Cyberspace Safety and Security

4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings

  • Yang Xiang
  • Javier Lopez
  • C.-C. Jay Kuo
  • Wanlei Zhou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)

Table of contents

  1. Front Matter
  2. CSS 2012 Regular Papers

    1. Session 1: Mobile Security

      1. Alexandre Braga, Rafael Cividanes, Ismael Ávila, Claudia Tambascia
        Pages 21-32
      2. Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana Cavalli
        Pages 33-47
    2. Session 2: Cyberspace Attacks and Defense

      1. Yong Feng, Bo Wang, Fengling Han, Xinghuo Yu, Zahir Tari
        Pages 57-65
      2. Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor
        Pages 77-92
    3. Session 3: Security Applications and Systems

      1. Mark Stegelmann, Dogan Kesdogan
        Pages 93-107
      2. Daniel Angermeier, Konstantin Böttinger, Andreas Ibing, Dieter Schuster, Frederic Stumpf, Dirk Wacker
        Pages 108-122
      3. Geng Yang, Qiang Zhou, Xiaolong Xu, Jian Xu, Chunming Rong
        Pages 123-138
      4. Ferdous A. Barbhuiya, Tonmoy Saikia, Sukumar Nandi
        Pages 139-152
    4. Session 4: Network and Cloud Security

      1. Han Fei, Qin Jing, Zhao Huawei, Hu Jiankun
        Pages 165-178
      2. Luca Ferretti, Michele Colajanni, Mirco Marchetti
        Pages 179-193
      3. Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai
        Pages 212-226
      4. Craig Valli
        Pages 227-235
    5. Session 5: Security Models

      1. Nimalaprakasan Skandhakumar, Farzad Salim, Jason Reid, Ed Dawson
        Pages 236-250

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Symposium  on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012.
The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Keywords

cyber-crime fingerprint middleware publish/subscribe watermark

Editors and affiliations

  • Yang Xiang
    • 1
  • Javier Lopez
    • 2
  • C.-C. Jay Kuo
    • 3
  • Wanlei Zhou
    • 1
  1. 1.School of Information TechnologyDeakin UniversityBurwoodAustralia
  2. 2.Computer Science Department, ETSI InformaticaUniversity of MalagaMalagaSpain
  3. 3.Ming Hsieh Department of Electrical EngineeringUniversity of Southern CaliforniaLos AngelesUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-35362-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35361-1
  • Online ISBN 978-3-642-35362-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book