+ All Categories
Home > Documents > Emerging Trends in ICT Security - York Universityroumani/EmergingTOC.pdf · can be found at our...

Emerging Trends in ICT Security - York Universityroumani/EmergingTOC.pdf · can be found at our...

Date post: 13-Apr-2018
Category:
Upload: doanque
View: 215 times
Download: 3 times
Share this document with a friend
29
Transcript

Emerging Trends inICT Security

This page intentionally left blank

Emerging Trends inICT Security

Edited by

Babak Akhgar

Hamid R. Arabnia

AMSTERDAM • BOSTON • HEIDELBERG • LONDON

NEW YORK • OXFORD • PARIS • SAN DIEGO

SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO

Morgan Kaufmann is an imprint of Elsevier

Acquiring Editor: Steve Elliot

Editorial Project Manager: Kaitlin Herbert

Project Manager: Punithavathy GovindaradjaneDesigner: Maria Ines Cruz

Morgan Kaufmann is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

Copyright r 2014 Elsevier Inc. All rights reserved

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical,

including photocopying, recording, or any information storage and retrieval system, without permission in writingfrom the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies

and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency,

can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher

(other than as may be noted herein).

NoticesKnowledge and best practice in this field are constantly changing. As new research and experience broaden our

understanding, changes in research methods or professional practices, may become necessary. Practitioners

and researchers must always rely on their own experience and knowledge in evaluating and using any information

or methods described herein. In using such information or methods they should be mindful of their own safetyand the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability

for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or fromany use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication DataEmerging trends in ICT security / edited by Babak Akhgar, Hamid R. Arabnia.

pages cm

Includes bibliographical references and index.

ISBN 978-0-12-411474-6 (alk. paper)

1. Information technology!Security measures. 2. Computer crimes!Prevention.3. Cyberterrorism!Prevention. 4. Electronic surveillance. I. Akhgar, Babak, editor. II. Arabnia, Hamid, editor.

QA76.9.A25E467 2013

005.8–dc232013034381

British Library Cataloguing-in-Publication DataA catalogue record for this book is available from the British Library

ISBN: 978-0-12-411474-6

Printed and bound in the United States of America

14 15 16 17 18 10 9 8 7 6 5 4 3 2 1

For information on all MK publications visit our website at www.mkp.com

Contents

Acknowledgments ............................................................................................................................. xvii

About the Editors................................................................................................................................ xix

List of Contributors ............................................................................................................................ xxi

Preface .............................................................................................................................................. xxix

PART 1 INFORMATION AND SYSTEMS SECURITY

SECTION 1 Theory/Reviews of the field

CHAPTER 1 System Security Engineering for Information Systems....................5Introduction................................................................................................................5

System security engineering history .........................................................................6

Established system security engineering methods, processes, and tools .................8

Modern and emerging system security engineering methods, processes,

and tools...............................................................................................................13

Conclusion ...............................................................................................................20

Recommendations....................................................................................................20

Disclaimer ................................................................................................................20

Acknowledgments ...................................................................................................21

References................................................................................................................21

Further reading ........................................................................................................23

CHAPTER 2 Metrics and Indicators as Key Organizational Assetsfor ICT Security Assessment....................................................... 25Introduction..............................................................................................................25

GOCAME strategy overview ..................................................................................26

Security evaluation for a web system: A proof of concept....................................34

Related work............................................................................................................42

Conclusion and future work ....................................................................................43

References................................................................................................................43

v

CHAPTER 3 A Fresh Look at Semantic Natural Language InformationAssurance and Security: NL IAS from Watermarkingand Downgrading to Discovering Unintended Inferences andSituational Conceptual Defaults ................................................. 45Introduction..............................................................................................................45

Early breakthrough in NL IAS................................................................................46

A sketch of ontological semantic technology.........................................................51

Mature semantic NL IAS ........................................................................................54

Summary ..................................................................................................................60

Acknowledgments ...................................................................................................60

References................................................................................................................60

SECTION 2 Methods

CHAPTER 4 An Approach to Facilitate Security Assurance for InformationSharing and Exchange in Big-Data Applications .......................... 65Introduction..............................................................................................................65

UML extensions for XML security.........................................................................68

Extensions for policy modeling and integration.....................................................70

Integrating local security policies into a global security policy ............................74

Related work............................................................................................................81

Conclusion ...............................................................................................................82

References................................................................................................................83

CHAPTER 5 Gamification of Information Security Awareness Training............. 85Introduction..............................................................................................................85

Literature review......................................................................................................86

Gamification system................................................................................................89

Conclusion and future plans....................................................................................95

Acknowledgments ...................................................................................................96

References................................................................................................................96

CHAPTER 6 A Conceptual Framework for Information Security Awareness,Assessment, and Training .......................................................... 99Introduction..............................................................................................................99

Background and literature .....................................................................................100

Human factors and information security...............................................................102

Information security learning continuum..............................................................102

Dimensions of information security awareness ....................................................104

vi Contents

A field study ..........................................................................................................105

Concluding remarks...............................................................................................108

References..............................................................................................................109

Further Reading .....................................................................................................110

CHAPTER 7 Security Projects for Systems and Networking Professionals ..... 111Introduction............................................................................................................111

Background ............................................................................................................112

Cryptography .........................................................................................................112

Wireless network security .....................................................................................117

Conclusion .............................................................................................................120

References..............................................................................................................120

Further Reading .....................................................................................................122

SECTION 3 Case study

CHAPTER 8 Assessing the Role of Governments in SecuringE-Business: The Case of Jordan................................................ 125Introduction............................................................................................................125

Literature review....................................................................................................126

Security in Jordan’s E-business initiatives: An analysis ......................................129

Conclusion and recommendations.........................................................................134

References..............................................................................................................134

PART 2 NETWORK AND INFRASTRUCTURE SECURITY

SECTION 4 Theory Reviews of the field

CHAPTER 9 A Survey of Quantum Key Distribution (QKD) Technologies ......... 141Cryptography .........................................................................................................141

Quantum key distribution......................................................................................142

Quantum key distribution systems ........................................................................143

The future of QKD ................................................................................................146

A military QKD usage scenario ............................................................................149

Conclusion .............................................................................................................150

Disclaimer ..............................................................................................................150

Acknowledgments .................................................................................................150

References..............................................................................................................150

viiContents

CHAPTER 10 Advances in Self-Security of Agent-Based IntrusionDetection Systems................................................................... 153Introduction............................................................................................................153

Overview................................................................................................................154

Framework for self-security, self-reliability and self-integrity of

agent-based IDSs ...............................................................................................156

Prototyping and extending IDS-NIDIA ................................................................165

Tests .......................................................................................................................165

Related works ........................................................................................................166

Conclusion .............................................................................................................168

Acknowledgments .................................................................................................169

References..............................................................................................................169

Further reading ......................................................................................................171

CHAPTER 11 Secure Communication in Fiber-Optic Networks ........................ 173Introduction............................................................................................................173

Confidentiality .......................................................................................................174

Privacy and optical steganography........................................................................177

Availability ............................................................................................................179

Summary ................................................................................................................180

References..............................................................................................................181

SECTION 5 Methods

CHAPTER 12 Advanced Security Network Metrics......................................... 187Introduction............................................................................................................187

Related work..........................................................................................................188

Method description ................................................................................................189

Metrics definition ..................................................................................................193

Description of experiments ...................................................................................195

Results of experiments ..........................................................................................199

Conclusion .............................................................................................................201

References..............................................................................................................201

CHAPTER 13 Designing Trustworthy Software Systems Usingthe NFR Approach ................................................................... 203Introduction............................................................................................................203

The NFR approach ................................................................................................205

viii Contents

The Phoenix system and trustworthiness deficit ..................................................208

Application of the NFR approach for designing a trustworthy

Phoenix system ..................................................................................................209

Validation and lessons learned..............................................................................219

Summary ................................................................................................................223

Acknowledgments .................................................................................................223

References..............................................................................................................223

CHAPTER 14 Analyzing the Ergodic Secrecy Rates of CooperativeAmplify-and-Forward Relay Networks overGeneralized Fading Channels................................................... 227Introduction............................................................................................................227

Secure cooperative wireless communications.......................................................229

Computational results ............................................................................................231

Conclusion .............................................................................................................240

Appendix................................................................................................................241

References..............................................................................................................242

CHAPTER 15 Algebraic Approaches to a Network-Type PrivateInformation Retrieval............................................................... 245Introduction............................................................................................................245

The data processing scheme and statement of the problem.................................246

Algorithmic description of the solution ................................................................247

Algebraic description of the solution....................................................................249

Conclusion .............................................................................................................251

Summary ................................................................................................................251

References..............................................................................................................251

CHAPTER 16 Using Event Reasoning for TrajectoryTracking................................................................................. 253Introduction............................................................................................................253

Example .................................................................................................................254

Event model ...........................................................................................................255

Scenario adapts ......................................................................................................257

Event functions and inference rules ......................................................................259

Experiments ...........................................................................................................262

Summary ................................................................................................................264

Acknowledgments .................................................................................................265

References..............................................................................................................265

ixContents

CHAPTER 17 Resource-Efficient Multi-Source AuthenticationUtilizing Split-Join One-Way Key Chain..................................... 267Introduction............................................................................................................267

Related works ........................................................................................................268

Methodology ..........................................................................................................270

Conclusion .............................................................................................................278

Acknowledgments .................................................................................................278

References..............................................................................................................278

CHAPTER 18 Real-time Network Intrusion Detection Using Hadoop-BasedBayesian Classifier ................................................................. 281Introduction............................................................................................................281

Overview on Hadoop based technologies.............................................................282

Survey of Intrusion Detection Systems.................................................................285

Hadoop-based real-time Intrusion Detection: System architecture......................289

Practical application scenario and system evaluation...........................................290

Summary ................................................................................................................298

References..............................................................................................................298

CHAPTER 19 Optimum Countermeasure PortfolioSelection: A Knapsack Approach ............................................. 301Introduction............................................................................................................301

The Knapsack problem and a dynamic programming solution............................303

Problem description...............................................................................................304

The proposed binary knapsack-based approach and its dynamic

programming algorithm.....................................................................................306

Computational example and comparison ..............................................................309

Conclusion .............................................................................................................312

References..............................................................................................................313

CHAPTER 20 CSRF and Big Data: Rethinking Cross-Site Request Forgeryin Light of Big Data ................................................................. 315Introduction............................................................................................................315

SOP and CSRF ......................................................................................................316

Motivation and related work .................................................................................319

Defenses against CSRF: Server and browser Sides..............................................322

Experiment results: CSRF in social media and networking sites ........................324

Analysis of test framework with popular Web/URL scanning tools ...................330

x Contents

Conclusions and future work.................................................................................332

References..............................................................................................................333

CHAPTER 21 Security through Emulation-Based ProcessorDiversification ........................................................................ 335Introduction............................................................................................................335

Background and challenges...................................................................................337

Proposed security approach...................................................................................340

A case study: Web server......................................................................................344

Experimentation and results ..................................................................................349

Discussion ..............................................................................................................353

Conclusions and future work.................................................................................354

Acknowledgments .................................................................................................355

References..............................................................................................................355

CHAPTER 22 On the Use of Unsupervised Techniques for Fraud Detectionin VoIP Networks .................................................................... 359Introduction............................................................................................................359

Background ............................................................................................................360

Signature-based fraud detection ............................................................................364

Experiments ...........................................................................................................367

Conclusion .............................................................................................................372

References..............................................................................................................372

PART 3 MOBILE AND CLOUD COMPUTING

SECTION 6 Reviews of the field

CHAPTER 23 Emerging Security Challenges in Cloud Computing,from Infrastructure-Based Security to Proposed ProvisionedCloud Infrastructure ................................................................ 379Introduction............................................................................................................379

Background ............................................................................................................381

Infrastructure security............................................................................................381

Cloud service models ............................................................................................384

Provisioned access control infrastructure (DACI) ................................................392

Conclusion .............................................................................................................392

References..............................................................................................................393

xiContents

SECTION 7 Methods

CHAPTER 24 Detection of Intent-Based Vulnerabilitiesin Android Applications ........................................................... 397Introduction............................................................................................................397

Comparison to related work ..................................................................................398

Model definition and notations .............................................................................399

Vulnerability modeling..........................................................................................402

Security testing methodology................................................................................404

Implementation and experimentation....................................................................411

Conclusion .............................................................................................................416

Acknowledgments .................................................................................................416

References..............................................................................................................416

PART 4 CYBER CRIME AND CYBER TERRORISM

SECTION 8 Theory

CHAPTER 25 A Quick Perspective on the Current Statein Cybersecurity...................................................................... 423Introduction............................................................................................................423

The scope of cybersecurity....................................................................................423

Contributions .........................................................................................................424

Understanding the scope of cybersecurity ............................................................424

Malware, the infectious disease, and phishing, the fraud.....................................426

Vulnerabilities: The long exploitable holes ..........................................................430

Data breach: A faulty containment .......................................................................432

Cyber-war, the latest war front .............................................................................433

Lessons learned......................................................................................................436

References..............................................................................................................437

CHAPTER 26 A Paradigm Shift in Cyberspace Security .................................. 443Introduction............................................................................................................443

Cyber-terrorism......................................................................................................443

A security paradigm shift in cyberspace...............................................................445

Intelligent agents in security auditing ...................................................................446

Summary ................................................................................................................450

References..............................................................................................................450

xii Contents

SECTION 9 Methods

CHAPTER 27 Counter Cyber Attacks By Semantic Networks ........................... 455Introduction............................................................................................................455

Related work..........................................................................................................456

Methodology ..........................................................................................................457

Experiments ...........................................................................................................461

Conclusion and future work ..................................................................................465

Acknowledgments .................................................................................................466

References..............................................................................................................466

CHAPTER 28 Man-in-the-Browser Attacks in Modern Web Browsers .............. 469Introduction............................................................................................................469

Chapter overview...................................................................................................470

Related work..........................................................................................................471

Browser architecture..............................................................................................471

Man-in-the-browser attacks on different layers ....................................................472

Countermeasures....................................................................................................477

Conclusion .............................................................................................................479

References..............................................................................................................480

CHAPTER 29 Improving Security in Web Sessions: Special Managementof Cookies .............................................................................. 481Introduction............................................................................................................481

Related work..........................................................................................................482

Proposed mechanism for web session management .............................................484

Implementation and experiments ..........................................................................486

Conclusion and further work.................................................................................489

References..............................................................................................................490

CHAPTER 30 Leveraging Semantic Web Technologies for Access Control ...... 493Introduction............................................................................................................493

Implementing RBAC with ontologies...................................................................494

Semantically extending the XACML attribute model ..........................................495

Ontology-based context awareness .......................................................................496

Ontological specification of user preferences.......................................................497

Semantic access control in online social networks...............................................498

DEMONS ontological access control model ........................................................499

Discussion ..............................................................................................................502

xiiiContents

Acknowledgments .................................................................................................503

References..............................................................................................................504

CHAPTER 31 Cyber Security Education: The Merits of Firewall Exercises ....... 507Introduction............................................................................................................507

Criteria for firewall education...............................................................................508

Evaluation of firewall exercises ............................................................................509

Satisfying the criteria.............................................................................................511

Emerging trends in firewall education..................................................................514

Conclusion .............................................................................................................514

Acknowledgments .................................................................................................515

References..............................................................................................................515

SECTION 10 Case study

CHAPTER 32 Surveillance without Borders: The Case of Karen Refugeesin Sheffield............................................................................. 519Introduction............................................................................................................519

Background ............................................................................................................520

Methodological issues ...........................................................................................523

Analyzing discourse ..............................................................................................524

The hacking incident .............................................................................................524

“We are Watching You”: Analysis of discourse messages posted ......................527

Conclusion .............................................................................................................530

Appendix................................................................................................................531

References..............................................................................................................532

Further Reading .....................................................................................................533

PART 5 FOCUS TOPICS: FROM ONLINE RADICALISATIONTO ONLINE FINANCIAL CRIME

SECTION 11 Theory

CHAPTER 33 A Framework for the Investigation and Modeling of OnlineRadicalization and the Identification of Radicalized Individuals.....539Introduction............................................................................................................539

Systematic consideration of influencing factors: The

radicalization-factor model................................................................................541

xiv Contents

Identification of radicalized individuals: Behavioral

indicators............................................................................................................543

Application of the framework ...............................................................................545

References..............................................................................................................546

CHAPTER 34 Preventing Terrorism Together: A Framework toProvide Social Media Anti-Radicalization Trainingfor Credible Community Voices ................................................ 549Introduction............................................................................................................549

Online radicalization .............................................................................................551

Collaboration in counter-terrorism........................................................................553

Credible voices ......................................................................................................554

Conclusion .............................................................................................................555

References..............................................................................................................555

SECTION 12 Methods

CHAPTER 35 Investigating Radicalized Individual Profiles throughFuzzy Cognitive Maps.............................................................. 559Introduction............................................................................................................559

The radicalization process: How can it happen? ..................................................560

Investigating radical online profiles: A short overview

of existing methods ...........................................................................................564

Fuzzy cognitive mapping of factors for self-radicalization

as an alternative approach .................................................................................567

Conclusion .............................................................................................................571

References..............................................................................................................572

CHAPTER 36 Financial Security against Money Laundering:A Survey................................................................................. 577Money laundering..................................................................................................577

Anti-money laundering efforts ..............................................................................579

Estimating the extent of ML .................................................................................581

Data mining techniques for ML detection ............................................................585

Conclusion .............................................................................................................587

References..............................................................................................................588

xvContents

CHAPTER 37 Intelligent Banking XML Encryption Using Effective Fuzzy Logic 591Introduction............................................................................................................591

Literature review....................................................................................................592

System model and design......................................................................................594

Experiments and results.........................................................................................601

Summary ................................................................................................................612

References..............................................................................................................615

Further Reading .....................................................................................................617

Index .................................................................................................................................................. 619

xvi Contents

Acknowledgments

We wish to thank everyone who has contributed to this book. In particular, we would like toacknowledge the contribution of CENTRIC (Centre of excellence in terrorism, resilience, intelli-gence & organised crime research, at Sheffield Hallam University, UK). We would also like totake this opportunity to express our gratitude to the following as members of the book review boardfor their contributions to the final publication.

Review BoardBabak AkhgarHamid R. ArabniaBen BrewsterRichard HillHamid JahankhaniKayleigh JohnsonEleanor LockleyReza NasserzadehSimon PolovinaJawed SiddiqiAndrew Staniforth

xvii

This page intentionally left blank

About the Editors

Babak AkhgarBabak Akhgar is Professor of Informatics and Director of the Centre of excellence in terrorism,resilience, intelligence & organised crime research (CENTRIC) at Sheffield Hallam University, anda Fellow of the British Computer Society. Professor Akhgar graduated from Sheffield HallamUniversity in Software Engineering. After gaining considerable commercial experience as aStrategy Analyst and Methodology Director for several companies, he consolidated this experienceby obtaining a masters degree (with distinction) in Information Systems in Management and a PhDin Information Systems. He has more than 100 referred publications in international journals andconference proceedings. He is on the editorial boards of three international journals, and is chairand programme committee member of several international conferences. He has extensive hands-onexperience in development, management, and execution of large international KM and securityinitiatives (e.g., combating terrorism and organized crime, cybersecurity, public order, and cross-cultural ideology polarization). He also has an established network of collaborators in variousacademic and law enforcement agencies locally, nationally, and internationally. The impact of hisresearch on e-security, manifested in a multi-lingual portal for business crime reduction, andhis research on combating organized crime and terrorism led to an international research projectwith partners such as Europol and a number of LEAs (with a project value of 3.2 M Euro). He hasrecently written and edited a number of books on intelligence management and national security.

Hamid R. ArabniaHamid R. Arabnia received his Ph.D. degree in Computer Science from the University of Kent(Canterbury, England) in 1987 and since October of that year has been a Full Professor ofComputer Science at the University of Georgia (Georgia, USA). Professor Arabnia’s researchinterests include parallel and distributed processing techniques and algorithms, supercomputing, inter-connection networks, and applications. He is is Editor-in-Chief of the Journal of Supercomputing(one of the oldest journals in computer science), published by Springer, and has been AssociateEditor of IEEE Transactions on Information Technology in Biomedicine (2008!2011). He is also onthe editorial and advisory boards of over 35 other journals. Professor Arabnia is the founding chairof the annual World Congress in Computer Science, Computer Engineering, and Applied Computing(WORLDCOMP), and editor of Transactions on Computational Science and ComputationalIntelligence (Springer), and Transactions on Computer Science and Applied Computing (Elsevier).Prof. Arabnia has edited/co-edited over 100 books; his most recent co-edited book (Software Toolsand Algorithms for Biological Systems) is among the top 25 percent most downloaded Springere-books. Prof. Arabnia has published extensively in journals and refereed conference proceedings.He has over 350 publications (journals, proceedings, editorships) in his area of research. He has beena PI/Co-PI on approximately $7.5 M worth of externally funded projects/initiatives. During his tenureas Graduate Coordinator/Director of Computer Science (2002!2009), Dr. Arabnia secured the largestlevel of funding in the history of the department for supporting graduate students (PhD, MS).

xix

This page intentionally left blank

List of Contributors

Zair AbdelouahabFederal University of Maranhao, Sao Luıs, MA, Brazil

Maher AburrousAl Hoson University, Abu Dhabi, UAE

Eyidayo AdebolaPrairie View A&M University, Prairie View, TX, USA

Babak AkhgarSheffield Hallam University, Sheffield, UK

Sayed Alireza Hashemi GolpayeganiAmirkabir University of Technology (Tehran Polytechnic), Tehran, Iran

Ja’far AlqatawnaThe University of Jordan, Amman, Jordan

Omar Al-KadiThe University of Jordan, Amman, Jordan

Rizik Al-SayyedThe University of Jordan, Amman, Jordan

Faisal T. AmmariUniversity of Huddersfield, Huddersfield, UK

Annamalai AnnamalaiPrairie View A&M University, Prairie View, TX, USA

Manoj ApteTata Consultancy Services Limited, Pune, MH, India

Hamid R. ArabniaUniversity of Georgia, Athens, GA, USA

Vladimir B. Balakirsky†

State University of Aerospace Instrumentation, St-Petersburg, Russia

Maros BarabasBrno University of Technology, Brno, Czech Republic

Gerald BaumgartnerLaboratory for Telecommunications Science, College Park, MD, USA

†Deceased

xxi

Petra Saskia BayerlErasmus University, Rotterdam, The Netherlands

Timothy BowdenJacksonville State University, Jacksonville, AL, USA

Ben BrewsterSheffield Hallam University, Sheffield, UK

Roman BusseFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany

Petr ChmelarBrno University of Technology, Brno, Czech Republic

Seonho ChoiBowie State University, Bowie, MD, USA

John M. ColombiUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Guillermo CovellaNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina

Miles CrabillLewis & Clark College, Portland, OR, USA

Evan DamonLewis & Clark College, Portland, OR, USA

David de AndresUniversitat Politecnica de Valencia, Valencia, Spain

Alberto De la Rosa AlgarınUniversity of Connecticut, Storrs, CT, USA

Leonidas DeligiannidisWentworth Institute of Technology, Boston, MA, USA

Nikolaos L. DellasSingularLogic Software and Integrated IT Solutions, Nea Ionia, Greece

Steven A. DemurjianUniversity of Connecticut, Storrs, CT, USA

Alexander DieserNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina

Steven DragerUS Air Force Research Lab, Rome, NY, USA

xxii List of Contributors

Michal DrozdBrno University of Technology, Brno, Czech Republic

Hyeonsang EomSeoul National University, Seoul, Korea

Diogo A.B. FernandesUniversity of Beira Interior, Covilha, Portugal

Guillermo Francia, IIIJacksonville State University, Jacksonville, AL, USA

Mario M. FreireUniversity of Beira Interior, Covilha, Portugal

Kaleb GanzLewis & Clark College, Portland, OR, USA

Qigang GaoDalhousie University, Halifax, NS, Canada

Anahit R. GhazaryanState University of Aerospace Instrumentation, St-Petersburg, Russia

Joao V. GomesUniversity of Beira Interior, Covilha, Portugal

Geff GreenSheffield Hallam University, Sheffield, UK

Michael R. GrimailaUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Petr HanacekBrno University of Technology, Brno, Czech Republic

Mohammad HassanzadehTarbiat Modares University, Tehran, Iran

Peng HeUniversity of Maryland, Baltimore, MD, USA

Douglas D. HodsonUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Ivan HomoliakBrno University of Technology, Brno, Czech Republic

xxiiiList of Contributors

Mihai Horia Zaharia“Gheorghe Asachi” Technical University, Iasi, Romania

Claire HumbeutelLewis & Clark College, Portland, OR, USA

Pedro R.M. InacioUniversity of Beira Interior, Covilha, Portugal

David JacquesUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Narges JahangiriMinistry of Education, Tehran, Iran

Kayleigh JohnsonSheffield Hallam University, Sheffield, UK

Dimitra I. KaklamaniNational Technical University of Athens, Athens, Greece

Maria N. KoukoviniNational Technical University of Athens, Athens, Greece

Sofiane LabidiFederal University of Maranhao, Sao Luıs, MA, Brazil

Ville LeppanenUniversity of Turku, Turku, Finland

Georgios V. LioudakisNational Technical University of Athens, Athens, Greece

Eleanor LockleySheffield Hallam University, Sheffield, UK

Denivaldo LopesFederal University of Maranhao, Sao Luıs, MA, Brazil

Pascal LorenzUniversity of Haute Alsace, Colmar, France

J. LuUniversity of Huddersfield, Huddersfield, UK

Jianbing MaBournemouth University, Bournemouth, UK

xxiv List of Contributors

Jens MacheLewis & Clark College, Portland, OR, USA

Nicolas MaciaThe National University of La Plata, La Plata, BA, Argentina

Logan O. MaillouxUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Hector MarcoUniversitat Politecnica de Valencia, Valencia, Spain

Maria Angel Marquez-AndradeYork University, Toronto, ON, Canada

William McKeeverUS Air Force Research Lab, Rome, NY, USA

Davud MohammadpurUniversity of Zanjan, Zanjan, Iran

Seyyed Mohammad Reza FarshchiFerdowsi University of Mashhad, Mashhad, Iran

Falkner MoraesFederal University of Maranhao, Sao Luıs, MA, Brazil

Jeffrey D. MorrisUnited States Air Force Institute of Technology, Wright-Patterson AFB, OH, USA

Anas NajdawiPrincess Sumaya University for Information Technology, Amman, Jordan

Samir M.R. NasserzadehUniversity of Tehran, Tehran, Iran

Holger NitschFachhochschule fur Offenttliche Verwaltung und Rechtspflege in Bayern, Bavaria, Germany

Abiodun OlaluwePrairie View A&M University, Prairie View, TX, USA

Emerson OliveiraFederal University of Maranhao, Sao Luıs, MA, Brazil

Luis OlsinaNational University of La Pampa Engineering School, Santa Rosa, LP, Argentina

xxvList of Contributors

Girish Keshav PalshikarTata Consultancy Services Limited, Pune, MH, India

Eugenia I. PapagiannakopoulouNational Technical University of Athens, Athens, Greece

Paul R. PrucnalPrinceton University, Princeton, NJ, USA

Tran Quang ThanhFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany

Victor RaskinPurdue University, West Lafayette, IN, USA

Sampsa RautiUniversity of Turku, Turku, Finland

Yacine RebahiFraunhofer Institute for Open Communication Systems (FOKUS), Berlin, Germany

Mohammad Reza MovahedisefatAmirkabir University of Technology (Tehran Polytechinc), Tehran, Iran

Ismael RipollUniversitat Politecnica de Valencia, Valencia, Spain

Hamzeh RoumaniYork University, Toronto, ON, Canada

Juan Carlos RuizUniversitat Politecnica de Valencia, Valencia, Spain

Sebastien SalvaUniversity of Auvergne, Clermont-Ferrand, France

Maryam ShahpasandAmirkabir University of Technology (Tehran Polytechnic), Tehran, Iran

Bhavin J. ShastriPrinceton University, Princeton, NJ, USA

Jawed SiddiqiSheffield Hallam University, Sheffield, UK

Liliana F.B. SoaresUniversity of Beira Interior, Covilha, Portugal

xxvi List of Contributors

Andrew StaniforthNorth East Counter Terrorism Unit, West Yorkshire Police, West Yorkshire, UK

Nary SubramanianUniversity of Texas at Tyler, Tyler, TX, USA

Kun SunGeorge Mason University, Fairfax, VA, USA

Fahimeh TabatabayiMehrAlborz University, Tehran, Iran

Julia M. TaylorPurdue University, West Lafayette, IN, USA

Cenidalva TeixeiraFederal University of Maranhao, Sao Luıs, MA, Brazil

Ariel TelesFederal University of Maranhao, Sao Luıs, MA, Brazil

David ThorntonJacksonville State University, Jacksonville, AL, USA

Fernando G. TinettiThe National University of La Plata, La Plata, BA, Argentina

Monica TrifasJacksonville State University, Jacksonville, AL, USA

Sanjai VeetilDalhousie University, Halifax, NS, Canada

Lakovos S. VenierisNational Technical University of Athens, Athens, Greece

Natalija VlajicYork University, Toronto, ON, Canada

Richard WeissEvergreen State College, Olympia, WA, USA

Charlie WisemanWentworth Institute of Technology, Boston, MA, USA

xxviiList of Contributors

Ben WuPrinceton University, Princeton, NJ, USA

Mira YunWentworth Institute of Technology, Boston, MA, USA

Stassia R. ZafimiharisoaBlaise Pascal University, Clermont-Ferrand, France

xxviii List of Contributors


Recommended