THE WORLD CONGRESS IN COMPUTER SCIENCE, COMPUTER ENGINEERING,
AND APPLIED COMPUTING

The 2017 WorldComp International Conference Proceedings Series Read Description

Security and Management

Paperback
February 2018
9781601324672
More details
  • Publisher
    CSREA
  • Published
    1st February 2018
  • ISBN 9781601324672
  • Language English
  • Pages 396 pp.
  • Size 8" x 11"
$99.95
E-Book

E-books are now distributed via VitalSource

VitalSource offer a more seamless way to access the ebook, and add some great new features including text-to-voice. You own your ebook for life, it is simply hosted on the vendor website, working much like Kindle and Nook. Click here to see more detailed information on this process.

March 2018
9781683922001
More details
  • Publisher
    CSREA
  • Published
    6th March 2018
  • ISBN 9781683922001
  • Language English
  • Pages 396 pp.
  • Size 8" x 11"
$59.95

This volume contains the proceedings of the 2017 International Conference on Security and Management (SAM'17).

NETWORK SECURITY
A Visual Approach to Data Fusion in Sensor Networks
Protection from Black Hole Attacks in Communication Networks
A Survey on Wireless Security Protocol WPA2
MAC address based Sensor Network Authentication: Survey

CRYPTOGRAPHIC TECHNOLOGIES I
Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment
IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers
A New Key Management And Authentication Architecture For ZigBee Networks (KAAZ)
Threshold Secret Sharing based on 3D-Cellular Automata
Evaluation of Highly Efficient Scalar Multiplication in Elliptic Curve Cryptography

SECURITY MANAGEMENT + BIOMETRICS + HARDWARE SECURITY
A Study on Korea's Information Security Management System: An Insider Threat Perspective
NOAH for IoT: Cybersecurity Strategy for Home Applications
Cloud Solution for Management and Security in Temporary Reception Centres
A High-order Masking Approach for CLEFIA Implementation on FPGA and Intel

SECURITY EDUCATION
Building a Gh0st Malware Experimentation Environment
Undergraduate Software Engineering Experience Developing an Authentication System
Steganography - Capstone Experience Project
Building a Virtual Enterprise Network Environment for APT Experimentation
Applying Security to Moodle Grades
Analyzing and Improving the NCL Ethical Hacking Lab Exercises

INFORMATION ASSURANCE
The Significance of Information Security Risk Assessments: Exploring the Consensus of Raters' Perceptions of Probability and Severity
Backup Monitoring in Large Heterogeneous Business Cloud Computing Environments: A Framework for the Development of a Reliable Automated Process
Efficient Isolation Enabled Role-Based Access Control for Database Systems
Minimal TCB for System-Model Execution

SECURITY APPLICATIONS
Privacy-Enhanced and Fair Matchmaking System - Applications and Analysis of Protocol, Architecture, and Performance
A Framework for Web Applications Security and Response System
Improved Reversible Data hiding using Mean Values in an Encrypted Image
Using Pattern Filtering to Detect Cross-Site Attacks
Virtual Keyboard Logging Counter-measures using Common Fate's Law

COMPUTER SECURITY I
A Light-weight Method to Send and Receive SMS Messages in an Emulator
Android-App-Dissection on the Wandboard - Automatic Analysis of Malicious Mobile Code
Model for Autonomous Correlation of Intrusion Detection State Variables over Spatial, Temporal, and Ontological Domains
Examining Features for Android Malware Detection
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling

COMPUTER SECURITY II
Using IDS to prevent XSS Attacks
Comparison of SVMs with Radial-Basis function and Polynomial Kernels in Classification of Categories in Intrusion Detection
Formal Specification and Verification of Firewall using TLA+
Probabilistic Deception and Attacker Experimentation

POSTER PAPERS
Dynamic Scalable ECC Scheme and Its Application to Encryption Workflow Design
An Analysis of Intrusion Prevention Data Against HPC Services in KISTI
A Chaining User Authentication with Distributed Clustering in the IoT Environment
Cost Integrated Schemes for Decoy Deployment in Virtualized Cloud Services Protection
Vulnerability Analysis and Attacks on Intel Xeon Phi Coprocessor

LATE PAPERS - SECURITY MANAGEMENT
Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Kevin Daimi

No information

Hamid R. Arabnia

Hamid R. Arabnia is Professor, Computer Science; Editor-in-Chief, The Journal of Supercomputing (Springer); Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM); The University of Georgia, Department of Computer Science.