default search action
SecNet 2013: Cairo, Egypt
- Ali Ismail Awad, Aboul Ella Hassanien, Kensuke Baba:
Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings. Communications in Computer and Information Science 381, Springer 2013, ISBN 978-3-642-40596-9
Networking Security
- Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión, Gabriel Maciá-Fernández:
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study. 1-10 - Ayman El-Sayed:
Clustering Based Group Key Management for MANET. 11-26 - Alyaa Amer, Ayman A. Abdel-Hamid, Mohamad Abou El-Nasr:
Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN. 27-43 - Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer:
Hardware Advancements Effects on MANET Development, Application and Research. 44-53 - Khurram Shahzad, Steve Woodhead, Panos Bakalis:
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing. 54-64 - Merrihan Monir, Ayman A. Abdel-Hamid, Mohammed Abd El Aziz:
A Categorized Trust-Based Message Reporting Scheme for VANETs. 65-83
Data and Information Security
- Mourad Raafat Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, Aboul Ella Hassanien, Václav Snásel:
Blind Watermark Approach for Map Authentication Using Support Vector Machine. 84-97 - Mohamed Waleed Fakhr:
High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression. 98-110 - Ehab ElSalamouny, Vladimiro Sassone:
An HMM-Based Reputation Model. 111-121 - Sameh Hussein, Nashwa Abdelbaki:
Towards IT-Legal Framework for Cloud Computing. 122-130 - Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi:
A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps. 131-142
Authentication and Privacy
- Ali Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa:
A Cattle Identification Approach Using Live Captured Muzzle Print Images. 143-152 - Noureddine Chikouche, Cherif Foudil, Mohamed Benmohammed:
Algebraic Replay Attacks on Authentication in RFID Protocols. 153-163 - Merwais Shinwari, Amr M. Youssef, Walaa Hamouda:
A Privacy Preserving Approach to Smart Metering. 164-176 - Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat:
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware. 177-184 - Mohamed Alfateh Badawy, Nawal A. El-Fishawy, Osama A. Elshakankiry:
Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study. 185-195
Security Applications
- Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, Anthony Lam:
Elderly Healthcare Data Protection Application for Ambient Assisted Living. 196-203 - Miguel Salas:
A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics. 204-218 - Amira Sayed Abdel-Aziz, Aboul Ella Hassanien, Ahmad Taher Azar, Sanaa El-Ola Hanafi:
Machine Learning Techniques for Anomalies Detection and Classification. 219-229 - Nor Fatimah Bt. Awang, Azizah Abd Manaf:
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing. 230-239 - Heba F. Eid, Aboul Ella Hassanien, Tai-Hoon Kim, Soumya Banerjee:
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model. 240-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.