4) Challenges of Kerberos Variance with High QoS Expectations
Session: Network Security II
1) Port Knocking- An Additional Layer of Security for SSH and HTTPS
2) Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Services
3) Privacy-Aware Proximity Based Service Using Hide and Crypt Protocol: Implementation
Session: Cybersecurity Education
1) The 2013 NECCDC - Lessons Learned
2) Experiences with the Promise and Potential of Service-Learning in an Online Information Security Curriculum
3) Visualizing Cybersecurity Events
4) XSS Cookie Injection Covert Channel
5) Composite Covert Channels through EVE Online
6) SSDP Covert Channel
Session: Posters
1) Integrative Security for JavaEE Web Applications
2) HPA Lab: An Open-Source Educational Tool to Explore Host Protected Areas Under Linux
3) An Automatic Botnet Detection and Notification System in Taiwan
4) Design and Implementation of Broker System for Protect Privacy Information
Session: Position Papers + Cryptography + Malware and Spam Detection + Network Security and Cyber Security Education
1) Feature Reduction for Optimum SMS Spam Filtering Using Domain Knowledge
2) Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security
3) Multi-disciplinary Approach to Cyber Security Education
4) A Load Service Structure Using a P2P Network Based Reputation System in Ad-hoc Networks
5) DES Based Educational Encryption System
6) Android Malware Detection Using Library API Call Tracing and Semantic-Preserving Signal Processing Techniques
Hamid R. Arabnia is Professor, Computer Science; Editor-in-Chief, The Journal of Supercomputing (Springer); Elected Fellow,
Int'l Society of Intelligent Biological Medicine (ISIBM); The University of Georgia, Department of Computer Science.