Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings / Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba (eds.)

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The p...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: SecNet (Conference) Cairo, Egypt)
Other Authors: Awad, Ali Ismail (Editor), Hassanien, Aboul Ella (Editor), Baba, Kensuke (Editor)
Format: Conference Proceeding eBook
Language:English
Published: Heidelberg : Springer, [2013]
Series:Communications in computer and information science ; 381.
Subjects:
Table of Contents:
  • Networking Security. NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study / Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión
  • Clustering Based Group Key Management for MANET / Ayman El-Sayed
  • Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN / Alyaa Amer, Ayman Abdel-Hamid, Mohamad Abou El-Nasr
  • Hardware Advancements Effects on MANET Development, Application and Research / Amr ElBanna [and others]
  • A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing / Khurram Shahzad, Steve Woodhead, Panos Bakalis
  • A Categorized Trust-Based Message Reporting Scheme for VANETs / Merrihan Monir, Ayman Abdel-Hamid, Mohammed Abd El Aziz.
  • Data and Information Security. Blind Watermark Approach for Map Authentication Using Support Vector Machine / Mourad Raafat Mouhamed [and others]
  • High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression / Mohamed Waleed Fakhr
  • An HMM-Based Reputation Model / Ehab ElSalamouny, Vladimiro Sassone
  • Towards IT-Legal Framework for Cloud Computing / Sameh Hussein, Nashwa Abdelbaki
  • A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps / Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi
  • Authentication and Privacy. A Cattle Identification Approach Using Live Captured Muzzle Print Images / Ali Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa
  • Algebraic Replay Attacks on Authentication in RFID Protocols / Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed.
  • A Privacy Preserving Approach to Smart Metering / Merwais Shinwari, Amr Youssef, Walaa Hamouda
  • Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware / Ammar Alazab [and others]
  • Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study / Mohamed Alfateh Badawy, Nawal El-Fishawy, Osama Elshakankiry
  • Security Applications. Elderly Healthcare Data Protection Application for Ambient Assisted Living / Qing Tan [and others]
  • A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics / Miguel Salas
  • Machine Learning Techniques for Anomalies Detection and Classification / Amira Sayed Abdel-Aziz [and others]
  • Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing / Nor Fatimah Awang, Azizah Abd Manaf
  • Linear Correlation-Based Feature Selection for Network Intrusion Detection Model / Heba F. Eid [and others]