Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

by Dasun Weerasinghe (Editor)

Paperback(2010)

$92.16 $99.00 Save 7% Current price is $92.16, Original price is $99. You Save 7%.
Choose Expedited Shipping at checkout for guaranteed delivery by Thursday, August 22

Overview

The LNICST series constitutes the publication platform for conferences, symposia and workshops sponsored by the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).

ICST is a non-profit society that aims to promote research and development in information and communication technologies and their advancement in business engineering and other fields of applications.

The scope of LNICST spans the whole gamut of topics covered by ICST, namely:

General Computer Science

E-Economy

E-Medicine

Knowledge Management

Law, Forensics

Multimedia

Social Informatics

Software and Hardware Systems

Telecommunications Engineering

The type of material published includes proceedings (published in time for the respective event) as well as post-workshop proceedings (consisting of thoroughly revised and/or extended full papers).

Product Details

ISBN-13: 9783642115295
Publisher: Springer Berlin Heidelberg
Publication date: 01/13/2010
Series: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , #41
Edition description: 2010
Pages: 185
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Analysis of Denial of Service Attacks in IEEE 802.lls Wireless Mesh Networks Divya Sanjeev Kumar 1

A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation Fei Peng Re-Si Guo Chang- Tsun Li Min Long 11

On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise Chang- Tsun Li Chin-Yuan Chang Yue Li 19

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment Monis Akhlaq Faeiz Alserhani Irfan U. Awan John Mellor Andrea J. Cullen Pravin Mirchandani 26

Face Recognition Using Balanced Pairwise Classifier Training Ziheng Zhou Samuel Chindaro Farzin Deravi 42

Forensic Investigation of the Soft-Modded PlayStation Portable (PSP) Qin Zhou Nigel Poole 50

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems Ahsan Subhan Monis Akhlaq Faeiz Alserhani Irfan U. Awan John Mellor Andrea J. Cullen Pravin Mirchandani 57

Parameter Based Access Control Model for Mobile Handsets Dasun Weerasinghe Raj Muttukrishnan Veselin Rakocevic 66

Ethical Dilemmas in Teaching Computer and Internet Security Brian Tompsett 76

Overview of SIP Attacks and Countermeasures Fadi El-moussa Parmindher Mudhar Andy Jones 82

Security Challenges in Multihop Wireless Mesh Networks-A Survey Divya Sanjeev Kumar 92

A Security Architecture to Protect Against Data Loss Clive Blackwell 102

A Simple Method for Improving Intrusion Detections in Corporate Networks Joshua Ojo Nehinbe 111

Detecting Sybils in Peer-to-Peer File Replication Systems K. Haribabu Chittaranjan Hota Saravana 123

Adaptive Clustering Method for Reclassifying Network Intrusions Nehinbe Ojo Joshua 135

Technology Perspective: Is Green IT a Threat to IT Security? Dimitrios Frangiskatos Mona Ghassemian Diane Gan 147

An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics S. Chindaro Z. Zhou M.W.R. Ng F. Deravi 155

Cross-Enterprise Policy Model for e-Business Web Services Security Tanko Ishaya Jason R.C. Nurse 163

Challenges of Identity Management - A Context in Rural India Rajanish Dass Sujoy Pal 172

Author Index 185

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews