Bibliographic record and links to related information available from the Library of Congress catalog
Note: Electronic data is machine generated. May be incomplete or contain other coding.
Section I: Network Defence Network Penetration Testing iwen He and Nikolai Bode 3 Taxonomy of Criteria for Evaluating Defence Mechanisms against Flooding oS Attacks armo M61s 13 pam Honey Pot Research lam Meany 23 Privacy protection mechanism in grid environment ing Chu Li, Hongyan Yao, Cheng Guo, Na Zhang 33 low Label Filtering Feasibility )a McGann and David Malone 41 The Representation and use of Relation Information for the Detection of Threats by Security Information Management Systems yrl Onwubiko, Andrew P. Lenaghan, Luke Hebbes and Ron R. Malyan__ 51 Stelligent real-time reactive Network Management Abhishek Jain, Guillaume Andreys and G. Sivakumar 61 Scurity in Passive Optical Network via Wavelength Hopping and Codes ccling techniques alid Shawbaki 73 A Model of Deploying Deception in a Computer Network Operations (CNO) Environment Zar Kazmi and Stilianos Vidalis 83 Sction II: Wireless & Ad Hoc Network Security Taxonomy of Attacks on Wireless Sensor Networks ng Han, Elizabeth Chang, Li Gao, and Tharam Dillon ______ 97 A Lightweight Identity Authentication Mechanism for Self-Organizing Wireless Snsor Networks Son Heo and Choong Seon Hong 107 Sdelling the Spread of Computer Worms in Vehicular Ad-Hoc Networks ziar Nekovee 115 Why Attackers seek wireless networks in Perth, Western Australia for easy ta ets Sen Yek 125 Section III: Network Protocol Analysis & Cryptographic Applications Attack on Undeniable Partially Blind Signatures Song Han, Elizabeth Chang and Jie Wang 139 Evolutionary Approach in the Security Protocols Design Pavel Ocenasek 147 Improvement of Adaptive Threshold RSA Feiyu Lei, Wen Chen and Kefei Chen 157 Section IV: Intrusion Detection & Prevention A Log-Based Mining System for Network Node Correlation Yongzheng Zhang, Binxing Fang, Yue Chi and Xiaochun Yun 167 Exploring Vulnerabilities of Agent-based IDS: The Need for Agent Self- defence Eni E. Oyegoke, Theodore Tryfonas and Andrew J Blyth_ 177 Detecting and Classifying Attacks in Computer Networks Using Feed- Forward and Elman Neural Networks V. Alarcon-Aquino, J. A. Mejia-Sanchez, R. Rosas-Romero and J. F. Ramirez-Cruz 187 Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications John Haggerty, Qi Shi, Paul Fergus and Madjid Merabti 197 Design and Implementation of a Fast String Matcher Utilizing Content Addressable Memory Mohamed Azab, Mohamed Rizk and Mohamad Abou-EI-Nasr 207 Zero hour outbreak prevention using distributed traffic anomaly detection Andrds Korn and G6bor Feh6r 219 Mediating Hosts' malicious Character Mohammed Chihoub 229 Masquerade Detection by Using Activity Pattems B.M. Reshmi and S.S. Manvi 241 Section V: Software for Security in Networked Environments A Flexible, Open Source Software Architecture for Network-Based Forensic Computing & Intelligence Gathering Christopher Meyler and lain Sutherland 253 Protecting Distributed Object Applications from Corruption of Class Bytecodes on Client Side Julian L. Rrushi 263 Modelling and Construction of Web Services Security Li-Guo Wang and Lyndon Lee 273 Normalising Events into Incidents Using Unified Intrusion Detection-Related Data Nikolaos Avourdiadis and Andrew Blyth___ 283