Skip to main content
  • Conference proceedings
  • © 2011

Advances in Network Security and Applications

4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Conference proceedings info: CNSA 2011.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (63 papers)

  1. Front Matter

  2. Network Security and Applications

    1. Design of Secure Chaotic Hash Function Based on Logistic and Tent Maps

      • P. Jhansi Rani, M. Sambasiva Rao, S. Durga Bhavani
      Pages 43-52
    2. Behavioral Malware Detection Expert System – Tarantula

      • Sandeep Romana, Swapnil Phadnis, Himanshu Pareek, P. R. L. Eswari
      Pages 65-77
    3. Tool for Prevention and Detection of Phishing E-Mail Attacks

      • Shamal M. Firake, Pravin Soni, B. B. Meshram
      Pages 78-88
    4. Improvement of QoS performance in MANET by QoS-TORA: A TORA Based QoS Routing Algorithm

      • Govind Kumar Jha, Neeraj Kumar, Himanshu Sharma, K. G. Sharma
      Pages 89-99
    5. Network Level Anomaly Detection System Using MST Based Genetic Clustering

      • P. Kola Sujatha, R. Arun, P. V. Shanthoosh, I. Ezra Prince Jebahar, A. Kannan
      Pages 113-122
    6. A Hybrid Approach to Texture Classification

      • B. Vijayalakshmi, V. Subbiah Bharathi
      Pages 123-130
    7. Completeness of LAN Attack Detection Using Discrete Event Systems

      • F. A. Barbhuiya, N. Hubballi, S. Biswas, S. Nandi
      Pages 131-139
    8. Designing Dependable Web Services Security Architecture Solutions

      • D. Shravani, P. Suresh Varma, B. Padmaja Rani, M. Upendra Kumar, A. V. Krishna Prasad
      Pages 140-149
    9. A Preventive Measure to Protect from Denial of Service Attack

      • Manas Ku. Dasmohapatra, Kamalika Datta, Indranil Sengupta
      Pages 157-166
    10. Using Raga as a Cryptographic Tool

      • Sandip Dutta, Soubhik Chakraborty, N. C. Mahanti
      Pages 178-183
    11. Combining Power of MATLAB with SystemVerilog for Image and Video Processing ASIC Verification

      • Dhaval Modi, Harsh Sitapara, Rahul Shah, Ekata Mehul, Pinal Engineer
      Pages 184-193

Other Volumes

  1. Advances in Network Security and Applications

About this book

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.

Editors and Affiliations

  • Southeastern Louisiana University, Hammond, USA

    David C. Wyld

  • Chair of Systems and Computer Networks, Wroclaw University of Technology, Wroclaw, Poland

    Michal Wozniak

  • University of Calcutta, Calcutta, India

    Nabendu Chaki

  • Jackson State University, Jackson, USA

    Natarajan Meghanathan

  • Wireilla Net Solutions PTY Ltd, Melbourne, Australia

    Dhinaharan Nagamalai

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access