Login

Weerasinghe, Dasun

Information Security and Digital Forensics

Weerasinghe, Dasun - Information Security and Digital Forensics, ebook

57,10€

Ebook, PDF with Adobe DRM
ISBN: 9783642115301
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
Divya, Sanjeev Kumar

2. A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long

3. On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
Chang-Tsun Li, Chih-Yuan Chang, Yue Li

4. Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment
Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani

5. Face Recognition Using Balanced Pairwise Classifier Training
Ziheng Zhou, Samuel Chindaro, Farzin Deravi

6. Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)
Qin Zhou, Nigel Poole

7. Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems
Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani

8. Parameter Based Access Control Model for Mobile Handsets
Dasun Weerasinghe, Raj Muttukrishnan, Veselin Rakocevic

9. Ethical Dilemmas in Teaching Computer and Internet Security
Brian Tompsett

10. Overview of SIP Attacks and Countermeasures
Fadi El-moussa, Parmindher Mudhar, Andy Jones

11. Security Challenges in Multihop Wireless Mesh Networks–A Survey
Divya, Sanjeev Kumar

12. A Security Architecture to Protect Against Data Loss
Clive Blackwell

13. A Simple Method for Improving Intrusion Detections in Corporate Networks
Joshua Ojo Nehinbe

14. Detecting Sybils in Peer-to-Peer File Replication Systems
K. Haribabu, Chittaranjan Hota, Saravana

15. Adaptive Clustering Method for Reclassifying Network Intrusions
Nehinbe Ojo Joshua

16. Technology Perspective: Is Green IT a Threat to IT Security?
Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan

17. An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics
S. Chindaro, Z. Zhou, M. W. R. Ng, F. Deravi

18. Cross-Enterprise Policy Model for e-Business Web Services Security
Tanko Ishaya, Jason R. C. Nurse

19. Challenges of Identity Management – A Context in Rural India
Rajanish Dass, Sujoy Pal

Keywords: Computer Science, Systems and Data Security, Computer Communication Networks, Biometrics, Data Encryption, Data Structures, Cryptology and Information Theory, Data Structures

Similar titles