IEEE NETWORK SECURITY AND CRYPTOGRAPHY PROJECT TITLES(FINAL PROJECTS 2030)

Similar documents
List of Projects in Application

IEEE JAVA Project 2012

Certified Cyber Security Analyst VS-1160

About the Authors Preface Acknowledgements List of Acronyms

Bellevue University Cybersecurity Programs & Courses

Global Soft Solutions JAVA IEEE PROJECT TITLES

Implementing Cisco IOS Network Security

Jort Kollerie SonicWALL

Introduction to Cyber Security / Information Security

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

A Model-based Methodology for Developing Secure VoIP Systems

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Build Your Own Security Lab

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Single Sign-On Secure Authentication Password Mechanism

Information Security Basic Concepts

McAfee Network Security Platform

CEH Version8 Course Outline

Security Goals Services

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Internet of Things (IoT): A vision, architectural elements, and future directions

Wireless Sensor Networks Chapter 14: Security in WSNs

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

IINS Implementing Cisco Network Security 3.0 (IINS)

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

IEEE JAVA TITLES

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

SANE: A Protection Architecture For Enterprise Networks

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

LIST OF FIGURES. Figure No. Caption Page No.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

IPv6 First Hop Security Protecting Your IPv6 Access Network

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Master of Science in Information Systems & Security Management. Courses Descriptions

CYBERTRON NETWORK SOLUTIONS

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Cisco Advanced Services for Network Security

A Systems Engineering Approach to Developing Cyber Security Professionals

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Distributed Denial of Service Attack Tools

Basics of Internet Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Denial of Service Attacks and Resilient Overlay Networks

Security and Privacy in Cloud Computing

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Click to edit Master title style

EECS 588: Computer and Network Security. Introduction

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

Weighted Total Mark. Weighted Exam Mark

A Catechistic Method for Traffic Pattern Discovery in MANET

Cross-layer security and resilience in wireless mesh networks

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

10CS64: COMPUTER NETWORKS - II

Update On Smart Grid Cyber Security

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Intrusion Detection for Mobile Ad Hoc Networks

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Networking: EC Council Network Security Administrator NSA

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Content Protection and Security Considerations for 5G KILROY HUGHES

How To Secure Wireless Networks

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Security for Ad Hoc Networks. Hang Zhao

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

The Information Security Problem

CRYPTOGRAPHY AND NETWORK SECURITY

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

IT Networking and Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

CHAPTER 1 INTRODUCTION

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A Resilient Protection Device for SIEM Systems

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Bachelor of Information Technology (Network Security)

Securing MANET Using Diffie Hellman Digital Signature Scheme

Data Security Concerns for the Electric Grid

ATTPS Publication: Trustworthy ICT Taxonomy

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

CISCO IOS NETWORK SECURITY (IINS)

6LoWPAN Technical Overview

Transcription:

IEEE NETWORK SECURITY AND CRYPTOGRAPHY PROJECT TITLES(FINAL PROJECTS 2030) New Key Management Approach for Broadcast and Multicast Services, IEEE Communications Letters, Feb 2011[Java] Towards Situational Awareness of Large-Scale Botnet Probing Events, IEEE Transactions on Information Forensics and Security, March 2011[Java] A Privacy-Preserving Buyer Seller Watermarking Protocol Based on Priced Oblivious Transfer, IEEE Transactions on Information Forensics and Security, March 2011[Java] A Robust and Fast Video Copy Detection System Using Content- Based Fingerprinting, IEEE Transactions on Information Forensics and Security, March 2011[Java] Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure, IEEE Transactions on Mobile Computing, August On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, August 2011[NS2]

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing, IEEE Transactions on Mobile Computing, June A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE Transactions on Dependable and Secure Computing, April Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE INFOCOM, April 2011[Java] Secure High-Throughput Multicast Routing in Wireless Mesh Networks, IEEE Transactions on Mobile Computing, May 2011[NS2] Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, IEEE Transactions on Mobile Computing, Feb Secure Multihop Network Programming with Multiple One-Way Key Chains, IEEE Transactions on Mobile Computing, Jan A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, Jan

On the Price of Security in Large-Scale Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, April Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks, IEEE Transactions on Network and Service Management, June 2011 [Java/NS2] On the Impact of Security Protocols on the Performance of SNMP, IEEE Transactions on Network and Service Management, June 2011[Java] Mechanism Design-Based Secure Leader Election Model Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, Feb 2011[NS2] Modeling and Detection of Camouflaging Worm, IEEE Transactions on Dependable and Secure Computing, June A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, Aug 2011[Java] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, July 2011[Java]

An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, March Comparative Evaluation of Spoofing Defenses, IEEE Transactions on Dependable and Secure Computing, April 2011(NS2) Data Integrity Proofs in Cloud Storage, Third International Conference on Communication Systems and Networks,Jan 2011[Java] Efficient Certificate Revocation List Organization and Distribution, IEEE Journal on Selected Areas in Communications, March 2011[Java] Sybil Attacks Detection in Vehicular Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, March Privacy in VoIP Networks: Flow Analysis Attacks and Defense, IEEE Transactions on Parallel and Distributed Systems, April 2011[NS2] RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications, IEEE Journal on Selected Areas in Communications, March

Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks, IEEE Communications Letters, April A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks, IEEE Transactions on Computers, July On Ultralightweight RFID Authentication Protocols, IEEE Transactions on Dependable and Secure Computing, Aug 2011[Java] A Policy Enforcing Mechanism for Trusted Ad Hoc Networks, IEEE Transactions on Dependable and Secure Computing, June Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing, April Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, Feb 2011[NS2] Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids, IEEE Transactions on Information Technology in Biomedicine, March 2011[Java]

Improving Security and Efficiency in Attribute-Based Data Sharing, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Resilient Identity Crime Detection, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data, IEEE Transactions on Knowledge and Data Engineering, 2011[Java] Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes, IEEE Transactions on Vehicular Technology, June 2009 (NS2) Vulnerability Discovery with Attack Injection, IEEE Transactions on Software Engineering, May2010 (Java) Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems, IEEE Transactions on Parallel and Distributed Systems, August 2010 (NS2) A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory, IEEE Transactions on Dependable and Secure Computing, March 2010 ( J2EE/.NET) Dynamic rekeying in 3GPP multimedia broadcast/multicast

service (MBMS) IEEE Communications Letters, April 2010 (JAVA) Authenticated Group Key Transfer Protocol Based on Secret Sharing, IEEE Transactions on Computers, June 2010 ( JAVA) An Advanced Hybrid Peer-to-Peer Botnet, IEEE Transactions on Dependable and Secure Computing, June 2010 ( JAVA) Using Web-Referral Architectures to Mitigate Denial-of-Service Threats, IEEE Transactions on Dependable and Secure Computing, June 2010 ( J2EE/.NET) Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, June 2010 ( JAVA) An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature, IEEE Transactions on Information Forensics and Security, March 2010 (JAVA ) MABS: Multicast Authentication Based on Batch Signature, IEEE Transactions on Mobile Computing, July 2010 (Java) Provably Secure Steganography, IEEE Transactions on Computers, May 2009 ( Java )

The Design of a Generic Intrusion-Tolerant Architecture for Web Servers, IEEE Transactions on Dependable and Secure Computing, Jan.-March 2009 ( J2EE ) Monitoring the Application-Layer DDoS Attacks for Popular Websites, IEEE/ACM Transactions on Networking, Feb. 2009( J2EE/.NET ) Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET, IEEE Transactions on Dependable and Secure Computing, June 2009 (NS2) A Gen2-Based RFID Authentication Protocol for Security and Privacy, IEEE Transactions on Mobile Computing, Aug. 2009 ( Java ) Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices, IEEE Transactions on Computers, June 2008 ( Java ) An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, IEEE Transactions on Dependable and Secure Computing, April-June 2008 ( Java ) Controlling IP Spoofing through Interdomain Packet Filters, IEEE Transactions on Dependable and Secure Computing, Jan.- March 2008 ( NS2 )

Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, Jan.- March 2008 (J2EE/.NET) Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, IEEE Transactions on Parallel and Distributed Systems, May 2008( Java ) Keep Passwords Away from Memory: Password Caching and Verification Using TPM, 22nd Int l Conf on Advanced Information Networking and Applications, March 2008( Java ) Agent Based Architecture for Secure Access from Multiple Hospitals, Seventh IEEE/ACIS Intl Conf on Computer and Information Science, May 2008(.NET ) Wallet Based E-Cash System for Secured Multi-hop Cash Exchange, 3rd Int l Conference on Information and Communication Technologies: Theory to Applications, April 2008 ( J2EE ) Intelligent Phishing Website Detection System using Fuzzy Techniques, 3rd Int l Conf on Information and Communication Technologies:Theory to Applications, April 2008( J2EE /.NET) Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Transactions on Parallel and Distributed Systems, Dec. 2007(NS2)

Secure Internet Banking Authentication, IEEE Security and Privacy April 2006(J2EE) A Practical Password-Based Two-Server Authentication and Key Exchange System, IEEE Transactions On Dependable And Secure Computing, June 2006( J2EE )