內容註: |
Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam. |