Advertisement

Applications and Techniques in Information Security

5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26-28, 2014. Proceedings

  • Lynn Batten
  • Gang Li
  • Wenjia Niu
  • Matthew Warren
Conference proceedings ATIS 2014

Part of the Communications in Computer and Information Science book series (CCIS, volume 490)

Table of contents

  1. Front Matter
  2. Applications

    1. Dali Zhu, Zheming Fan, Na Pang
      Pages 1-12
    2. Ji-Soo Oh, Min-Woo Park, Tai-Myoung Chung
      Pages 13-24
    3. Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai
      Pages 25-32
    4. Jianfeng Guan, Su Yao, Changqiao Xu, Hongke Zhang
      Pages 44-55
    5. Tianshi Liu, Ruixiang Liu, Hongwei Wang, Liumei Zhang, Cailing Wang
      Pages 56-64
    6. Zhiwen Chen, Yizheng Tao, Gongliang Li
      Pages 65-72
    7. Zigang Cao, Gang Xiong, Yong Zhao, Zhenzhen Li, Li Guo
      Pages 73-81
  3. Curbing Cyber Crimes

    1. Dan Li, Qian Li, Yue Hu, Wenjia Niu, Jianlong Tan, Li Guo
      Pages 82-95
    2. Su Yao, Jianfeng Guan, Shuwei Ding, Hongke Zhang, Fei Song
      Pages 96-108
    3. Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee
      Pages 109-122
    4. Hui Liu, Xiaolong Ma, Tianzuo Wang, Bo Ding, Qiang Lu
      Pages 123-134
  4. Data Privacy

    1. Lefeng Zhang, Ping Xiong, Tianqing Zhu
      Pages 135-146
    2. Antoine Guellier, Christophe Bidan, Nicolas Prigent
      Pages 159-170
  5. Digital Forensics

  6. Security Implementations

    1. Wei Ma, Sen-Zhe Hu, Qiong Dai, Ting-Ting Wang, Yin-Fei Huang
      Pages 219-230
    2. Xiao-jun Chen, Jin-qiao Shi, Rui Xu, S. M. Yiu, Bing-xing Fang, Fei Xu
      Pages 231-242
    3. Heidi Wilcox, Maumita Bhattacharya, Rafiqul Islam
      Pages 243-255
    4. Ruben Smeets, Nele Mentens, Kris Aerts, Dave Singelée, An Braeken, Matthias Carlier et al.
      Pages 256-263
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.

Keywords

cyber crime detection cyber data analysis data and system security data privacy digital forensics

Editors and affiliations

  • Lynn Batten
    • 1
  • Gang Li
    • 2
  • Wenjia Niu
    • 3
  • Matthew Warren
    • 4
  1. 1.School of Information TechnologyDeakin UniversityMelbourneAustralia
  2. 2.School of Information TechnologyDeakin UniversityAustralia
  3. 3.Institute of Information EngineeringChinese Academy of SciencesChina
  4. 4.School of Information and Business Analysis, Melbourne Camput at BurwoodDeakin UniversityBurwoodAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-45670-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-45669-9
  • Online ISBN 978-3-662-45670-5
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering