2006

EC2ND 2005

Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK

Editors:

ISBN: 978-1-84628-311-6 (Print) 978-1-84628-352-9 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Network Defence

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-12

      Network Penetration Testing

    3. No Access

      Book Chapter

      Pages 13-22

      A Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding DoS Attacks

    4. No Access

      Book Chapter

      Pages 23-32

      Spam Honey Pot Research

    5. No Access

      Book Chapter

      Pages 33-39

      Privacy Protection Mechanism in Grid Computing Environment

    6. No Access

      Book Chapter

      Pages 41-49

      Flow Label Filtering Feasibility

    7. No Access

      Book Chapter

      Pages 51-60

      The Representation and use of Relation Information for the Detection of Threats by Security Information Management Systems

    8. No Access

      Book Chapter

      Pages 61-72

      Intelligent real-time reactive Network Management

    9. No Access

      Book Chapter

      Pages 73-82

      Security in Passive Optical Network via Wavelength Hopping and Codes cycling techniques

    10. No Access

      Book Chapter

      Pages 83-93

      A Model of Deploying Deception in a Computer Network Operations (CNO) Environment

  2. Wireless & Ad Hoc Network Security

    1. Front Matter

      Pages 95-95

    2. No Access

      Book Chapter

      Pages 97-105

      Taxonomy of Attacks on Wireless Sensor Networks

    3. No Access

      Book Chapter

      Pages 107-114

      A Lightweight Identity Authentication Mechanism for Self-Organizing Wireless Sensor Networks

    4. No Access

      Book Chapter

      Pages 115-124

      Modelling the Spread of Computer Worms in Vehicular Ad Hoc Networks

    5. No Access

      Book Chapter

      Pages 125-136

      Wily Attackers Seek Wireless Networks in Perth, Western Australia for Easy Targets

  3. Network Protocol Analysis & Cryptographic Applications

    1. Front Matter

      Pages 137-137

    2. No Access

      Book Chapter

      Pages 139-146

      Attack on Undeniable Partially Blind Signatures

    3. No Access

      Book Chapter

      Pages 147-156

      Evolutionary Approach in the Security Protocols Design

    4. No Access

      Book Chapter

      Pages 157-164

      Improvement of Adaptive Threshold RSA

  4. Intrusion Detection & Prevention

    1. Front Matter

      Pages 165-165

    2. No Access

      Book Chapter

      Pages 167-176

      A Log-Based Mining System for Network Node Correlation

    3. No Access

      Book Chapter

      Pages 177-185

      Exploring Vulnerabilities of Agent-Based Ids: The Need for Agent Self-Defence

    4. No Access

      Book Chapter

      Pages 187-196

      Detecting and Classifying Attacks in Computer Networks Using Feed-Forward and Elman Neural Networks

    5. No Access

      Book Chapter

      Pages 197-206

      Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications

previous Page of 2