EC2ND 2006

Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK

  • Andrew Blyth
  • Iain Sutherland

Table of contents

  1. Front Matter
    Pages i-vii
  2. Computer Network Defence

    1. Front Matter
      Pages 1-1
    2. Marco Prandini, Eugenio Faldella, Roberto Laschi
      Pages 13-22
    3. Attila Szentgyörgyi, András Korn
      Pages 23-32
    4. Wen Chen, Feiyu Lei, Fang Guo, Guang Chen
      Pages 33-42
    5. Andrew Blyth, Colin Williams, Ian Bryant, Harvey Mattinson
      Pages 53-60
  3. Digital Forensics & Incident Analysis

    1. Front Matter
      Pages 67-67
    2. Hamid Jahankhani, Amir Azam
      Pages 69-84
    3. Grigorios Fragkos, Vivienne Mee, Konstantinos Xynos, Olga Angelopoulou
      Pages 95-103
    4. Alastair D. Irons, Anastasia Konstadopoulou
      Pages 115-125

About these proceedings

Introduction

This book contains the proceedings of the Second European Conference on Computer Network Defence that took place in December 2006 at the Faculty of Advanced Technology, University of Glamorgan, in the UK.

The theme of the conference was the protection of computer networks, with contributions from both national and international participants reporting on research developments, as well as providing valuable insights in this area.

The book also incorporates the proceedings of the First Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), held in conjunction with EC2ND 2006.

Topics and issues discussed include:

Computer Network Operations

Computer Network Attack

Network Application Security

Network Forensics

Web Security

Vulnerability Management and Tracking

Network Defence

Wireless and Mobile Security

Cryptography

Network Discovery and Mapping

Network Security

Intrusion Detection Systems

Incident Response and Management

Computer Forensics Practice

Malicious Software Analysis

Network Architectures and Management

Legal and Ethical Issues

The papers presented include contributions from leading figures in the fields of network security and computer forensics, and are a valuable source of reference for both researchers and practitioners.

Keywords

Computerrecht EC2ND Internet Network Defence architecture network security organization security

Authors and affiliations

  • Andrew Blyth
    • 1
  • Iain Sutherland
    • 1
  1. 1.School of ComputingUniversity of GlamorganUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-84628-750-3
  • Copyright Information Springer-Verlag London 2007
  • Publisher Name Springer, London
  • eBook Packages Computer Science
  • Print ISBN 978-1-84628-749-7
  • Online ISBN 978-1-84628-750-3