Skip to main content
  • Conference proceedings
  • © 2006

EC2ND 2005

Proceedings of the First European Conference on Computer Network Defence

Editors:

  • Proceedings of the first European Conference on Computer Network Defence

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

    Pages I-IX
  2. Network Defence

    1. Front Matter

      Pages 1-1
    2. Network Penetration Testing

      • Liwen He, Nikolai Bode
      Pages 3-12
    3. Spam Honey Pot Research

      • Liam Meany
      Pages 23-32
    4. Privacy Protection Mechanism in Grid Computing Environment

      • MingChu Li, Hongyan Yao, Cheng Guo, Na Zhang
      Pages 33-39
    5. Flow Label Filtering Feasibility

      • Orla McGann, David Malone
      Pages 41-49
    6. Intelligent real-time reactive Network Management

      • Abhishek Jain, Guillaume Andreys, G. Sivakumar
      Pages 61-72
  3. Wireless & Ad Hoc Network Security

    1. Front Matter

      Pages 95-95
    2. Taxonomy of Attacks on Wireless Sensor Networks

      • Song Han, Elizabeth Chang, Li Gao, Tharam Dillon
      Pages 97-105
  4. Network Protocol Analysis & Cryptographic Applications

    1. Front Matter

      Pages 137-137
    2. Attack on Undeniable Partially Blind Signatures

      • Song Han, Elizabeth Chang, Jie Wang
      Pages 139-146
    3. Improvement of Adaptive Threshold RSA

      • Feiyu Lei, Wen Chen, Kefei Chen
      Pages 157-164

About this book

This book contains the First European Conference on Computer Network Defence to take place in December 2005 at the School of Computing, University of Glamorgan, in the UK.

The theme of the conference is the protection of computer networks. The conference has drawn participants from national and international organisations.

The following are a list of topics amongst those discussed: Computer Network Operations, Computer Network Attack, Network Application Security, Web Security, Vulnerability Management and Tracking, Network Forensics, Wireless and Mobile Security, Cryptography, Network Discovery and Mapping, Network Security, Intrusion Detection Systems, Incident Response and Management, Malicious Software, Network Architectures and Management, Legal and Ethical Issues.

The papers presented include contributions from leading figures in the field and are a valuable source of reference for both researcher and practitioner.

Editors and Affiliations

  • School of Computing, University of Glamorgan, UK

    Andrew Blyth

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access