Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings / Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba (eds.)
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The p...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Heidelberg :
Springer,
[2013]
|
Series: | Communications in computer and information science ;
381. |
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b7595610 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130926s2013 gw a ob 101 0 eng d | ||
005 | 20240418150307.7 | ||
019 | |a 934992695 |a 936315737 | ||
020 | |a 9783642405976 |q (electronic bk.) | ||
020 | |a 3642405975 |q (electronic bk.) | ||
020 | |z 9783642405969 | ||
024 | 7 | |a 10.1007/978-3-642-40597-6 | |
035 | |a (OCoLC)spr858945327 | ||
035 | |a (OCoLC)858945327 |z (OCoLC)934992695 |z (OCoLC)936315737 | ||
037 | |a spr10.1007/978-3-642-40597-6 | ||
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d COO |d ZMC |d OHS |d OCLCO |d OCLCF |d OCLCQ |d OCLCO |d YDXCP |d OCL |d OCLCO |d EBLCP |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d DIBIB |d OCLCO |d JG0 |d MERER | ||
049 | |a GWRE | ||
050 | 4 | |a TK5105.59 |b .S43 2013 | |
111 | 2 | |a SecNet (Conference) |n (1st : |d 2013 : |c Cairo, Egypt) |0 http://id.loc.gov/authorities/names/nb2013018470. | |
245 | 1 | 0 | |a Advances in security of information and communication networks : |b first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings / |c Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba (eds.) |
264 | 1 | |a Heidelberg : |b Springer, |c [2013] | |
264 | 4 | |c ©2013. | |
300 | |a 1 online resource (xii, 249 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Communications in computer and information science, |x 1865-0929 ; |v 381. | |
505 | 0 | 0 | |t Networking Security. |t NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study / |r Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión -- |t Clustering Based Group Key Management for MANET / |r Ayman El-Sayed -- |t Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN / |r Alyaa Amer, Ayman Abdel-Hamid, Mohamad Abou El-Nasr -- |t Hardware Advancements Effects on MANET Development, Application and Research / |r Amr ElBanna [and others] -- |t A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing / |r Khurram Shahzad, Steve Woodhead, Panos Bakalis -- |t A Categorized Trust-Based Message Reporting Scheme for VANETs / |r Merrihan Monir, Ayman Abdel-Hamid, Mohammed Abd El Aziz. |
505 | 8 | 0 | |t Data and Information Security. |t Blind Watermark Approach for Map Authentication Using Support Vector Machine / |r Mourad Raafat Mouhamed [and others] -- |t High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression / |r Mohamed Waleed Fakhr -- |t An HMM-Based Reputation Model / |r Ehab ElSalamouny, Vladimiro Sassone -- |t Towards IT-Legal Framework for Cloud Computing / |r Sameh Hussein, Nashwa Abdelbaki -- |t A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps / |r Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi -- |t Authentication and Privacy. |t A Cattle Identification Approach Using Live Captured Muzzle Print Images / |r Ali Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa -- |t Algebraic Replay Attacks on Authentication in RFID Protocols / |r Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed. |
505 | 8 | 0 | |t A Privacy Preserving Approach to Smart Metering / |r Merwais Shinwari, Amr Youssef, Walaa Hamouda -- |t Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware / |r Ammar Alazab [and others] -- |t Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study / |r Mohamed Alfateh Badawy, Nawal El-Fishawy, Osama Elshakankiry -- |t Security Applications. |t Elderly Healthcare Data Protection Application for Ambient Assisted Living / |r Qing Tan [and others] -- |t A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics / |r Miguel Salas -- |t Machine Learning Techniques for Anomalies Detection and Classification / |r Amira Sayed Abdel-Aziz [and others] -- |t Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing / |r Nor Fatimah Awang, Azizah Abd Manaf -- |t Linear Correlation-Based Feature Selection for Network Intrusion Detection Model / |r Heba F. Eid [and others] |
504 | |a Includes bibliographical references and index. | ||
520 | |a This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed September 26, 2013) | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490. | |
650 | 0 | |a Computers |x Access control |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007008440. | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341. | |
650 | 7 | |a Computers |x Access control. |2 fast |0 (OCoLC)fst00872779. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Awad, Ali Ismail, |e editor. |0 http://id.loc.gov/authorities/names/nb2013018474 |1 http://isni.org/isni/0000000418786101. | |
700 | 1 | |a Hassanien, Aboul Ella, |e editor. |0 http://id.loc.gov/authorities/names/n2007028183 |1 http://isni.org/isni/0000000116442303. | |
700 | 1 | |a Baba, Kensuke, |e editor. |0 http://id.loc.gov/authorities/names/nb2013018475. | |
776 | 0 | 8 | |i Printed edition: |z 9783642405969. |
830 | 0 | |a Communications in computer and information science ; |v 381. |0 http://id.loc.gov/authorities/names/no2008037797. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-40597-6 |z Full Text (via Springer) |
907 | |a .b7595610x |b 03-19-20 |c 11-06-13 | ||
998 | |a web |b 07-01-17 |c g |d b |e - |f eng |g gw |h 0 |i 1 | ||
907 | |a .b7595610x |b 07-02-19 |c 11-06-13 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b7595610x |b 01-17-18 |c 11-06-13 | ||
907 | |a .b7595610x |b 07-06-17 |c 11-06-13 | ||
907 | |a .b7595610x |b 05-23-17 |c 11-06-13 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2013 English International | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2013 English International | ||
999 | f | f | |i 07323e90-33ea-5ed9-b09e-7693ce3f1c6e |s 916ef5c9-cc52-5b58-9c90-ba7bde98158f |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TK5105.59 .S43 2013 |h Library of Congress classification |i Ebooks, Prospector |n 1 |