© 2014

Applications and Techniques in Information Security

5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings

  • Lynn Batten
  • Gang Li
  • Wenjia Niu
  • Matthew Warren
Conference proceedings ATIS 2014

Part of the Communications in Computer and Information Science book series (CCIS, volume 490)

Table of contents

  1. Front Matter
  2. Applications

    1. Dali Zhu, Zheming Fan, Na Pang
      Pages 1-12
    2. Ji-Soo Oh, Min-Woo Park, Tai-Myoung Chung
      Pages 13-24
    3. Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai
      Pages 25-32
    4. Jianfeng Guan, Su Yao, Changqiao Xu, Hongke Zhang
      Pages 44-55
    5. Tianshi Liu, Ruixiang Liu, Hongwei Wang, Liumei Zhang, Cailing Wang
      Pages 56-64
    6. Zhiwen Chen, Yizheng Tao, Gongliang Li
      Pages 65-72
    7. Zigang Cao, Gang Xiong, Yong Zhao, Zhenzhen Li, Li Guo
      Pages 73-81
  3. Curbing Cyber Crimes

    1. Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan, Li Guo
      Pages 82-95
    2. Su Yao, Jianfeng Guan, Shuwei Ding, Hongke Zhang, Fei Song
      Pages 96-108
    3. Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee
      Pages 109-122
    4. Hui Liu, Xiaolong Ma, Tianzuo Wang, Bo Ding, Qiang Lu
      Pages 123-134
  4. Data Privacy

    1. Lefeng Zhang, Ping Xiong, Tianqing Zhu
      Pages 135-146
    2. Antoine Guellier, Christophe Bidan, Nicolas Prigent
      Pages 159-170
  5. Digital Forensics

    1. Allan NG, Lei Pan, Yang Xiang
      Pages 191-198
    2. Jonathan Oliver, Scott Forman, Chun Cheng
      Pages 199-210

About these proceedings


This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.


cyber crime detection cyber data analysis data and system security data privacy digital forensics

Editors and affiliations

  • Lynn Batten
    • 1
  • Gang Li
    • 2
  • Wenjia Niu
    • 3
  • Matthew Warren
    • 4
  1. 1.School of Information TechnologyDeakin UniversityMelbourneAustralia
  2. 2.School of Information TechnologyDeakin UniversityAustralia
  3. 3.Institute of Information EngineeringChinese Academy of SciencesChina
  4. 4.School of Information and Business Analysis, Melbourne Camput at BurwoodDeakin UniversityBurwoodAustralia

Bibliographic information

  • Book Title Applications and Techniques in Information Security
  • Book Subtitle 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings
  • Editors Lynn Batten
    Gang Li
    Wenjia Niu
    Matthew Warren
  • Series Title Communications in Computer and Information Science
  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-662-45669-9
  • eBook ISBN 978-3-662-45670-5
  • Series ISSN 1865-0929
  • Series E-ISSN 1865-0937
  • Edition Number 1
  • Number of Pages XII, 266
  • Number of Illustrations 120 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment