NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection

Type: conference

Download: ICIMP 2012 cover page

Download: ICIMP 2012 foreword page

Download: ICIMP 2012 committee page

Download: ICIMP 2012 table of contents

Download: ICIMP 2012 full proceedings

Notes: IARIA Conference.

Editors:
Arno Wagner, Consecom AG, Switzerland
Petre Dini, Concordia University, Canada / China Space Agency Center, China

Event editions: - there are 11 editions.

ISSN: 2308-3980

ISBN: 978-1-61208-201-1

Location: Stuttgart, Germany

Dates: from May 27, 2012 to June 1, 2012

Articles: there are 14 articles

Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels
Steffen Wendzel and Jörg Keller
keywords: network covert channel, protocol switching covert channel

Quantifying the Value of SSL Certification with Web Reputation Metrics
Jani Suomalainen
keywords: Web security; Web reputation; Web of Trust; SSL; HTTPS; certification; correlation analysis

Parameter Estimation for Heuristic-based Internet Traffic Classification
Michael Finsterbusch, Chris Richter, and Jean-Alexander Müller
keywords: flow classification, Internet traffic, traffic identification

A Light-weighted Source Address Validation Method in IPv4/IPv6 Translation
Yu Zhu, Jun Bi, and Yayuan Sun
keywords: IPv4/IPv6 translation; Anti-spoofing; Source address validation; Packet filtering; Internet Security; Access control.

Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann and Melanie Volkamer
keywords: trust, distributed systems, formal methods, resilience, electronic voting, knowledge calculus, conspiracies

sGUTS: Simplified Grid User Trust Service for Site Selection
Ioanna Dionysiou and Harald Gjermundrod
keywords: grid computing, trust mechanisms, user perceptive

A Trust-based DRM Scheme for Content Sharing in an Open Environment
Qin Qiu, Zhi Tang, and Yinyan Yu
keywords: DRM; trust model; content sharing

A Gateway-based Access Control Scheme for Collaborative Clouds
Yongdong Wu, Vivy Suhendra, and Huaqun Guo
keywords: Virtual cloud computing; Identity management; Access control

Process Discovery and Guidance Applications of Manually Generated Logs
Stefan Schönig, Christoph Günther, and Stefan Jablonski
keywords: Process Mining, Process Monitoring, Activity Tracking, Guidance through Process Execution

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
María del Carmen Prudente Tixteco, Linda Karina Toscano Medina, Gualberto Aguilar Torres, and Gabriel Sánchez Pérez
keywords: fingerprint scanners; Biometric Standards; physical characteristics

Constructing Context-based Non-Critical Alarm Filter in Intrusion Detection
Yuxin Meng and Wenjuan Li
keywords: Intrusion detection; Network security; Non-critical alarm filter; Context-based system

Improving Attack Aggregation Methods Using Distributed Hash Tables
Zoltán Czirkos, Márta Rencz, and Gábor Hosszú
keywords: collaborative intrusion detection; attack correlation; peer-to-peer; distributed hash table

Engineering Security Protocols with Modelchecking – Radius-SHA256 and Secured Simple Protocol
Florian Kammueller, Glenford Mapp, Sandip Patel, and Abubaker Sadiq Sani
keywords: Modelchecking, Security Protocols

Firewall Analysis by Symbolic Simulation
Arno Wagner and Ulrich Fiedler
keywords: Firewall Analysis; Symbolic Simulation.

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.