L. Sánchez-Casado, R. Rodríguez-Gómez, Roberto Magán-Carrión, G. Maciá-Fernández
{"title":"NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study","authors":"L. Sánchez-Casado, R. Rodríguez-Gómez, Roberto Magán-Carrión, G. Maciá-Fernández","doi":"10.1007/978-3-642-40597-6_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_1","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115531256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering Based Group Key Management for MANET","authors":"A. El-Sayed","doi":"10.1007/978-3-642-40597-6_2","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_2","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Preserving Approach to Smart Metering","authors":"M. Shinwari, A. Youssef, W. Hamouda","doi":"10.1007/978-3-642-40597-6_14","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_14","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing","authors":"K. Shahzad, Steve Woodhead, P. Bakalis","doi":"10.1007/978-3-642-40597-6_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_5","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic Replay Attacks on Authentication in RFID Protocols","authors":"N. Chikouche, Cherif Foudil, M. Benmohammed","doi":"10.1007/978-3-642-40597-6_13","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_13","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"20 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing","authors":"N. Awang, A. A. Manaf","doi":"10.1007/978-3-642-40597-6_20","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_20","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Correlation-Based Feature Selection for Network Intrusion Detection Model","authors":"F. Heba, A. Hassanien, Tai-hoon Kim, S. Banerjee","doi":"10.1007/978-3-642-40597-6_21","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_21","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Alfateh Badawy, N. El-Fishawy, Osama A. Elshakankiry
{"title":"Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study","authors":"Mohamed Alfateh Badawy, N. El-Fishawy, Osama A. Elshakankiry","doi":"10.1007/978-3-642-40597-6_16","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_16","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer
{"title":"Hardware Advancements Effects on MANET Development, Application and Research","authors":"Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer","doi":"10.1007/978-3-642-40597-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_4","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merrihan B. Monir, Ayman A. Abdel-Hamid, Mohammed Abd El Aziz
{"title":"A Categorized Trust-Based Message Reporting Scheme for VANETs","authors":"Merrihan B. Monir, Ayman A. Abdel-Hamid, Mohammed Abd El Aziz","doi":"10.1007/978-3-642-40597-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_6","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}