EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence

EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence

by Andrew Blyth (Editor)

Paperback(2006)

$159.00
Use Standard Shipping. For guaranteed delivery by December 24, use Express or Expedited Shipping.

Product Details

ISBN-13: 9781846283116
Publisher: Springer London
Publication date: 03/10/2006
Edition description: 2006
Pages: 296
Product dimensions: 6.10(w) x 9.25(h) x 0.36(d)

Table of Contents

Network Defence.- Network Penetration Testing.- A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks.- Spam Honey Pot Research.- Privacy protection mechanism in grid environment.- Flow Label Filtering Feasibility.- The Representation and use of Relation Information for the Detection of Threats by Security Information Management Systems.- Intelligent real-time reactive Network Management.- Security in Passive Optical Network via Wavelength Hopping and Codes cycling techniques.- A Model of Deploying Deception in a Computer Network Operations (CNO) Environment.- Wireless & Ad Hoc Network Security.- Taxonomy of Attacks on Wireless Sensor Networks.- A Lightweight Identity Authentication Mechanism for Self-Organizing Wireless Sensor Networks.- Modelling the Spread of Computer Worms in Vehicular Ad-Hoc Networks.- Wily Attackers seek wireless networks in Perth, Western Australia for easy targets.- Investigating Authentication schemes in Wireless IP network.- Network Protocol Analysis & Cryptographic Applications.- Attack on Undeniable Partially Blind Signatures.- Evolutionary Approach in the Security Protocols Design.- A Scalable Multi-service Group Key Management Scheme.- Improvement of Adaptive Threshold RSA.- Intrusion Detection & Prevention.- A Log-Based Mining System for Network Node Correlation.- Exploring Vulnerabilities of Agent-based IDS: The Need for Agent Self-defence.- Detecting and Classifying Attacks in Computer Networks Using Feed-Forward and Elman Neural Networks.- Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications.- Design and Implementation of a Fast String Matcher Utilizing Content Addressable Memory.- Zero hour outbreak prevention using distributed traffic anomaly detection.- Mediating Hosts' malicious Character.- Masquerade Detection by Using Activity Patterns.- Softwarefor Security in Networked Environments.- A Flexible, Open Source Software Architecture for Network-Based Forensic Computing & Intelligence Gathering.- Protecting Distributed Object Applications from Corruption of Class Bytecodes on Client Side.- Modelling and Construction of Web Services Security.- Improving Software Security through a RBAC-based Unified User Interface.- Normalising Events into Incidents Using Unified Intrusion Detection-Related Data

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews