List of Accepted Papers


1. A Lightweight Intrusion Alert Fusion System

Sheng Wen, Yang Xiang, Wanlei Zhou
Deakin University, Australia

2. An Enhanced Tree-based Key Management Scheme for Secure Communication in Wireless Sensor Network

Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan
BRAC University, Bangladesh

3. Scheduling and Queue management for Multi-class Traffic in Access Router of Mobility Protocol

Md Shohrab Hossain1, Mohammed Atiquzzaman1, and William Ivancic2
1University of Oklahoma, USA
2NASA Glenn Research Center, USA

4. A Throughput Optimizing Routing Protocol for Wireless Mesh Networks

Jaydip Sen
Tata Consultancy Services, India

5. A Quick-response Real-time Stepping Stone Detection Scheme

Ping Li, Wanlei Zhou, and Michelle Yu
Deakin University, Australia

6. Performance Modeling of Bandwidth Aggregation for TCP Connections

Ehsan Elahi, Najmul Hassan, Sohail Asghar, and Amir Qayyum
Center of Research in Networks and Telecom (CoReNeT), Pakistan

7. Continuous Biometric Authentication: Can It Be More Practical?

Eesa Al Soalmi, Colin Boyd, and Andrew Clark
Queensland University of Technology, Australia

8. Mutual Protection in a Cloud Computing Environment

Aiiad Albeshri and William Caelli
Queensland University of Technology, Australia

9. FTARG: Fault-Tolerance using Adaptive Replication strategy in Grid Computing

Siddesh G M, Sijo Cherian, and Srnivasa K G
M S Ramaiah Institute of Technology, India

10. Dynamic Load Distribution in GRID Using Mobile Threads

Masaya Miyashita, Md. Enamul Haque, Noriko Matsumoto, and Norihiko Yoshida
Saitama University, Japan

11. Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol

Roland Bless and Martin Röhricht
Karlsruhe Institute of Technology, Germany

12. An Approach for ISP-provided Content Delivery Service using Hierarchical DHT

Kyounghee Jung, Dohyun Kim, and Younghee Lee
KAIST, South Korea