Unformatted text preview:

CS772: Network Security Protocols Fall 2009 Presentation topics 1 Amgad Neematallah A Collaborative Network Security Platform in P2P Networks http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5260548&isnumber=5260409 2 Taipan Tamsare Quantum Cryptography 3 Abhishek Kamalayagiri Design and Implement of Common Network Security Scanning http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5223272&isnumber=5222865 4 Vishal Kumar Securing web application code by static analysis and runtime protection 5 Sairam Kambhala Network Security Analysis Based on Security Status Space http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4597065&isnumber=4596967 6 Nitin Nimran Multivariate statistical analysis for network attacks detection 7 Rachana George Practice of Intrusion Prevention System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4428862 8 Ravi Ragampeta Challenges of Securing an Enterprise and Meeting Regulatory Mandates http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4082418&isnumber=4082389 9 Ken Lusk Antivirus Detection http://portal.acm.org.proxy.lib.odu.edu/citation.cfm?id=1107622.1107655&coll=ACM&dl=ACM&CFID=55248843&CFTOKEN=73688460 10 Rajanikanth Ragula Wireless Network Security: Comparison of WEP, WPA, RSN Protocols http://delivery.acm.org.proxy.lib.odu.edu/10.1145/1370000/1363229/a9-bulbul.pdf?key1=1363229&key2=9544984521&coll=ACM&dl=ACM&CFID=55274803&CFTOKEN=85070207 11 Hui Shi Network Intrusion Detection 12 Sandeep Gadi Network Security http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&aSituation Awareness Technology based on Artificial Immunity System rnumber=5231663&isnumber=5231498 Presentation Schedule Date Slot 1 Slot 2 Slot 3 Slot 4 11/3 Sandeep Gadi Nitin Bande Sairam Kambhala Rajanikanth Ragula 11/5 Vishal Kumar Nitin Nimran Rachana George Swetha Kulkarni 11/10 Amgad Neematallah Ken Lusk Abhishek Kamalayagiri His Shi 11/12 Ravi Ragampeta Matthias Widodo


View Full Document

ODU CS 772 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?