International Conference on Applications and Techniques in Cyber Security and Intelligence

Applications and Techniques in Cyber Security and Intelligence

  • Jemal Abawajy
  • Kim-Kwang Raymond Choo
  • Rafiqul Islam

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 580)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Huan Du, Zheng Xu, Yong Ding
    Pages 1-7
  3. Yuliang Zhao, Peng Wang, Wei Wang, Lingling Hu, Xu Xu
    Pages 21-27
  4. YuXin Cai, Chen Liang, ZhiWei Tang, Huosheng Li, Siliang Gong
    Pages 42-50
  5. YuXin Cai, Chen Liang, ZhiWei Tang, Huosheng Li
    Pages 51-59
  6. Jun Ye, Zheng Xu, Yong Ding
    Pages 60-66
  7. Huakang Li, Yuhao Dai, Xu Jin, Guozi Sun, Tao Li, Zheng Xu
    Pages 67-72
  8. Xinzhi Wang, Hui Zhang
    Pages 73-79
  9. Jie Yu, Chao Tao, Lingyu Xu, Fangfang Liu
    Pages 98-107
  10. Li Li, Xiao Wei, Zheng Xu
    Pages 108-115
  11. Duan Huixian, Wang Jun, Song Lei, Zhao Yixin, Na Liu
    Pages 116-121
  12. Kaiwen Gu, Huakang Li, Guozi Sun
    Pages 122-127
  13. Na Liu, Huixian Duan, Lei Song, Zhiguo Yan
    Pages 140-145
  14. Dianbo Li, Xiaoteng Zhang, Lei Song, Yixin Zhao
    Pages 146-153
  15. Kui Wang
    Pages 161-167
  16. Yixin Zhao, Jie Shao, Dianbo Li, Lin Mei
    Pages 168-176
  17. Pinaki Sarkar, Sukumar Nandi, Morshed Uddin Chowdhury
    Pages 194-205
  18. Junaid Chaudhry, Samaneh Farmand, Syed M. S. Islam, Md. Rafiqul Islam, Peter Hannay, Craig Valli
    Pages 220-237
  19. Khandakar Rabbi, Quazi Mamun, Md. Rafiqul Islam
    Pages 238-246
  20. Khandakar Rabbi, Quazi Mamun, Md. Rafiqul Islam
    Pages 247-255
  21. Rumana Nazmul, Md. Rafiqul Islam, Ahsan Raja Chowdhury
    Pages 256-265
  22. Mozammel Chowdhury, Azizur Rahman, Rafiqul Islam
    Pages 266-274
  23. Lei Song, Jie Dai, Huixian Duan, Zheyuan Liu, Na Liu
    Pages 275-280
  24. Hussein Alnabulsi, Rafiqul Islam, Qazi Mamun
    Pages 281-292
  25. Weikai Gu, Yingzhen Huang, Rongxin Qian, Zheyuan Liu, Rongjie Gu
    Pages 293-303
  26. Pinaki Sarkar, Morshed Uddin Chowdhury, Jemal Abawajy
    Pages 315-328
  27. Shanshan Ge, Peng Zeng, Kim-Kwang Raymond Choo
    Pages 329-337
  28. Rushank Shetty, Kim-Kwang Raymond Choo, Robert Kaufman
    Pages 338-350
  29. Tao Liao, Tianqi Liu, Shunxiang Zhang, Zongtian Liu
    Pages 351-360
  30. Liangbin Zhang, Yuanming Wang, Ran Jin, Shaozhong Zhang, Kun Gao
    Pages 370-379
  31. Guangli Zhu, Hanran Liu, Shunxiang Zhang
    Pages 380-387
  32. Xiaolu Deng, Shunxiang Zhang, Hongze Zhu
    Pages 394-400

About these proceedings


This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence.


Intelligent Systems Computational Intelligence Cybersecurity Intelligence Cybersecurity Analytics Privacy Preserving Digital Forensics

Editors and affiliations

  • Jemal Abawajy
    • 1
  • Kim-Kwang Raymond Choo
    • 2
  • Rafiqul Islam
    • 3
  1. 1.Faculty of Science, Engineering and Built EnvironmentDeakin UniversityGeelongAustralia
  2. 2.Department of Information Systems and Cyber SecurityThe University of Texas at San AntonioSan AntonioUSA
  3. 3.School of Computing and MathematicsCharles Sturt UniversityAlburyAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2018
  • Publisher Name Edizioni della Normale, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-67070-6
  • Online ISBN 978-3-319-67071-3
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365
  • Buy this book on publisher's site