This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber ...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: C...
1 The Third International OPAALS Conference was an opportunity to explore and discuss digital ecosystem research issues as well as emerging and future trends in the field. The conference was organized by IPTI - Instituto de Pesquisas em Tecnologia e Inovacao (www. ipti. org. br). IPTI is a member of the OPAALS Framework P- gramme 7 Network of Excellence, which is led by the London School of Economics and Political Science. OPAALS is a multi-disciplinary research network of excellence for developing the science and technology behind digital ecosystems. The conference was held within the scope...
1 The Third International OPAALS Conference was an opportunity to explore and discuss digital ecosystem research issues as well as emerging and future...
This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security protocols.
This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 20...
Following the success of the First MOBILIGHT 2009 in Athens, Greece, the Second International Conference on Mobile Lightweight Systems (MOBILIGHT) was held in Barcelona, Spain on May 10-12, 2010. It was not an easy decision to carry on organizing a scientific event on wireless communications, where competition is really enormous. This decision was motivated by discussion with many colleagues about the current unprecedented demand for lig- weight, wireless communication devices with high usability and performance able to support added-value services in a highly mobile environment. Such devices...
Following the success of the First MOBILIGHT 2009 in Athens, Greece, the Second International Conference on Mobile Lightweight Systems (MOBILIGHT) was...
The advances in wireless communication technologies and the proliferation of mobile devices have enabled the realization of intelligent environments for people to c- municate with each other, interact with information-processing devices, and receive a wide range of mobile wireless services through various types of networks and systems everywhere, anytime. A key enabler of this pervasive and ubiquitous connectivity environments is the advancement of software technology in various communication sectors, ranging from communication middleware and operating systems to networking protocols and...
The advances in wireless communication technologies and the proliferation of mobile devices have enabled the realization of intelligent environments f...
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committee finally selected 15 full papers, 26 practices papers, and 22 posters. They focus on topics as Internet testbeds, future Internet research, wireless sensors, media and mobility, and monitoring in large scale testbeds.
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more tha...
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile tech...
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military applications. These networks were originally envisioned as collections of autonomous mobile or stationary nodes that dynamically auto-configure themselves into a wireless network without relying on any existing network infrastructure or centralized administration. With the significant advances in the last decade, the concept of ad hoc networks now covers an even broader scope, referring to the many types of autonomous wireless networks designed and...
Ad hoc networks, which include a variety of autonomous networks for specific purposes, promise a broad range of civilian, commercial, and military app...