THE WORLD CONGRESS IN COMPUTER SCIENCE, COMPUTER ENGINEERING,
AND APPLIED COMPUTING

Paperback
May 2015
9781601322593
More details
  • Publisher
    CSREA
  • Published
    1st May 2015
  • ISBN 9781601322593
  • Language English
  • Pages 512 pp.
  • Size 8" x 11"
$59.95

Security and Management is a compendium of articles and papers that were presented at SAM '13, an international conference that serves researchers, scholars, professionals, students, and academicians.

Selected topics include:

* Security Management, Security Education, and Hardware Security
* Biometric And Forensics
* Computer Security
* Information Assurance
* Cryptographic Technologies
* Systems Engineering and Security
* Computer and Network Security
* Network Security
* Cybersecurity Education
* Cryptography + Malware and Spam Detection + Network Security and Cyber Security Education

SESSION: SECURITY MANAGEMENT, SECURITY EDUCATION, AND HARDWARE SECURITY I
1) Most Successful Vulnerability Discoverers: Motivation and Methods
2) Using Client-Side JavaScript to Mitigate Drive-by-Downloads
3) Secure NAND Flash Architecture Resilient to Strong Fault-Injection Attacks Using Algebraic Manipulation Detection Code

SESSION: BIOMETRIC AND FORENSICS
1) Fingerprinting Malware using Bioinformatics Tools Building a Classifier for the Zeus Virus
2) Combination of Fingerprint and Password system
3) A Biometric Authentication System That Automatically Generates Feature Points
4) A Biometric Security Model with Identities Detection and Local Feature-level Fusion
5) Framework for Next Generation Digital Forensics Models

SESSION: COMPUTER SECURITY I
1) Distributed Snort Network Intrusion Detection System with Load Balancing Approach
2) An Integrated Approach to Defence Against Degrading Application-Layer DDoS Attacks
3) QR Code Steganography
4) Dynamic Analysis of Malicious Code and Response System
5) Security Standards and Best Practices for Quantum Key Distribution
6) Detecting the Insider Threat: Going Beyond the Network Layer

SESSION: INFORMATION ASSURANCE
1) Java Design Pattern Obfuscation
2) A Synthetic Solution Scheme for SOA Security Assurance
3) Mandatory Access Control for Web Applications and Workflows
4) Decision Support for Assessment of IT-Security Risks
5) Creating Stronger Yet Easily Pronounceable Passwords
6) A Flexible Role-Based Delegation Model with Dynamic Delegation Role Structure
7) A User-Centric Privacy-Aware Protection System

SESSION: CRYPTOGRAPHIC TECHNOLOGIES I
1) Performance Evaluation of Asymmetric Encryption Algorithms in Embedded Platforms used in WSN
2) Implementing the ECC Brainpool curve generation procedure using open source software
3) Power and Electromagnetic Analysis Attack on a Smart Card Implementation of CLEFIA
4) Prime Base, Prime Moduli PRN Generator
5) Verifiable Symmetric Searchable Encryption for Multiple Groups of Users
6) Verifiable Dynamic Multi-Secret Sharing Scheme

SESSION: CRYPTOGRAPHIC TECHNOLOGIES II
1) Towards An Efficient Protocol for Privacy and Authentication in Wireless Networks
2) A Robust User Authentication Scheme for Multi- Server Environment Using Smart Cards
3) Secure Wireless Fax Module
4) Elliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks
5) Securing RTP Packets using Persistent Packet Key Encryption Scheme for Real-time Multimedia Applications
6) Using Secure Multi-party Computation when Processing Distributed Health Data

SESSION: SPECIAL TRACK ON SYSTEMS ENGINEERING AND SECURITY
1) A New Quasigroup Based Random Number Generator
2) A Systems Engineering Approach for Assured Cyber Systems

SESSION: SECURITY APPLICATIONS
1) A Self-Protecting Security Framework for CDA Documents
2) Multi-Applications Secure Mobile Platform
3) Multi-Vendor PayWord with Payment Approval
4) Social Networks Steganography using Unions of Lucas Sequences
5) Inter-Cloud Trust Model Security: Issues and Challenges

SESSION: SECURITY MANAGEMENT, SECURITY EDUCATION, AND HARDWARE SECURITY II
1) Securing the Bolts before the Horse has Bolted: A new Perspective on Managing Collaborative Assurance
2) Anonymous Retrieval of k-NN POI in Location Based Services (LBS
3) Cyber-security Defense in Large-scale M2M System Actual Issues and Proposed Solutions

SESSION: COMPUTER SECURITY II
1) Pictorial Presentation of Computer Behavior and Fault Detection Automation Using Genetic Algorithm
2) Correlation Analysis of Cyber Threat Information in Heterogeneous Security Systems
3) Towards a Service Migration Architecture for Service Availability
4) FAPA: A Model to Prevent Flooding Attacks in Clouds

SESSION: COMPUTER AND NETWORK SECURITY
1) Mobile Root Exploit Detection based on System Events Extracted from Android Platform
2) ASNM: Advanced Security Network Metrics for Attack Vector Description
3) Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
4) A High-Throughput and Low-Complexity Secure Linear Network Coding Protocol
5) A practical study of the problems of current Internet routing tables

SESSION: NETWORK SECURITY I
1) Private Proximity Testing for Location Based Services
2) DROP-FAST: Defending against DDoS Attacks using Cloud Technology
3) Simplified Network Traffic Visualization for Real-Time Security Analysis
4) Challenges of Kerberos Variance with High QoS Expectations

SESSION: NETWORK SECURITY II
1) Port Knocking- An Additional Layer of Security for SSH and HTTPS
2) Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Services
3) Privacy-Aware Proximity Based Service Using Hide and Crypt Protocol: Implementation

SESSION: CYBERSECURITY EDUCATION
1) The 2013 NECCDC - Lessons Learned
2) Experiences with the Promise and Potential of Service-Learning in an Online Information Security Curriculum
3) Visualizing Cybersecurity Events
4) XSS Cookie Injection Covert Channel
5) Composite Covert Channels through EVE Online
6) SSDP Covert Channel

SESSION: POSTERS
1) Integrative Security for JavaEE Web Applications
2) HPA Lab: An Open-Source Educational Tool to Explore Host Protected Areas Under Linux
3) An Automatic Botnet Detection and Notification System in Taiwan
4) Design and Implementation of Broker System for Protect Privacy Information

SESSION: POSITION PAPERS + CRYPTOGRAPHY + MALWARE AND SPAM DETECTION + NETWORK SECURITY AND CYBER SECURITY EDUCATION
1) Feature Reduction for Optimum SMS Spam Filtering Using Domain Knowledge
2) Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security
3) Multi-disciplinary Approach to Cyber Security Education
4) A Load Service Structure Using a P2P Network Based Reputation System in Ad-hoc Networks
5) DES Based Educational Encryption System
6) Android Malware Detection Using Library API Call Tracing and Semantic-Preserving Signal Processing Techniques

Kevin Daimi

No information

Hamid R. Arabnia

Hamid R. Arabnia is Professor, Computer Science; Editor-in-Chief, The Journal of Supercomputing (Springer); Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM); The University of Georgia, Department of Computer Science.

Michael R. Grimaila

No information

Kathy Liszka

No information

George Markowsky

No information

Ashu M. G. Solo

Ashu M. G. Solo