Advances in Communications, Computing, Networks and Security Volume 10Lulu.com, 4. 11. 2013. - 239 страница This book is the tenth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2011/12 academic year. A total of 25 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Network Systems Engineering, and Robotics. |
Садржај
Study of DCT Watermarking Methods | 11 |
Prediction of Electricity Consumption in France | 17 |
Impedance Measurements of Magnetic Wires under the Effects of Stress and | 26 |
Spectral Analysis of Magnetic Wire Response for NonDestructive | 34 |
Computer and Information Security | 43 |
Improving Online Collaboration within the IFIP Working Group on Human | 58 |
Developing a Mobile WiFi Tracking Unit | 65 |
A Crime Depended Automated Search and Engine for Digital Forensics | 73 |
Firewall Rulebase Analysis Tool | 96 |
Snort IDS Ability to Detect Nmap and Metasploit Framework Evasion Techniques | 104 |
Webbased RiskAnalysis for SMEs R Kunder and N L Clarke | 120 |
WebBased RiskAnalysis for Home Users R T Magaya and N L Clarke | 136 |
Network Systems Engineering | 153 |
AIBased TCP Performance Modelling K Mahmoud and B V Ghita | 178 |
Application of LDPC Codes to Networks R Bijjargi M A Ambroze and B V Ghita | 195 |
AutoCalibration Gait Stabilisation G Michel and G Bugmann | 210 |
Assessing the Feasibility of Security Metrics | 88 |
A Navigation System for an Unmanned Aerial Vehicle Based on a Kalman Filtering Technique | 221 |
Чести термини и фразе
Accessed application assessment assets attacks Available average bandwidth bits Centre for Security Communications and Network congestion control congestion control algorithm convergence duration detection developed different packet loss e-mail e-safety EIGRP electricity consumption encryption evaluation evasion techniques Facebook feedback firewall harmonic home users IEEE impedance implementation info@cscan.org Abstract Information Security interarrival interface Internet investigation Java Card Kalman filter Keywords lock-in amplifier loss rate increasing magnetic malware measured method mobile neural Nmap Ofcom online collaboration operations organisation OSPF packet loss rate Parity Matrix payload performance PESQ Plymouth University pre-processors private key Regression requirements risk analysis risk model robot router routing protocol rules sample scan security metrics self-assessment framework signal Skype video calls Skype voice calls smart card SMEs Snort social networking software prototype subjective MOS target threats throughput tool traffic VoIP watermarking WiFi wires Wireshark