Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected P

Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected P

By: Dasun Weerasinghe (volume_editor)Paperback

2 - 4 weeks availability


ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009. The c- ference was organized as a meeting point for leading national and international - perts of information security and digital forensics. The conference was rewarding in many ways; ISDF 2009 was an exciting and vibrant event, with 4 keynote talks, 25 invited talks and 18 full-paper presentations and those attending had the opportunity to meet and talk with many distinguished people who are responsible for shaping the area of information security. This conference was organized as part of two major research projects funded by the UK Engineering and Physical Sciences Research Council in the areas of Security and Digital Forensics. I would like to thank all the people who contributed to the technical program. The most apparent of these are the Indian delegates who all accepted our invite to give presentations at this conference. Less apparent perhaps is the terrific work of the members of the Technical Program Committee, especially in reviewing the papers, which is a critical and time-consuming task. I would like to thank Raj Rajarajan (City University London) for making the idea of the ISDF 2009 conference a reality with his hard work. Last but not least, I would like to thank all the authors who submitted papers, making the conference possible, and the authors of accepted papers for their cooperation. Dasun Weerasinghe

Create a review


Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks.- A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.- On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise.- Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.- Face Recognition Using Balanced Pairwise Classifier Training.- Forensic Investigation of the Soft-Modded PlayStation Portable (PSP).- Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems.- Parameter Based Access Control Model for Mobile Handsets.- Ethical Dilemmas in Teaching Computer and Internet Security.- Overview of SIP Attacks and Countermeasures.- Security Challenges in Multihop Wireless Mesh Networks-A Survey.- A Security Architecture to Protect Against Data Loss.- A Simple Method for Improving Intrusion Detections in Corporate Networks.- Detecting Sybils in Peer-to-Peer File Replication Systems.- Adaptive Clustering Method for Reclassifying Network Intrusions.- Technology Perspective: Is Green IT a Threat to IT Security?.- An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics.- Cross-Enterprise Policy Model for e-Business Web Services Security.- Challenges of Identity Management - A Context in Rural India.

Product Details

  • publication date: 13/01/2010
  • ISBN13: 9783642115295
  • Format: Paperback
  • Number Of Pages: 193
  • ID: 9783642115295
  • weight: 318
  • ISBN10: 3642115292

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly