TY - BOOK AU - Zia,Tanveer AU - Zomaya,Albert AU - Varadharajan,Vijay AU - Mao,Morley ED - SpringerLink (Online service) TI - Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers T2 - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, SN - 9783319042831 AV - QA76.9.A25 U1 - 005.8 23 PY - 2013/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Computer science KW - Computer communication systems KW - Computer security KW - Data encryption (Computer science) KW - Computers and civilization KW - Computer Science KW - Systems and Data Security KW - Computer Communication Networks KW - Data Encryption KW - Computers and Society KW - Information Systems Applications (incl. Internet) N1 - Security & amp; Privacy in Mobile, Sensor and Ad Hoc Networks -- Malware, Botnets and Distributed Denial of Service -- Security for Emerging Technologies: VoIP, Peer-to-peer and Cloud Computing -- Encryption and Key Management -- Security in Software and Machine Learning -- Network and System Security Model -- Security and Privacy in Pervasive and Ubiquitous Computing ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security N2 - This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing UR - http://dx.doi.org/10.1007/978-3-319-04283-1 ER -