ebook img

International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence PDF

534 Pages·2018·42.35 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence

Advances in Intelligent Systems and Computing 580 Jemal Abawajy Kim-Kwang Raymond Choo Rafiqul Islam E ditors International Conference on Applications and Techniques in Cyber Security and Intelligence Applications and Techniques in Cyber Security and Intelligence Advances in Intelligent Systems and Computing Volume 580 Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected] About this Series Theseries“AdvancesinIntelligentSystemsandComputing”containspublicationsontheory, applications,anddesignmethodsofIntelligentSystemsandIntelligentComputing.Virtually alldisciplinessuchasengineering,naturalsciences,computerandinformationscience,ICT, economics,business,e-commerce,environment,healthcare,lifesciencearecovered.Thelist oftopicsspansalltheareasofmodernintelligentsystemsandcomputing. Thepublicationswithin“AdvancesinIntelligentSystemsandComputing”areprimarily textbooksandproceedingsofimportantconferences, symposiaandcongresses.Theycover significantrecentdevelopmentsinthefield,bothofafoundationalandapplicablecharacter. Animportantcharacteristicfeatureoftheseriesistheshortpublicationtimeandworld-wide distribution. Thispermitsarapid andbroaddissemination ofresearch results. Advisory Board Chairman Nikhil R. Pal,Indian Statistical Institute,Kolkata, India e-mail: [email protected] Members Rafael Bello Perez,UniversidadCentral “Marta Abreu”deLasVillas,Santa Clara, Cuba e-mail: [email protected] Emilio S.Corchado, University of Salamanca, Salamanca, Spain e-mail: [email protected] HaniHagras, University of Essex, Colchester, UK e-mail: [email protected] LászlóT. Kóczy, SzéchenyiIstván University, Győr,Hungary e-mail: [email protected] VladikKreinovich, University of Texasat ElPaso, ElPaso, USA e-mail: [email protected] Chin-Teng Lin, National ChiaoTung University,Hsinchu, Taiwan e-mail: [email protected] Jie Lu,University of Technology,Sydney,Australia e-mail: [email protected] Patricia Melin,Tijuana Institute of Technology,Tijuana, Mexico e-mail: [email protected] Nadia Nedjah,State University of RiodeJaneiro,RiodeJaneiro, Brazil e-mail: [email protected] Ngoc ThanhNguyen, Wroclaw University of Technology,Wroclaw,Poland e-mail: [email protected] Jun Wang, TheChineseUniversity of HongKong,Shatin, HongKong e-mail: [email protected] More information about this series at http://www.springer.com/series/11156 Jemal Abawajy Kim-Kwang Raymond Choo (cid:129) fi Ra qul Islam Editors International Conference on Applications and Techniques in Cyber Security and Intelligence Applications and Techniques in Cyber Security and Intelligence 123 Editors Jemal Abawajy Rafiqul Islam Faculty of Science, Engineering andBuilt Schoolof Computing andMathematics Environment CharlesSturt University Deakin University Albury, NSW Geelong,VIC Australia Australia Kim-Kwang RaymondChoo Department ofInformation Systems andCyberSecurity TheUniversity of Texasat SanAntonio SanAntonio, TX USA ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems andComputing ISBN978-3-319-67070-6 ISBN978-3-319-67071-3 (eBook) DOI 10.1007/978-3-319-67071-3 LibraryofCongressControlNumber:2017952383 ©SpringerInternationalPublishingAG2018 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. Printedonacid-freepaper ThisEdizionidellaNormaleimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The2017InternationalConferenceonApplicationsandTechniquesinCyberSecurity and Intelligence (ATCSI) focuses on all aspects of techniques and applications in cyberandelectronicssecurityandintelligenceresearch.ATCI2017,buildingonthe previoussuccessesinGuangzhou,China(2016),Dallas,USA(2015),Beijing,China (2014),andSydney,Australia(2013),isproudtobeinthefifthconsecutiveconfer- ence year. The purpose of ATCI 2017 is to provide a forum for presentation and discussionofinnovativetheory,methodologyandappliedideas,cutting-edgeresearch results,and novel techniques, methods,and applicationsonall aspects ofcyberand electronics security and intelligence. The conference establishes an international forum and aims to bring recent advances in the ever-expanding cybersecurity area includingitsfundamentals,algorithmicdevelopments,andapplications. Each paper was reviewed by at least three independent experts, and the accep- tance rate was 30%. The conference would not have been possible without the contributions of the authors. We sincerely thank all the authors for their valuable contributions. We would like to express our appreciation to all members of the ProgramCommitteefortheirvaluableeffortsinthereviewprocessthathelpedusto guarantee the highest quality of the selected papers for the conference. We would like to express our thanks to Professor Mohammed Atiquzzaman, University of Oklahoma, USA, Dr. Dave Towey, University of Nottingham, UK, and Professor Wenhua Yu, Key Laboratory of Big Data Science and Engineering, China, for being the keynote speakers at the conference. Also, we would like to express our highest gratitude to Zhejiang Business Technology Institute, Ningbo, China. We would also thank the Steering Committee, General Chairs, Program CommitteeChairs,OrganizingChairs,andWorkshopChairs.Thelocalorganizers’ and the students’ help is highly appreciated. v vi Foreword Our special thanks are due also to Mr. Suresh Rettagunta and Dr. Thomas Ditzinger for publishing the proceedings in Advances in Intelligent Systems and Computing of Springer. Jemal Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Organization Committee General Chairs Tharam Dillon La Trobe University, Australia, IEEE Life Fellow Hui Zhang Tsinghua University, China, Chang Jiang Scholars Program Chairs Jemal Abawajy Deakin University, Australia Kim-Kwang Raymond The University of Texas at San Antonio, USA Choo Rafiqul Islam Charles Sturt University, Australia Publication Chairs Zheng Xu TRIMPS, China Mazin Yousif T-Systems International, USA Publicity Chairs Fangqi Cheng Zhejiang Business Technology Institute, China Kewei Sha University of Houston, USA Yongchun Xu Zhejiang Business Technology Institute, China vii viii Organization Neil. Y. Yen University of Aizu, Japan Vijayan Sugumaran Oakland University, USA Local Organizing Chairs Qifu Yao Zhejiang Business Technology Institute, China Zhichun Zhou Zhejiang Business Technology Institute, China Yongchun Xu Zhejiang Business Technology Institute, China Xiaodong Lou Zhejiang Business Technology Institute, China Kun Gao Zhejiang Business Technology Institute, China Program Committee Members William Bradley University of South Alabama, USA Glisson George Grispos University of Limerick, Ireland Abdullah Azfar KPMG Sydney, Australia Aniello Castiglione Università di Salerno, Italy Florin Pop University Politehnica of Bucharest, Romania Ben Martini University of South Australia, Australia Wei Wang The University of Texas at San Antonio, USA Zheng Xu Tsinghua University, China Neil Yen University of Aizu, Japan Meng Yu The University of Texas at San Antonio, USA Shunxiang Zhang Anhui Univ. of Sci. & Tech., China Guangli Zhu Anhui Univ. of Sci. & Tech., China Tao Liao Anhui Univ. of Sci. & Tech., China Xiaobo Yin Anhui Univ. of Sci. & Tech., China Xiangfeng Luo Shanghai Univ., China Xiao Wei Shanghai Univ., China Wei Wei Xi’an Univ. Technology, China Huan Du Shanghai Univ., China Zhiguo Yan Fudan University, China Rick Church UC Santa Barbara, USA Tom Cova University of Utah, USA Susan Cutter University of South Carolina, USA Zhiming Ding Beijing University of Technology, China Yong Ge University of North Carolina at Charlotte, USA Danhuai Guo Computer Network Information Center, Chinese Academy of Sciences, China Jeng-Neng Hwang University of Washington, USA Jianping Fang University of North Carolina at Charlotte, USA Organization ix Jianhui Li Computer Network Information Center, Chinese Academy of Sciences, China Yi Liu Tsinghua University, China Foluso Ladeinde SUNU Korea Kuien Liu Pivotal Inc., USA Feng Lu Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences Ricardo J. Soares University of Queensland, Australia Magalhaes Alan Murray Drexel University, USA Yasuhide Okuyama University of Kitakyushu, Japan Xiaogang Qiu National University of Defense Technology, China Xing Xie Microsoft Research Asia Wei Xu Renmin University of China Chaowei Phil Yang George Mason University, USA Wenwu Yin China CDC, USA C. Dajun Zeng InstituteofAutomation,ChineseAcademyofSciences, China Hengshu Zhu Baidu Inc., China Morshed Chowdhury Deakin University, Australia External Reviewers Zheng Xu Tsinghua University, China Neil Yen University of Aizu, Japan Shunxiang Zhang Anhui Univ. of Sci. & Tech., China Guangli Zhu Anhui Univ. of Sci. & Tech., China Tao Liao Anhui Univ. of Sci. & Tech., China Xiaobo Yin Anhui Univ. of Sci. & Tech., China Xiangfeng Luo Shanghai Univ., China Xiao Wei Shanghai Univ., China Huan Du Shanghai Univ., China Zhiguo Yan Fudan University, China Zhiming Ding Beijing University of Technology, China Danhuai Guo Computer Network Information Center, Chinese Academy of Sciences Yi Liu Tsinghua University, China Kuien Liu Pivotal Inc., USA Feng Lu Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences Xiaogang Qiu National University of Defense Technology, China Wei Xu Renmin University of China

Description:
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenti
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.