Atnaujinkite slapukų nuostatas

Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings 1st ed. 2016 [Minkštas viršelis]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 407 pages, aukštis x plotis: 235x155 mm, weight: 646 g, 121 Illustrations, black and white; XIII, 407 p. 121 illus., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 630
  • Išleidimo metai: 05-May-2017
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3319510630
  • ISBN-13: 9783319510637
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 407 pages, aukštis x plotis: 235x155 mm, weight: 646 g, 121 Illustrations, black and white; XIII, 407 p. 121 illus., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 630
  • Išleidimo metai: 05-May-2017
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3319510630
  • ISBN-13: 9783319510637
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the 11th International Conference on Global Security, Safety and Sustainability, ICGS3 2017, held in London, UK, in January, 2017.The 32 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on the future of digital forensics; cyber intelligence and operation; information systems security management; systems security, safety, and sustainability; cyber infrastructure protection.

The future of digital forensics.- Cyber intelligence and operation.- Information systems security management.- Systems security, safety, and sustainability.- Cyber infrastructure protection.
The Future of Digital Forensics
Deconstruct and Preserve (DaP): A Method for the Preservation of Digital Evidence on Solid State Drives (SSD)
3(9)
I. Mitchell
T. Anandaraja
S. Hara
G. Hadzhinenov
D. Neilson
Bitcoin Forensics: A Tutorial
12(15)
David Neilson
Sukhvinder Hara
Ian Mitchell
Forensic Analysis of Secure Ephemeral Messaging Applications on Android Platforms
27(15)
M.A. Hannan Bin Azhar
Thomas Edward Allen Barton
Digital Evidence: Disclosure and Admissibility in the United Kingdom Jurisdiction
42(11)
Reza Montasari
Combating Cyber Dependent Crimes: The Legal Framework in the UK
53(16)
Oriola Sallavaci
Cyber Intelligence and Operation
Aspects of Voice Communications Fraud
69(13)
Alexandre Helenport
Bobby L. Tait
Scalable Frameworks for Application Security and Data Protection
82(14)
Ilya Kabanov
Balancing Targeted Delivery of Content and Personal Freedom in the Digital On-line Video Marketing Landscape
96(10)
Kenneth Revett
Sergio Tenreiro de Magalhaes
Maria Jose Magalhaes
H. Jahankhani
Towards an Enterprise Architecture Framework for Community Policing
106(7)
Helen Gibson
Babak Akhgar
A Scalable Malware Classification Based on Integrated Static and Dynamic Features
113(12)
Tewfik Bounouh
Zakaria Brahimi
Ameer Al-Nemrat
Chafika Benzaid
Source Camera Identification Using Non-decimated Wavelet Transform
125(9)
Ahmad Ryad Soobhany
Akbar Sheikh-Akbari
Z. Cliffe Schreuders
Content Discovery Advertisements: An Explorative Analysis
134(10)
Raghavender Rao Jadhav Balaji
Andres Baravalle
Ameer Al-Nemrat
Paolo Falcarin
Phishing-Deception Data Model for Online Detection and Human Protection
144(11)
Phoebe Barraclough
Graham Sexton
Cyber Attacks Analysis Using Decision Tree Technique for Improving Cyber Situational Awareness
155(18)
Sina Pournouri
Babak Akhgar
Petra Saskia Bayerl
ITAOFIR: IT Asset Ontology for Information Risk in Knowledge Economy and Beyond
173(18)
A. Kayode Adesemowo
Rossouw von Solms
Reinhardt A. Botha
Information Systems Security Management
Disaster Management System as an Element of Risk Management for Natural Disaster Systems Using the PESTLE Framework
191(14)
Dilshad Sarwar
Muthu Ramachandran
Amin Hosseinian-Far
A Review on Privacy Issues in Hotels: A Contribution to the Definition of Information Security Policies and Marketing Strategies
205(13)
Maria Jose Magalhaes
Sergio Tenreiro de Magalhaes
Kenneth Revett
Hamid Jahankhani
Tor Marketplaces Exploratory Data Analysis: The Drugs Case
218(12)
Alessandro Celestini
Gianluigi Me
Mara Mignone
User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security
230(22)
Patrice Seuwou
Ebad Banissi
George Ubakanma
Application of a Digraph for Behavioural Eye Tracking Biometrics
252(14)
Bobby L. Tait
Behavioural Biometrics for Authentication and Stress Detection --- A Case Study with Children
266(15)
Ana I. Azevedo
Henrique D. Santos
Vitor J. Sa
Nuno V. Lopes
Using Dual Trigger Handover Algorithm to Improve WiMAX Handover Delay
281(9)
Imran Khan
Sufian Yousef
Social Media and E-Voting --- A Secure and Trusted Political Forum for Palestine
290(15)
Fouad Shat
Elias Pimenidis
Systems Security, Safety and Sustainability Cyber Infrastructure Protection
Actor-Network Theory as a Framework to Analyse Technology Acceptance Model's External Variables: The Case of Autonomous Vehicles
305(16)
Patrice Seuwou
Ebad Banissi
George Ubakanma
Mhd Saeed Sharif
Ann Healey
The Future of Enterprise Security with Regards to Mobile Technology and Applications
321(10)
F.T. Tagoe
M.S. Sharif
Chemical, Biological, Radiological and Nuclear (CBRN) Protective Clothing --- A Review
331(11)
Maria Jose Magalhaes
Sergio Tenreiro de Magalhaes
Kenneth Revett
Hamid Jahankhani
Performance Analysis for Traffics in Mobile Ad Hoc Network
342(9)
Firas Hazzaa
Sufian Yousef
Global Triumph or Exploitation of Security and Privacy Concerns in E-Learning Systems
351(13)
Asim Majeed
Said Baadel
Anwar Ul Haq
Efficient Energy and Processes Time Algorithm for Offloading Using Cloud Computing
364(7)
Rakan Aldmour
Sufian Yousef Faris Albaadani
Mohammad Yaghi
A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks
371(14)
Gregory Epiphaniou
Tim French
Haider Al-Khateeb
Ali Dehghantanha
Hamid Jahankhani
A Novel Energy Sleep Mode Based on Standard Deviation `ESMSD' Algorithm for Adaptive Clustering in MANETs
385(9)
Faris Al-Baadani
Sufian Yousef
Rakan Aldmour
Laith Al-Jabouri
Shashikala Tapaswi
Kiran Kumar Patnaik
Michael Cole
Facial Recognition Cane for the Visually Impaired
394(13)
Asim Majeed
Said Baadel
Author Index 407