Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
41
Includes index.
Selected conference papers.
Includes bibliographical references and index.
Analysis of denial of service attacks in IEEE 802.11s wireless mesh networks / Divya and Sanjeev Kumar -- A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar transformation / Fei Peng, Re-Si Guo, Chang-Tsun Li, and Min Long -- On the repudiability of device identification and image integrity verification using sensor pattern noise / Chang-Tsun Li, Chih-Yuan Chang, and Yue Li -- Virtualization efficacy for network intrusion detection systems in high speed environment / Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, and Pravin Mirchandani -- Face recognition using balanced pairwise classifier training / Ziheng Zhou, Samuel Chindaro, and Farzin Deravi -- Forensic investigation of the soft-modded PlayStation Portable (PSP) / Qin Zhou and Nigel Poole -- Smart logic-preventing packet loss in high speed network intrusion detection systems / Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan U. Awan, John Mellor, Andrea J. Cullen, and Pravin Mirchandani -- Parameter based access control model for mobile handsets / Dasun Weerasinghe, Raj Muttukrishnan, and Veselin Rakocevic -- Ethical dilemmas in teaching computer and internet security / Brian Tompsett -- Overview of SIP attacks and countermeasures / Fadi El-moussa, Parmindher Mudhar, and Andy Jones -- Security challenges in multihop wireless mesh networks : a survey / Divya and Sanjeev Kumar -- A security architecture to protect against data loss / Clive Blackwell -- A simple method for improving intrusion detections in corporate networks / Joshua Ojo Nehinbe -- Detecting sybils in peer-to-peer file replication systems / K. Haribabu, Chittaranjan Hota, and Saravana -- Adaptive clustering method for reclassifying network intrusions / Nehinbe Ojo Joshua -- Technology perspective : is green IT a threat to IT security? / Dimitrios Frangiskatos, Mona Ghassemian, and Diane Gan -- An adaptive fusion framework for fault-tolerant multibiometrics / S. Chindaro, Z. Zhou, M.W.R. Ng, and F. Deravi -- Cross-enterprise policy model for e-business web services security / Tanko Ishaya and Jason R.C. Nurse -- Challenges of identity management : a context in rural India / Rajanish Dass and Sujoy Pal.
0
Constitutes the post-conference proceedings of the First International Conference on Information Security and Digital Forensics, ISDF 2009, which was held in September 2009 in London, United Kingdom. These 19 papers present several security, identity and forensics challenges across the globe to address better the gap in the digital economy market.