The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and indust
[Communications in Computer and Information Science] Recent Trends in Network Security and Applications Volume 89 || Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
โ Scribed by Meghanathan, Natarajan; Boumerdassi, Selma; Chaki, Nabendu; Nagamalai, Dhinaharan
- Book ID
- 118158501
- Publisher
- Springer Berlin Heidelberg
- Year
- 2010
- Tongue
- English
- Weight
- 475 KB
- Edition
- 1
- Category
- Article
- ISBN
- 3642144780
No coin nor oath required. For personal study only.
โฆ Synopsis
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: โข Network and Wireless Network Security โข Mobile, Ad Hoc and Sensor Network Security โข Peer-to-Peer Network Security โข Database and System Security โข Intrusion Detection and Prevention โข Internet Security, and Applications Security and Network Management โข E-mail Security, Spam, Phishing, E-mail Fraud โข Virus, Worms, Trojon Protection โข Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) โข Ubiquitous Computing Security โข Web 2. 0 Security โข Cryptographic Protocols โข Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).
๐ SIMILAR VOLUMES