000856898 000__ 04592cam\a2200565Ii\4500 000856898 001__ 856898 000856898 005__ 20230306145157.0 000856898 006__ m\\\\\o\\d\\\\\\\\ 000856898 007__ cr\cn\nnnunnun 000856898 008__ 151228s2015\\\\sz\a\\\\ob\\\\101\0\eng\d 000856898 019__ $$a932002547$$a985042766$$a990530939$$a1005791078$$a1012042855$$a1048134532$$a1058508861$$a1066441362 000856898 020__ $$a9783319238296$$q(electronic book) 000856898 020__ $$a3319238299$$q(electronic book) 000856898 020__ $$z9783319238289 000856898 020__ $$z3319238280 000856898 0247_ $$a10.1007/978-3-319-23829-6 $2 doi 000856898 035__ $$aSP(OCoLC)ocn932168774 000856898 035__ $$aSP(OCoLC)932168774$$z(OCoLC)985042766$$z(OCoLC)990530939$$z(OCoLC)1005791078$$z(OCoLC)1012042855$$z(OCoLC)1048134532$$z(OCoLC)1058508861$$z(OCoLC)1066441362 000856898 040__ $$aNUI$$beng$$erda$$epn$$cNUI$$dOCLCO$$dORU$$dYDXCP$$dCOO$$dOCLCF$$dGZM$$dGW5XE$$dOCLCO$$dOCL$$dOCLCO$$dKSU$$dIAS$$dJBG$$dIAO$$dICN$$dIAD$$dSOI$$dILO$$dVT2$$dZ5A$$dLIP$$dESU$$dOCLCQ$$dIOG$$dU3W$$dOCLCA$$dOCLCQ$$dAU@$$dOCLCQ$$dEBLCP$$dWYU$$dUKMGB 000856898 049__ $$aISEA 000856898 050_4 $$aQA76.9.A25 000856898 08204 $$a005.8$$223 000856898 1112_ $$aSecureComm (Conference)$$d(2014 :$$cBeijing, China) 000856898 24510 $$aInternational Conference on Security and Privacy in Communication Networks :$$b10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014 : revised selected papers.$$nPart I /$$cJing Tian, Jiwu Jing, Mudhakar Srivatsa (eds.). 000856898 264_1 $$aCham :$$bSpringer,$$c[2015] 000856898 264_4 $$a$c ©2015 000856898 300__ $$a1 online resource (xix, 635 pages) : $b illustrations. 000856898 336__ $$atext$$btxt$$2rdacontent 000856898 337__ $$acomputer$$bc$$2rdamedia 000856898 338__ $$aonline resource$$bcr$$2rdacarrier 000856898 347__ $$atext file$$bPDF$$2rda 000856898 4901_ $$aLecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$$x1867-8211 ;$$v152 000856898 500__ $$aIncludes author index. 000856898 504__ $$aIncludes bibliographical references and index. 000856898 5050_ $$aSecurity and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks -- network intrusion detection and prevention, firewalls, packet filters -- malware, and distributed denial of service -- communication privacy and anonymity -- network and internet forensics techniques -- public key infrastructures, key management, credential management -- secure routing, naming/addressing, network management -- security and privacy in pervasive and ubiquitous computing -- security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems -- security & isolation in data center networks -- security & isolation in software defined networking. 000856898 506__ $$aAccess limited to authorized users. 000856898 520__ $$aThis 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking. 000856898 5880_ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 18, 2016). 000856898 650_0 $$aTelecommunication systems$$xSecurity measures$$vCongresses. 000856898 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000856898 650_0 $$aComputer security$$vCongresses. 000856898 7001_ $$aTian, Jing,$$d1979-$$eeditor. 000856898 7001_ $$aJing, Jiwu,$$eeditor. 000856898 7001_ $$aSrivatsa, Mudhakar,$$eeditor. 000856898 77608 $$iPrint version: $z 9783319238289 000856898 830_0 $$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$$v152. 000856898 85280 $$bebk$$hSpringerLink 000856898 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-23829-6$$zOnline Access$$91397441.1 000856898 909CO $$ooai:library.usi.edu:856898$$pGLOBAL_SET 000856898 980__ $$aEBOOK 000856898 980__ $$aBIB 000856898 982__ $$aEbook 000856898 983__ $$aOnline 000856898 994__ $$a92$$bISE