Weerasinghe, Dasun
Information Security and Digital Forensics
1. Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
Divya, Sanjeev Kumar
2. A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
Fei Peng, Re-Si Guo, Chang-Tsun Li, Min Long
3. On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
Chang-Tsun Li, Chih-Yuan Chang, Yue Li
4. Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment
Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani
5. Face Recognition Using Balanced Pairwise Classifier Training
Ziheng Zhou, Samuel Chindaro, Farzin Deravi
6. Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)
Qin Zhou, Nigel Poole
7. Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems
Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani
8. Parameter Based Access Control Model for Mobile Handsets
Dasun Weerasinghe, Raj Muttukrishnan, Veselin Rakocevic
9. Ethical Dilemmas in Teaching Computer and Internet Security
Brian Tompsett
10. Overview of SIP Attacks and Countermeasures
Fadi El-moussa, Parmindher Mudhar, Andy Jones
11. Security Challenges in Multihop Wireless Mesh Networks–A Survey
Divya, Sanjeev Kumar
12. A Security Architecture to Protect Against Data Loss
Clive Blackwell
13. A Simple Method for Improving Intrusion Detections in Corporate Networks
Joshua Ojo Nehinbe
14. Detecting Sybils in Peer-to-Peer File Replication Systems
K. Haribabu, Chittaranjan Hota, Saravana
15. Adaptive Clustering Method for Reclassifying Network Intrusions
Nehinbe Ojo Joshua
16. Technology Perspective: Is Green IT a Threat to IT Security?
Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan
17. An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics
S. Chindaro, Z. Zhou, M. W. R. Ng, F. Deravi
18. Cross-Enterprise Policy Model for e-Business Web Services Security
Tanko Ishaya, Jason R. C. Nurse
19. Challenges of Identity Management – A Context in Rural India
Rajanish Dass, Sujoy Pal
Nyckelord: Computer Science, Systems and Data Security, Computer Communication Networks, Biometrics, Data Encryption, Data Structures, Cryptology and Information Theory, Data Structures
- Författare
- Weerasinghe, Dasun
- Utgivare
- Springer
- Utgivningsår
- 2010
- Språk
- en
- Utgåva
- 1
- Serie
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9783642115301