Emerging Trends inICT Security
Edited by
Babak Akhgar
Hamid R. Arabnia
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Morgan Kaufmann is an imprint of Elsevier
Acquiring Editor: Steve Elliot
Editorial Project Manager: Kaitlin Herbert
Project Manager: Punithavathy GovindaradjaneDesigner: Maria Ines Cruz
Morgan Kaufmann is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright r 2014 Elsevier Inc. All rights reserved
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical,
including photocopying, recording, or any information storage and retrieval system, without permission in writingfrom the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies
and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency,
can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
NoticesKnowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods or professional practices, may become necessary. Practitioners
and researchers must always rely on their own experience and knowledge in evaluating and using any information
or methods described herein. In using such information or methods they should be mindful of their own safetyand the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability
for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or fromany use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication DataEmerging trends in ICT security / edited by Babak Akhgar, Hamid R. Arabnia.
pages cm
Includes bibliographical references and index.
ISBN 978-0-12-411474-6 (alk. paper)
1. Information technology!Security measures. 2. Computer crimes!Prevention.3. Cyberterrorism!Prevention. 4. Electronic surveillance. I. Akhgar, Babak, editor. II. Arabnia, Hamid, editor.
QA76.9.A25E467 2013
005.8–dc232013034381
British Library Cataloguing-in-Publication DataA catalogue record for this book is available from the British Library
ISBN: 978-0-12-411474-6
Printed and bound in the United States of America
14 15 16 17 18 10 9 8 7 6 5 4 3 2 1
For information on all MK publications visit our website at www.mkp.com
Contents
Acknowledgments ............................................................................................................................. xvii
About the Editors................................................................................................................................ xix
List of Contributors ............................................................................................................................ xxi
Preface .............................................................................................................................................. xxix
PART 1 INFORMATION AND SYSTEMS SECURITY
SECTION 1 Theory/Reviews of the field
CHAPTER 1 System Security Engineering for Information Systems....................5Introduction................................................................................................................5
System security engineering history .........................................................................6
Established system security engineering methods, processes, and tools .................8
Modern and emerging system security engineering methods, processes,
and tools...............................................................................................................13
Conclusion ...............................................................................................................20
Recommendations....................................................................................................20
Disclaimer ................................................................................................................20
Acknowledgments ...................................................................................................21
References................................................................................................................21
Further reading ........................................................................................................23
CHAPTER 2 Metrics and Indicators as Key Organizational Assetsfor ICT Security Assessment....................................................... 25Introduction..............................................................................................................25
GOCAME strategy overview ..................................................................................26
Security evaluation for a web system: A proof of concept....................................34
Related work............................................................................................................42
Conclusion and future work ....................................................................................43
References................................................................................................................43
v
CHAPTER 3 A Fresh Look at Semantic Natural Language InformationAssurance and Security: NL IAS from Watermarkingand Downgrading to Discovering Unintended Inferences andSituational Conceptual Defaults ................................................. 45Introduction..............................................................................................................45
Early breakthrough in NL IAS................................................................................46
A sketch of ontological semantic technology.........................................................51
Mature semantic NL IAS ........................................................................................54
Summary ..................................................................................................................60
Acknowledgments ...................................................................................................60
References................................................................................................................60
SECTION 2 Methods
CHAPTER 4 An Approach to Facilitate Security Assurance for InformationSharing and Exchange in Big-Data Applications .......................... 65Introduction..............................................................................................................65
UML extensions for XML security.........................................................................68
Extensions for policy modeling and integration.....................................................70
Integrating local security policies into a global security policy ............................74
Related work............................................................................................................81
Conclusion ...............................................................................................................82
References................................................................................................................83
CHAPTER 5 Gamification of Information Security Awareness Training............. 85Introduction..............................................................................................................85
Literature review......................................................................................................86
Gamification system................................................................................................89
Conclusion and future plans....................................................................................95
Acknowledgments ...................................................................................................96
References................................................................................................................96
CHAPTER 6 A Conceptual Framework for Information Security Awareness,Assessment, and Training .......................................................... 99Introduction..............................................................................................................99
Background and literature .....................................................................................100
Human factors and information security...............................................................102
Information security learning continuum..............................................................102
Dimensions of information security awareness ....................................................104
vi Contents
A field study ..........................................................................................................105
Concluding remarks...............................................................................................108
References..............................................................................................................109
Further Reading .....................................................................................................110
CHAPTER 7 Security Projects for Systems and Networking Professionals ..... 111Introduction............................................................................................................111
Background ............................................................................................................112
Cryptography .........................................................................................................112
Wireless network security .....................................................................................117
Conclusion .............................................................................................................120
References..............................................................................................................120
Further Reading .....................................................................................................122
SECTION 3 Case study
CHAPTER 8 Assessing the Role of Governments in SecuringE-Business: The Case of Jordan................................................ 125Introduction............................................................................................................125
Literature review....................................................................................................126
Security in Jordan’s E-business initiatives: An analysis ......................................129
Conclusion and recommendations.........................................................................134
References..............................................................................................................134
PART 2 NETWORK AND INFRASTRUCTURE SECURITY
SECTION 4 Theory Reviews of the field
CHAPTER 9 A Survey of Quantum Key Distribution (QKD) Technologies ......... 141Cryptography .........................................................................................................141
Quantum key distribution......................................................................................142
Quantum key distribution systems ........................................................................143
The future of QKD ................................................................................................146
A military QKD usage scenario ............................................................................149
Conclusion .............................................................................................................150
Disclaimer ..............................................................................................................150
Acknowledgments .................................................................................................150
References..............................................................................................................150
viiContents
CHAPTER 10 Advances in Self-Security of Agent-Based IntrusionDetection Systems................................................................... 153Introduction............................................................................................................153
Overview................................................................................................................154
Framework for self-security, self-reliability and self-integrity of
agent-based IDSs ...............................................................................................156
Prototyping and extending IDS-NIDIA ................................................................165
Tests .......................................................................................................................165
Related works ........................................................................................................166
Conclusion .............................................................................................................168
Acknowledgments .................................................................................................169
References..............................................................................................................169
Further reading ......................................................................................................171
CHAPTER 11 Secure Communication in Fiber-Optic Networks ........................ 173Introduction............................................................................................................173
Confidentiality .......................................................................................................174
Privacy and optical steganography........................................................................177
Availability ............................................................................................................179
Summary ................................................................................................................180
References..............................................................................................................181
SECTION 5 Methods
CHAPTER 12 Advanced Security Network Metrics......................................... 187Introduction............................................................................................................187
Related work..........................................................................................................188
Method description ................................................................................................189
Metrics definition ..................................................................................................193
Description of experiments ...................................................................................195
Results of experiments ..........................................................................................199
Conclusion .............................................................................................................201
References..............................................................................................................201
CHAPTER 13 Designing Trustworthy Software Systems Usingthe NFR Approach ................................................................... 203Introduction............................................................................................................203
The NFR approach ................................................................................................205
viii Contents
The Phoenix system and trustworthiness deficit ..................................................208
Application of the NFR approach for designing a trustworthy
Phoenix system ..................................................................................................209
Validation and lessons learned..............................................................................219
Summary ................................................................................................................223
Acknowledgments .................................................................................................223
References..............................................................................................................223
CHAPTER 14 Analyzing the Ergodic Secrecy Rates of CooperativeAmplify-and-Forward Relay Networks overGeneralized Fading Channels................................................... 227Introduction............................................................................................................227
Secure cooperative wireless communications.......................................................229
Computational results ............................................................................................231
Conclusion .............................................................................................................240
Appendix................................................................................................................241
References..............................................................................................................242
CHAPTER 15 Algebraic Approaches to a Network-Type PrivateInformation Retrieval............................................................... 245Introduction............................................................................................................245
The data processing scheme and statement of the problem.................................246
Algorithmic description of the solution ................................................................247
Algebraic description of the solution....................................................................249
Conclusion .............................................................................................................251
Summary ................................................................................................................251
References..............................................................................................................251
CHAPTER 16 Using Event Reasoning for TrajectoryTracking................................................................................. 253Introduction............................................................................................................253
Example .................................................................................................................254
Event model ...........................................................................................................255
Scenario adapts ......................................................................................................257
Event functions and inference rules ......................................................................259
Experiments ...........................................................................................................262
Summary ................................................................................................................264
Acknowledgments .................................................................................................265
References..............................................................................................................265
ixContents
CHAPTER 17 Resource-Efficient Multi-Source AuthenticationUtilizing Split-Join One-Way Key Chain..................................... 267Introduction............................................................................................................267
Related works ........................................................................................................268
Methodology ..........................................................................................................270
Conclusion .............................................................................................................278
Acknowledgments .................................................................................................278
References..............................................................................................................278
CHAPTER 18 Real-time Network Intrusion Detection Using Hadoop-BasedBayesian Classifier ................................................................. 281Introduction............................................................................................................281
Overview on Hadoop based technologies.............................................................282
Survey of Intrusion Detection Systems.................................................................285
Hadoop-based real-time Intrusion Detection: System architecture......................289
Practical application scenario and system evaluation...........................................290
Summary ................................................................................................................298
References..............................................................................................................298
CHAPTER 19 Optimum Countermeasure PortfolioSelection: A Knapsack Approach ............................................. 301Introduction............................................................................................................301
The Knapsack problem and a dynamic programming solution............................303
Problem description...............................................................................................304
The proposed binary knapsack-based approach and its dynamic
programming algorithm.....................................................................................306
Computational example and comparison ..............................................................309
Conclusion .............................................................................................................312
References..............................................................................................................313
CHAPTER 20 CSRF and Big Data: Rethinking Cross-Site Request Forgeryin Light of Big Data ................................................................. 315Introduction............................................................................................................315
SOP and CSRF ......................................................................................................316
Motivation and related work .................................................................................319
Defenses against CSRF: Server and browser Sides..............................................322
Experiment results: CSRF in social media and networking sites ........................324
Analysis of test framework with popular Web/URL scanning tools ...................330
x Contents
Conclusions and future work.................................................................................332
References..............................................................................................................333
CHAPTER 21 Security through Emulation-Based ProcessorDiversification ........................................................................ 335Introduction............................................................................................................335
Background and challenges...................................................................................337
Proposed security approach...................................................................................340
A case study: Web server......................................................................................344
Experimentation and results ..................................................................................349
Discussion ..............................................................................................................353
Conclusions and future work.................................................................................354
Acknowledgments .................................................................................................355
References..............................................................................................................355
CHAPTER 22 On the Use of Unsupervised Techniques for Fraud Detectionin VoIP Networks .................................................................... 359Introduction............................................................................................................359
Background ............................................................................................................360
Signature-based fraud detection ............................................................................364
Experiments ...........................................................................................................367
Conclusion .............................................................................................................372
References..............................................................................................................372
PART 3 MOBILE AND CLOUD COMPUTING
SECTION 6 Reviews of the field
CHAPTER 23 Emerging Security Challenges in Cloud Computing,from Infrastructure-Based Security to Proposed ProvisionedCloud Infrastructure ................................................................ 379Introduction............................................................................................................379
Background ............................................................................................................381
Infrastructure security............................................................................................381
Cloud service models ............................................................................................384
Provisioned access control infrastructure (DACI) ................................................392
Conclusion .............................................................................................................392
References..............................................................................................................393
xiContents
SECTION 7 Methods
CHAPTER 24 Detection of Intent-Based Vulnerabilitiesin Android Applications ........................................................... 397Introduction............................................................................................................397
Comparison to related work ..................................................................................398
Model definition and notations .............................................................................399
Vulnerability modeling..........................................................................................402
Security testing methodology................................................................................404
Implementation and experimentation....................................................................411
Conclusion .............................................................................................................416
Acknowledgments .................................................................................................416
References..............................................................................................................416
PART 4 CYBER CRIME AND CYBER TERRORISM
SECTION 8 Theory
CHAPTER 25 A Quick Perspective on the Current Statein Cybersecurity...................................................................... 423Introduction............................................................................................................423
The scope of cybersecurity....................................................................................423
Contributions .........................................................................................................424
Understanding the scope of cybersecurity ............................................................424
Malware, the infectious disease, and phishing, the fraud.....................................426
Vulnerabilities: The long exploitable holes ..........................................................430
Data breach: A faulty containment .......................................................................432
Cyber-war, the latest war front .............................................................................433
Lessons learned......................................................................................................436
References..............................................................................................................437
CHAPTER 26 A Paradigm Shift in Cyberspace Security .................................. 443Introduction............................................................................................................443
Cyber-terrorism......................................................................................................443
A security paradigm shift in cyberspace...............................................................445
Intelligent agents in security auditing ...................................................................446
Summary ................................................................................................................450
References..............................................................................................................450
xii Contents
SECTION 9 Methods
CHAPTER 27 Counter Cyber Attacks By Semantic Networks ........................... 455Introduction............................................................................................................455
Related work..........................................................................................................456
Methodology ..........................................................................................................457
Experiments ...........................................................................................................461
Conclusion and future work ..................................................................................465
Acknowledgments .................................................................................................466
References..............................................................................................................466
CHAPTER 28 Man-in-the-Browser Attacks in Modern Web Browsers .............. 469Introduction............................................................................................................469
Chapter overview...................................................................................................470
Related work..........................................................................................................471
Browser architecture..............................................................................................471
Man-in-the-browser attacks on different layers ....................................................472
Countermeasures....................................................................................................477
Conclusion .............................................................................................................479
References..............................................................................................................480
CHAPTER 29 Improving Security in Web Sessions: Special Managementof Cookies .............................................................................. 481Introduction............................................................................................................481
Related work..........................................................................................................482
Proposed mechanism for web session management .............................................484
Implementation and experiments ..........................................................................486
Conclusion and further work.................................................................................489
References..............................................................................................................490
CHAPTER 30 Leveraging Semantic Web Technologies for Access Control ...... 493Introduction............................................................................................................493
Implementing RBAC with ontologies...................................................................494
Semantically extending the XACML attribute model ..........................................495
Ontology-based context awareness .......................................................................496
Ontological specification of user preferences.......................................................497
Semantic access control in online social networks...............................................498
DEMONS ontological access control model ........................................................499
Discussion ..............................................................................................................502
xiiiContents
Acknowledgments .................................................................................................503
References..............................................................................................................504
CHAPTER 31 Cyber Security Education: The Merits of Firewall Exercises ....... 507Introduction............................................................................................................507
Criteria for firewall education...............................................................................508
Evaluation of firewall exercises ............................................................................509
Satisfying the criteria.............................................................................................511
Emerging trends in firewall education..................................................................514
Conclusion .............................................................................................................514
Acknowledgments .................................................................................................515
References..............................................................................................................515
SECTION 10 Case study
CHAPTER 32 Surveillance without Borders: The Case of Karen Refugeesin Sheffield............................................................................. 519Introduction............................................................................................................519
Background ............................................................................................................520
Methodological issues ...........................................................................................523
Analyzing discourse ..............................................................................................524
The hacking incident .............................................................................................524
“We are Watching You”: Analysis of discourse messages posted ......................527
Conclusion .............................................................................................................530
Appendix................................................................................................................531
References..............................................................................................................532
Further Reading .....................................................................................................533
PART 5 FOCUS TOPICS: FROM ONLINE RADICALISATIONTO ONLINE FINANCIAL CRIME
SECTION 11 Theory
CHAPTER 33 A Framework for the Investigation and Modeling of OnlineRadicalization and the Identification of Radicalized Individuals.....539Introduction............................................................................................................539
Systematic consideration of influencing factors: The
radicalization-factor model................................................................................541
xiv Contents
Identification of radicalized individuals: Behavioral
indicators............................................................................................................543
Application of the framework ...............................................................................545
References..............................................................................................................546
CHAPTER 34 Preventing Terrorism Together: A Framework toProvide Social Media Anti-Radicalization Trainingfor Credible Community Voices ................................................ 549Introduction............................................................................................................549
Online radicalization .............................................................................................551
Collaboration in counter-terrorism........................................................................553
Credible voices ......................................................................................................554
Conclusion .............................................................................................................555
References..............................................................................................................555
SECTION 12 Methods
CHAPTER 35 Investigating Radicalized Individual Profiles throughFuzzy Cognitive Maps.............................................................. 559Introduction............................................................................................................559
The radicalization process: How can it happen? ..................................................560
Investigating radical online profiles: A short overview
of existing methods ...........................................................................................564
Fuzzy cognitive mapping of factors for self-radicalization
as an alternative approach .................................................................................567
Conclusion .............................................................................................................571
References..............................................................................................................572
CHAPTER 36 Financial Security against Money Laundering:A Survey................................................................................. 577Money laundering..................................................................................................577
Anti-money laundering efforts ..............................................................................579
Estimating the extent of ML .................................................................................581
Data mining techniques for ML detection ............................................................585
Conclusion .............................................................................................................587
References..............................................................................................................588
xvContents
CHAPTER 37 Intelligent Banking XML Encryption Using Effective Fuzzy Logic 591Introduction............................................................................................................591
Literature review....................................................................................................592
System model and design......................................................................................594
Experiments and results.........................................................................................601
Summary ................................................................................................................612
References..............................................................................................................615
Further Reading .....................................................................................................617
Index .................................................................................................................................................. 619
xvi Contents
Acknowledgments
We wish to thank everyone who has contributed to this book. In particular, we would like toacknowledge the contribution of CENTRIC (Centre of excellence in terrorism, resilience, intelli-gence & organised crime research, at Sheffield Hallam University, UK). We would also like totake this opportunity to express our gratitude to the following as members of the book review boardfor their contributions to the final publication.
Review BoardBabak AkhgarHamid R. ArabniaBen BrewsterRichard HillHamid JahankhaniKayleigh JohnsonEleanor LockleyReza NasserzadehSimon PolovinaJawed SiddiqiAndrew Staniforth
xvii
About the Editors
Babak AkhgarBabak Akhgar is Professor of Informatics and Director of the Centre of excellence in terrorism,resilience, intelligence & organised crime research (CENTRIC) at Sheffield Hallam University, anda Fellow of the British Computer Society. Professor Akhgar graduated from Sheffield HallamUniversity in Software Engineering. After gaining considerable commercial experience as aStrategy Analyst and Methodology Director for several companies, he consolidated this experienceby obtaining a masters degree (with distinction) in Information Systems in Management and a PhDin Information Systems. He has more than 100 referred publications in international journals andconference proceedings. He is on the editorial boards of three international journals, and is chairand programme committee member of several international conferences. He has extensive hands-onexperience in development, management, and execution of large international KM and securityinitiatives (e.g., combating terrorism and organized crime, cybersecurity, public order, and cross-cultural ideology polarization). He also has an established network of collaborators in variousacademic and law enforcement agencies locally, nationally, and internationally. The impact of hisresearch on e-security, manifested in a multi-lingual portal for business crime reduction, andhis research on combating organized crime and terrorism led to an international research projectwith partners such as Europol and a number of LEAs (with a project value of 3.2 M Euro). He hasrecently written and edited a number of books on intelligence management and national security.
Hamid R. ArabniaHamid R. Arabnia received his Ph.D. degree in Computer Science from the University of Kent(Canterbury, England) in 1987 and since October of that year has been a Full Professor ofComputer Science at the University of Georgia (Georgia, USA). Professor Arabnia’s researchinterests include parallel and distributed processing techniques and algorithms, supercomputing, inter-connection networks, and applications. He is is Editor-in-Chief of the Journal of Supercomputing(one of the oldest journals in computer science), published by Springer, and has been AssociateEditor of IEEE Transactions on Information Technology in Biomedicine (2008!2011). He is also onthe editorial and advisory boards of over 35 other journals. Professor Arabnia is the founding chairof the annual World Congress in Computer Science, Computer Engineering, and Applied Computing(WORLDCOMP), and editor of Transactions on Computational Science and ComputationalIntelligence (Springer), and Transactions on Computer Science and Applied Computing (Elsevier).Prof. Arabnia has edited/co-edited over 100 books; his most recent co-edited book (Software Toolsand Algorithms for Biological Systems) is among the top 25 percent most downloaded Springere-books. Prof. Arabnia has published extensively in journals and refereed conference proceedings.He has over 350 publications (journals, proceedings, editorships) in his area of research. He has beena PI/Co-PI on approximately $7.5 M worth of externally funded projects/initiatives. During his tenureas Graduate Coordinator/Director of Computer Science (2002!2009), Dr. Arabnia secured the largestlevel of funding in the history of the department for supporting graduate students (PhD, MS).
xix
List of Contributors
Zair AbdelouahabFederal University of Maranhao, Sao Luıs, MA, Brazil
Maher AburrousAl Hoson University, Abu Dhabi, UAE
Eyidayo AdebolaPrairie View A&M University, Prairie View, TX, USA
Babak AkhgarSheffield Hallam University, Sheffield, UK
Sayed Alireza Hashemi GolpayeganiAmirkabir University of Technology (Tehran Polytechnic), Tehran, Iran
Ja’far AlqatawnaThe University of Jordan, Amman, Jordan
Omar Al-KadiThe University of Jordan, Amman, Jordan
Rizik Al-SayyedThe University of Jordan, Amman, Jordan
Faisal T. AmmariUniversity of Huddersfield, Huddersfield, UK
Annamalai AnnamalaiPrairie View A&M University, Prairie View, TX, USA
Manoj ApteTata Consultancy Services Limited, Pune, MH, India
Hamid R. ArabniaUniversity of Georgia, Athens, GA, USA
Vladimir B. Balakirsky†
State University of Aerospace Instrumentation, St-Petersburg, Russia
Maros BarabasBrno University of Technology, Brno, Czech Republic
Gerald BaumgartnerLaboratory for Telecommunications Science, College Park, MD, USA
†Deceased
xxi
Petra Saskia BayerlErasmus University, Rotterdam, The Netherlands
Timothy BowdenJacksonville State University, Jacksonville, AL, USA
Ben BrewsterSheffield Hallam University, Sheffield, UK
Roman BusseFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany
Petr ChmelarBrno University of Technology, Brno, Czech Republic
Seonho ChoiBowie State University, Bowie, MD, USA
John M. ColombiUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Guillermo CovellaNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina
Miles CrabillLewis & Clark College, Portland, OR, USA
Evan DamonLewis & Clark College, Portland, OR, USA
David de AndresUniversitat Politecnica de Valencia, Valencia, Spain
Alberto De la Rosa AlgarınUniversity of Connecticut, Storrs, CT, USA
Leonidas DeligiannidisWentworth Institute of Technology, Boston, MA, USA
Nikolaos L. DellasSingularLogic Software and Integrated IT Solutions, Nea Ionia, Greece
Steven A. DemurjianUniversity of Connecticut, Storrs, CT, USA
Alexander DieserNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina
Steven DragerUS Air Force Research Lab, Rome, NY, USA
xxii List of Contributors
Michal DrozdBrno University of Technology, Brno, Czech Republic
Hyeonsang EomSeoul National University, Seoul, Korea
Diogo A.B. FernandesUniversity of Beira Interior, Covilha, Portugal
Guillermo Francia, IIIJacksonville State University, Jacksonville, AL, USA
Mario M. FreireUniversity of Beira Interior, Covilha, Portugal
Kaleb GanzLewis & Clark College, Portland, OR, USA
Qigang GaoDalhousie University, Halifax, NS, Canada
Anahit R. GhazaryanState University of Aerospace Instrumentation, St-Petersburg, Russia
Joao V. GomesUniversity of Beira Interior, Covilha, Portugal
Geff GreenSheffield Hallam University, Sheffield, UK
Michael R. GrimailaUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Petr HanacekBrno University of Technology, Brno, Czech Republic
Mohammad HassanzadehTarbiat Modares University, Tehran, Iran
Peng HeUniversity of Maryland, Baltimore, MD, USA
Douglas D. HodsonUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Ivan HomoliakBrno University of Technology, Brno, Czech Republic
xxiiiList of Contributors
Mihai Horia Zaharia“Gheorghe Asachi” Technical University, Iasi, Romania
Claire HumbeutelLewis & Clark College, Portland, OR, USA
Pedro R.M. InacioUniversity of Beira Interior, Covilha, Portugal
David JacquesUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Narges JahangiriMinistry of Education, Tehran, Iran
Kayleigh JohnsonSheffield Hallam University, Sheffield, UK
Dimitra I. KaklamaniNational Technical University of Athens, Athens, Greece
Maria N. KoukoviniNational Technical University of Athens, Athens, Greece
Sofiane LabidiFederal University of Maranhao, Sao Luıs, MA, Brazil
Ville LeppanenUniversity of Turku, Turku, Finland
Georgios V. LioudakisNational Technical University of Athens, Athens, Greece
Eleanor LockleySheffield Hallam University, Sheffield, UK
Denivaldo LopesFederal University of Maranhao, Sao Luıs, MA, Brazil
Pascal LorenzUniversity of Haute Alsace, Colmar, France
J. LuUniversity of Huddersfield, Huddersfield, UK
Jianbing MaBournemouth University, Bournemouth, UK
xxiv List of Contributors
Jens MacheLewis & Clark College, Portland, OR, USA
Nicolas MaciaThe National University of La Plata, La Plata, BA, Argentina
Logan O. MaillouxUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Hector MarcoUniversitat Politecnica de Valencia, Valencia, Spain
Maria Angel Marquez-AndradeYork University, Toronto, ON, Canada
William McKeeverUS Air Force Research Lab, Rome, NY, USA
Davud MohammadpurUniversity of Zanjan, Zanjan, Iran
Seyyed Mohammad Reza FarshchiFerdowsi University of Mashhad, Mashhad, Iran
Falkner MoraesFederal University of Maranhao, Sao Luıs, MA, Brazil
Jeffrey D. MorrisUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Anas NajdawiPrincess Sumaya University for Information Technology, Amman, Jordan
Samir M.R. NasserzadehUniversity of Tehran, Tehran, Iran
Holger NitschFachhochschule fur Offenttliche Verwaltung und Rechtspflege in Bayern, Bavaria, Germany
Abiodun OlaluwePrairie View A&M University, Prairie View, TX, USA
Emerson OliveiraFederal University of Maranhao, Sao Luıs, MA, Brazil
Luis OlsinaNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina
xxvList of Contributors
Girish Keshav PalshikarTata Consultancy Services Limited, Pune, MH, India
Eugenia I. PapagiannakopoulouNational Technical University of Athens, Athens, Greece
Paul R. PrucnalPrinceton University, Princeton, NJ, USA
Tran Quang ThanhFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany
Victor RaskinPurdue University, West Lafayette, IN, USA
Sampsa RautiUniversity of Turku, Turku, Finland
Yacine RebahiFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany
Mohammad Reza MovahedisefatAmirkabir University of Technology (Tehran Polytechinc), Tehran, Iran
Ismael RipollUniversitat Politecnica de Valencia, Valencia, Spain
Hamzeh RoumaniYork University, Toronto, ON, Canada
Juan Carlos RuizUniversitat Politecnica de Valencia, Valencia, Spain
Sebastien SalvaUniversity of Auvergne, Clermont-Ferrand, France
Maryam ShahpasandAmirkabir University of Technology (Tehran Polytechnic), Tehran, Iran
Bhavin J. ShastriPrinceton University, Princeton, NJ, USA
Jawed SiddiqiSheffield Hallam University, Sheffield, UK
Liliana F.B. SoaresUniversity of Beira Interior, Covilha, Portugal
xxvi List of Contributors
Andrew StaniforthNorth East Counter Terrorism Unit, West Yorkshire Police, West Yorkshire, UK
Nary SubramanianUniversity of Texas at Tyler, Tyler, TX, USA
Kun SunGeorge Mason University, Fairfax, VA, USA
Fahimeh TabatabayiMehrAlborz University, Tehran, Iran
Julia M. TaylorPurdue University, West Lafayette, IN, USA
Cenidalva TeixeiraFederal University of Maranhao, Sao Luıs, MA, Brazil
Ariel TelesFederal University of Maranhao, Sao Luıs, MA, Brazil
David ThorntonJacksonville State University, Jacksonville, AL, USA
Fernando G. TinettiThe National University of La Plata, La Plata, BA, Argentina
Monica TrifasJacksonville State University, Jacksonville, AL, USA
Sanjai VeetilDalhousie University, Halifax, NS, Canada
Lakovos S. VenierisNational Technical University of Athens, Athens, Greece
Natalija VlajicYork University, Toronto, ON, Canada
Richard WeissEvergreen State College, Olympia, WA, USA
Charlie WisemanWentworth Institute of Technology, Boston, MA, USA
xxviiList of Contributors