𝔖 Scriptorium
✦   LIBER   ✦

📁

Computer Network Security : 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings

✍ Scribed by Bay, John; Kotenko, Igor; Popyack, Leonard; Rak, Jacek; Skormin, Victor; Szczypiorski, Krzysztof


Year
2017
Tongue
English
Leaves
362
Series
Lecture Notes in Computer Science 10446
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017.

The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical sections on Critical Infrastructure Protection and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security.

✦ Table of Contents


Front Matter ....Pages I-XIII
Front Matter ....Pages 1-1
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile (Janusz Górski, Katarzyna Łukasiewicz)....Pages 3-15
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models (Andrew Hutchison)....Pages 16-27
Data Mining and Information Security (Alexander Grusho)....Pages 28-33
Front Matter ....Pages 35-35
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems (Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens)....Pages 37-49
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure (Evgenia Novikova, Ivan Murenin)....Pages 50-61
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs (Emrah Korkmaz, Matthew Davis, Andrey Dolgikh, Victor Skormin)....Pages 62-74
Choosing Models for Security Metrics Visualization (Maxim Kolomeec, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, Hervé Debar)....Pages 75-87
Front Matter ....Pages 89-89
iCrawl: A Visual High Interaction Web Crawler (Deeraj Nagothu, Andrey Dolgikh)....Pages 91-103
Race Condition Faults in Multi-core Systems (Leonard Popyack, Jay Biernat)....Pages 104-114
Security Requirements for the Deployment of Services Across Tactical SOA (Vasileios Gkioulos, Stephen D. Wolthusen)....Pages 115-127
Front Matter ....Pages 129-129
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System (Jerzy Konorski, Karol Rydzewski)....Pages 131-142
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers (Alexander Branitskiy, Igor Kotenko)....Pages 143-157
Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions (Albert Sitek, Zbigniew Kotulski)....Pages 158-170
Towards Self-aware Approach for Mobile Devices Security (Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho)....Pages 171-182
Front Matter ....Pages 183-183
Resident Security System for Government/Industry Owned Computers (Matthew Davis, Emrah Korkmaz, Andrey Dolgikh, Victor Skormin)....Pages 185-194
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees (Anton Kopeikin, Arnur Tokhtabayev, Nurlan Tashatov, Dina Satybaldina)....Pages 195-210
Malware Analysis and Detection via Activity Trees in User-Dependent Environment (Arnur Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina)....Pages 211-222
A Concept of Clustering-Based Method for Botnet Detection (Hubert Ostap, Ryszard Antkiewicz)....Pages 223-234
Easy 4G/LTE IMSI Catchers for Non-Programmers (Stig F. Mjølsnes, Ruxandra F. Olimid)....Pages 235-246
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis (Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng)....Pages 247-259
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS (An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina)....Pages 260-271
Front Matter ....Pages 273-273
Automated Cryptographic Analysis of the Pedersen Commitment Scheme (Roberto Metere, Changyu Dong)....Pages 275-287
Steganalysis Based on Statistical Properties of the Encrypted Messages (Valery Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna)....Pages 288-298
Security Assessment of Cryptographic Algorithms (Marcin Niemiec, Maciej Francikiewicz)....Pages 299-312
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks (Vasileios Mavroeidis, Mathew Nicho)....Pages 313-324
Front Matter ....Pages 325-325
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems (Steven Drager, Janusz Zalewski)....Pages 327-338
Information Security of SDN on the Basis of Meta Data (Alexander Grusho, Nick Grusho, Michael Zabezhailo, Alexander Zatsarinny, Elena Timonina)....Pages 339-347
Toward Third-Party Immune Applications (Omar Iraqi, Hanan El Bakkali)....Pages 348-359
Back Matter ....Pages 361-362

✦ Subjects


Computer science;Computer communication systems;Computer system failures;Computer security;Data encryption (Computer science);Computers and civilization;Computers;Law and legislation;Computer Science;Systems and Data Security;Computer Communication Networks;Computers and Society;Legal Aspects of Computing;Data Encryption;System Performance and Evaluation


📜 SIMILAR VOLUMES


Computer Network Security: 5th Internati
✍ Igor Kotenko, Victor Skormin 📂 Library 📅 2010 🌐 English

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented

Computer Network Security: 5th Internati
✍ Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor 📂 Library 📅 2010 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca

Computer Network Security: 5th Internati
✍ Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens (auth.), Igor 📂 Library 📅 2010 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010) held in St. Petersburg, Russia, during September 8-10, 2010. The conference was organized by the Institution of the Russian Aca

Computer Network Security: 6th Internati
✍ Benjamin Livshits (auth.), Igor Kotenko, Victor Skormin (eds.) 📂 Library 📅 2012 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were car

Computer Network Security: Fourth Intern
✍ Christian Collberg, Jasvir Nagra, Fei-Yue Wang (auth.), Vladimir Gorodetsky, Igo 📂 Library 📅 2007 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>This volume contains papers presented at the Fourth International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2007) held in St. Petersburg, Russia, during September 13–15, 2007. The workshop was organized by the St. Petersburg Institute for I