EC2ND 2005

Proceedings of the First European Conference on Computer Network Defence

By Andrew Blyth

EC2ND 2005 Cover Image

  • ISBN13: 978-1-8462-8311-6
  • 306 Pages
  • User Level: Science
  • Publication Date: December 31, 2007
  • Available eBook Formats: PDF
  • eBook Price: $115.00
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description
This book contains the First European Conference on Computer Network Defence to take place in December 2005 at the School of Computing, University of Glamorgan, in the UK. The theme of the conference is the protection of computer networks. The conference has drawn participants from national and international organisations. The following are a list of topics amongst those discussed: Computer Network Operations, Computer Network Attack, Network Application Security, Web Security, Vulnerability Management and Tracking, Network Forensics, Wireless and Mobile Security, Cryptography, Network Discovery and Mapping, Network Security, Intrusion Detection Systems, Incident Response and Management, Malicious Software, Network Architectures and Management, Legal and Ethical Issues. The papers presented include contributions from leading figures in the field and are a valuable source of reference for both researcher and practitioner.
Table of Contents

Table of Contents

  1. From the contents: Network Defence.
  2. Network Penetration Testing.
  3. A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks.
  4. Spam Honey Pot Research.
  5. Wireless and Ad Hoc Network Security.
  6. Taxonomy of Attacks on Wireless Sensor Networks.
  7. A Lightweight Identity Authentication Mechanism for Self
  8. Organizing Wireless Sensor Networks.
  9. Network Protocol Analysis and Cryptographic Applications.
  10. Attack on Undeniable Partially Blind Signatures.
  11. Evolutionary Approach in the Security Protocols Design.
  12. A Scalable Multi
  13. service Group Key Management Scheme.
  14. Intrusion Detection and Prevention.
  15. A Log
  16. Based Mining System for Network Node Correlation.
  17. Exploring Vulnerabilities of Agent
  18. based IDS: The Need for Agent Self
  19. defence.
  20. Detecting and Classifying Attacks in Computer Networks Using Feed
  21. Forward and Elman Neural Networks.
  22. Software for Security in Networked Environments.
  23. A Flexible, Open Source Software Architecture for Network
  24. Based Forensic Computing and Intelligence Gathering.
Errata

Please Login to submit errata.

No errata are currently published