Abstract :
The following topics are dealt with: distributed intrusion detection; generic access rights delegation ; chaos-based secure image encryption; source specific centralized secure multicast; forensic examination of social networking; signature-based detection; privilege-escalation attacks; mobile wireless sensor network security; BYOD security framework; IPv6 tunneling protocols; access control models; cloud computing.