Advertisement

Future Network Systems and Security

Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings

  • Robin Doss
  • Selwyn Piramuthu
  • Wei Zhou

Part of the Communications in Computer and Information Science book series (CCIS, volume 759)

Table of contents

  1. Front Matter
    Pages I-X
  2. Protocol Design and Secure Implementation

    1. Front Matter
      Pages 1-1
    2. Nico Saputro, Samet Tonyali, Kemal Akkaya, Mumin Cebe, Mohamed Mahmoud
      Pages 3-18
    3. Erik Golen, Sai Varun Prasanth, Shashank Rudroju, Nirmala Shenoy
      Pages 19-29
    4. Kanwalinderjit Gagneja, Luis G. Jaimes
      Pages 30-40
  3. Security Protocols and Attack Countermeasures

    1. Front Matter
      Pages 41-41
    2. Todd Booth, Karl Andersson
      Pages 43-55
    3. Qian Chen, Hisham A. Kholidy, Sherif Abdelwahed, John Hamilton
      Pages 70-83
    4. Gaith Al, Robin Doss, Morshed Chowdhury
      Pages 84-94
  4. Big Data and Future Applications

    1. Front Matter
      Pages 95-95
    2. Biplob R. Ray, Morshed Chowdhury, Usman Atif
      Pages 97-112
    3. Michael Lawry, Asfahaan Mirza, Yidi Wendy Wang, David Sundaram
      Pages 113-125
    4. Michael Lawry, Asfahaan Mirza, Yidi Wendy Wang, David Sundaram
      Pages 126-138
    5. Yidi Wendy Wang, Asfahaan Mirza, Michael Lawry, David Sundaram
      Pages 154-166
    6. Fauzia Idrees Abro, Muttukrishnan Rajarajan, Thomas M. Chen, Yogachandran Rahulamathavan
      Pages 176-187
    7. Nawal Chanane, Farhaan Mirza, M. Asif Naeem, Asfahaan Mirza
      Pages 188-198
  5. Back Matter
    Pages 199-199

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017.
The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications. 

Keywords

ad hoc networks authentication big data cloud computing computer crime computer networks data security industry information systems Internet of Things (IoT) intrusion detection performance evaluation privacy Quality of Service (QoS) routers security smart cities smart traffic telecommunication networks transportation infrastructure

Editors and affiliations

  • Robin Doss
    • 1
  • Selwyn Piramuthu
    • 2
  • Wei Zhou
    • 3
  1. 1.Deakin University BurwoodAustralia
  2. 2.Department of Information Systems and Operations ManagementUniversity of Florida, Warrington College of BusinessGainesvilleUSA
  3. 3.Information and Operations Management DepartmentESCP EuropeParisFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-65548-2
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-65547-5
  • Online ISBN 978-3-319-65548-2
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering