Applications and Techniques in Information Security

5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings

  • Lynn Batten
  • Gang Li
  • Wenjia Niu
  • Matthew Warren
Conference proceedings ATIS 2014
Part of the Communications in Computer and Information Science book series (CCIS, volume 490)

Table of contents

  1. Front Matter
  2. Applications

    1. Dali Zhu, Zheming Fan, Na Pang
      Pages 1-12
    2. Ji-Soo Oh, Min-Woo Park, Tai-Myoung Chung
      Pages 13-24
    3. Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai
      Pages 25-32
    4. Jianfeng Guan, Su Yao, Changqiao Xu, Hongke Zhang
      Pages 44-55
    5. Tianshi Liu, Ruixiang Liu, Hongwei Wang, Liumei Zhang, Cailing Wang
      Pages 56-64
    6. Zhiwen Chen, Yizheng Tao, Gongliang Li
      Pages 65-72
    7. Zigang Cao, Gang Xiong, Yong Zhao, Zhenzhen Li, Li Guo
      Pages 73-81
  3. Curbing Cyber Crimes

    1. Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan, Li Guo
      Pages 82-95
    2. Su Yao, Jianfeng Guan, Shuwei Ding, Hongke Zhang, Fei Song
      Pages 96-108
    3. Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee
      Pages 109-122
    4. Hui Liu, Xiaolong Ma, Tianzuo Wang, Bo Ding, Qiang Lu
      Pages 123-134
  4. Data Privacy

    1. Lefeng Zhang, Ping Xiong, Tianqing Zhu
      Pages 135-146
    2. Antoine Guellier, Christophe Bidan, Nicolas Prigent
      Pages 159-170
  5. Digital Forensics

    1. Allan NG, Lei Pan, Yang Xiang
      Pages 191-198
    2. Jonathan Oliver, Scott Forman, Chun Cheng
      Pages 199-210

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

Keywords

cyber crime detection cyber data analysis data and system security data privacy digital forensics

Editors and affiliations

  • Lynn Batten
    • 1
  • Gang Li
    • 2
  • Wenjia Niu
    • 3
  • Matthew Warren
    • 4
  1. 1.School of Information TechnologyDeakin UniversityMelbourneAustralia
  2. 2.School of Information TechnologyDeakin UniversityAustralia
  3. 3.Institute of Information EngineeringChinese Academy of SciencesChina
  4. 4.School of Information and Business Analysis, Melbourne Camput at BurwoodDeakin UniversityBurwoodAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-45670-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-45669-9
  • Online ISBN 978-3-662-45670-5
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book