Skip to main content
  • Conference proceedings
  • © 2013

Advances in Security of Information and Communication Networks

First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings

  • Fast-track conference proceedings State-of-the-art research Up-to-date results

Conference proceedings info: SecNet 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Networking Security

    1. NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study

      • Leovigildo Sánchez-Casado, Rafael Alejandro Rodríguez-Gómez, Roberto Magán-Carrión, Gabriel Maciá-Fernández
      Pages 1-10
    2. Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN

      • Alyaa Amer, Ayman Abdel-Hamid, Mohamad Abou El-Nasr
      Pages 27-43
    3. Hardware Advancements Effects on MANET Development, Application and Research

      • Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer
      Pages 44-53
    4. A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing

      • Khurram Shahzad, Steve Woodhead, Panos Bakalis
      Pages 54-64
    5. A Categorized Trust-Based Message Reporting Scheme for VANETs

      • Merrihan Monir, Ayman Abdel-Hamid, Mohammed Abd El Aziz
      Pages 65-83
  3. Data and Information Security

    1. Blind Watermark Approach for Map Authentication Using Support Vector Machine

      • Mourad Raafat Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, Aboul Ella Hassanien, Vaclav Snasel
      Pages 84-97
    2. An HMM-Based Reputation Model

      • Ehab ElSalamouny, Vladimiro Sassone
      Pages 111-121
    3. Towards IT-Legal Framework for Cloud Computing

      • Sameh Hussein, Nashwa Abdelbaki
      Pages 122-130
    4. A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps

      • Mona M. Soliman, Aboul Ella Hassanien, Hoda M. Onsi
      Pages 131-142
  4. Authentication and Privacy

    1. A Cattle Identification Approach Using Live Captured Muzzle Print Images

      • Ali Ismail Awad, Aboul Ella Hassanien, Hossam M. Zawbaa
      Pages 143-152
    2. Algebraic Replay Attacks on Authentication in RFID Protocols

      • Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed
      Pages 153-163
    3. A Privacy Preserving Approach to Smart Metering

      • Merwais Shinwari, Amr Youssef, Walaa Hamouda
      Pages 164-176
    4. Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware

      • Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat
      Pages 177-184
    5. Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study

      • Mohamed Alfateh Badawy, Nawal El-Fishawy, Osama Elshakankiry
      Pages 185-195
  5. Security Applications

    1. Elderly Healthcare Data Protection Application for Ambient Assisted Living

      • Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, Anthony Lam
      Pages 196-203
    2. Machine Learning Techniques for Anomalies Detection and Classification

      • Amira Sayed Abdel-Aziz, Aboul Ella Hassanien, Ahmad Taher Azar, Sanaa El-Ola Hanafi
      Pages 219-229

Other Volumes

  1. Advances in Security of Information and Communication Networks

About this book

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.

                       

Editors and Affiliations

  • Faculty of Engineering, Faculty of Engineering, Al Azhar University, Qena, Egypt

    Ali Ismail Awad

  • Department of Information Technology, Cairo University, Giza, Egypt

    Aboul Ella Hassanien

  • Library, Kyushu University, Fukuoka, Japan

    Kensuke Baba

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access