Limit search to available items
Book Cover
E-book
Author ATIS (Conference) (5th : 2014 : Melbourne, Vic.)

Title Applications and techniques in information security : 5th international conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014 : proceedings / Lynn Batten [and 3 others], (eds.)
Published New York : Springer, [2014]

Copies

Description 1 online resource (xi, 266 pages)
Series Communications in computer and information science ; 490
Communications in computer and information science ; 490.
Contents Applications -- System-Level Permission Management Mechanism of Android Device / Dali Zhu, Zheming Fan, Na Pang -- Enhancing Security of the Android Platform via Multi-level Security Model / Ji-Soo Oh, Min-Woo Park and Tai-Myoung Chung -- A Competitive Three-Level Pruning Technique for Information Security / Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev and Kouichi Sakurai -- Popularity Prediction of Tianya BBS Posts Based on User Behavior / Ge Li, Yue Hu and Yanyu Yu -- Design and Implementation of Network User Behaviors Analysis Based on Hadoop for Big Data / Jianfeng Guan, Su Yao, Changqiao Xu and Hongke Zhang -- The Research of Extraction Algorithm for Target Feature of Chest Bitmap / Tianshi Liu, Ruixiang Liu, Hongwei Wang, Liumei Zhang and Cailing Wang -- A Method for Detecting Trojan Based on Hidden Network Traffic Analysis / Zhiwen Chen, Yizheng Tao and Gongliang Li -- A Survey on Encrypted Traffic Classification / Zigang Cao, Gang Xiong, Yong Zhao, Zhenzhen Li and Li Guo -- Curbing Cyber Crimes -- An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm / Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan and Li Guo -- Modeling and Analysis of Network Survivability under Attack Propagation / Su Yao, Jianfeng Guan, Shuwei Ding, Hongke Zhang and Fei Song -- A Scalable Approach for Vulnerability Discovery Based on Security Patches / Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon and Heejo Lee -- Modeling the Effect of Infection Time on Active Worm Propagations / Hui Liu, Xiaolong Ma, Tianzuo Wang, Bo Ding and Qiang Lu -- Data Privacy -- Location Privacy Preserving for Semantic-Aware Applications / Lefeng Zhang, Ping Xiong and Tianqing Zhu -- Analysis on the Reliability of Non-repairable and Repairable Network Storage Systems / MingYong Yin, Chun Wu and YiZheng Tao -- Homomorphic Cryptography-Based Privacy-Preserving Network Communications / Antoine Guellier, Christophe Bidan and Nicolas Prigent -- The 0-1 Knapsack Polytope -- A Starting Point for Cryptanalysis of Knapsack Ciphers? / Vicky H. Mak-Hau and Lynn M. Batten -- Digital Forensics -- Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com / Michael Monnik and Lei Pan -- A Novel Method for Detecting Double Compressed Facebook JPEG Images / Allan NG, Lei Pan and Yang Xiang -- Using Randomization to Attack Similarity Digests / Jonathan Oliver, Scott Forman and Chun Cheng -- Research of Password Recovery Method for RAR Based on Parallel Random search / Liang Ge and Lianhai Wang -- Security Implementations -- Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network / Wei Ma, Sen-Zhe Hu, Qiong Dai, Ting-Ting Wang and Yin-Fei Huang -- PAITS: Detecting Masquerader via Short-Lived Interventional Mouse Dynamics / Xiao-jun Chen, Jin-qiao Shi, Rui Xu, S.M. Yiu, Bing-xing Fang and Fei Xu -- Social Engineering through Social Media: An Investigation on Enterprise Security / Heidi Wilcox, Maumita Bhattacharya and Rafiqul Islam -- Efficient Key Pre-distribution for 6LoWPAN / Ruben Smeets, Nele Mentens, Kris Aerts, Dave Singelée, An Braeken, Matthias Carlier [and 3 others]
Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations
Summary This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Internet -- Security measures -- Congresses
Computer networks -- Security measures -- Congresses
Information storage and retrieval systems -- Security measures -- Congresses
Computer networks -- Security measures
Information storage and retrieval systems -- Security measures
Internet -- Security measures
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Batten, Lynn Margaret, editor
ISBN 9783662456705
3662456702
Other Titles ATIS 2014