EC2ND 2005

Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK

  • Andrew Blyth

Table of contents

  1. Front Matter
    Pages I-IX
  2. Network Defence

    1. Front Matter
      Pages 1-1
    2. Liwen He, Nikolai Bode
      Pages 3-12
    3. Liam Meany
      Pages 23-32
    4. MingChu Li, Hongyan Yao, Cheng Guo, Na Zhang
      Pages 33-39
    5. Orla McGann, David Malone
      Pages 41-49
    6. Abhishek Jain, Guillaume Andreys, G. Sivakumar
      Pages 61-72
  3. Wireless & Ad Hoc Network Security

  4. Network Protocol Analysis & Cryptographic Applications

    1. Front Matter
      Pages 137-137
    2. Song Han, Elizabeth Chang, Jie Wang
      Pages 139-146
    3. Feiyu Lei, Wen Chen, Kefei Chen
      Pages 157-164
  5. Intrusion Detection & Prevention

    1. Front Matter
      Pages 165-165
    2. Yongzheng Zhang, Binxing Fang, Yue Chi, Xiaochun Yun
      Pages 167-176
    3. Eni E Oyegoke, Theodore Tryfonas, Andrew J Blyth
      Pages 177-185
    4. V. Alarcon-Aquino, J. A. Mejia-Sanchez, R. Rosas-Romero, J. F. Ramirez-Cruz
      Pages 187-196
    5. Mohamed Azab, Mohamed Rizk, Mohamad Abou-El-Nasr
      Pages 207-217
    6. Mohammed Chihoub
      Pages 229-239
    7. B. M. Reshmi, S. S. Manvi
      Pages 241-250
  6. Software for Security in Networked Environments

About these proceedings


This book contains the proceedings of the First European Conference on Computer Network Defence which took place in December 2005 at the University of Glamorgan in the UK.

The theme of the conference is the protection of computer networks; and it provides an opportunity for workers in this area to become better informed about recent research developments as well as to exchange valuable insights and opinions.

The contributions are drawn from participants from a number of national and international organisations and cover the following topics:

Computer Network Operations

Computer Network Attack

Network Application Security

Web Security

Vulnerability Management and Tracking

Network Forensics

Wireless and Mobile Security


Network Discovery and Mapping

Network Security

Intrusion Detection Systems

Incident Response and Management

Malicious Software

Network Architectures and Management

Legal and Ethical Issues

The papers presented include contributions from leading figures in the field and are a valuable source of reference for both the researchers and the practitioners of computer network defence.


Denial of Service ISMS Open Source RSA Spam network security organization penetration testing privacy

Editors and affiliations

  • Andrew Blyth
    • 1
  1. 1.School of ComputingUniversity of GlamorganUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag London Limited 2006
  • Publisher Name Springer, London
  • eBook Packages Computer Science
  • Print ISBN 978-1-84628-311-6
  • Online ISBN 978-1-84628-352-9
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences