Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. 24
... A Comparison of Cyber-Crime Definitions in India and the United States. 33.
Cyber Security, Cyber Crime and Cyber Forensics:
Applications Raghu
Perspectives
Santanam
Arizona State M.
and
University, USA
Sethumadhavan
Amrita Vishwa
Vidyapeetham,
India
Mohit Virendra State University of New York at Buffalo, USA
Information Science
I
»l%Tf03i REFERENCE
lijjj
INFORMATION SCIENCE REFERENCE
Hershey
•
New York
Table of Contents
Preface
xiv
Acknowledgment
xix
Section 1 Cyber-Crirae:
Policies and
Implications
Chapter 1 The UID
Project: Lessons Learned from the West and Challenges Identified for Rajarshi Chakraborthy, University ofBuffalo at SUNYNew York, USA Haricharan
Rengamani, University ofBuffalo
at
India
1
SUNY New York, USA
Ponnurangam Kumaraguru, Indraprastha Institute ofInformation Technology, India RaghavRao, University ofBuffalo at SUNY New York, USA Chapter
2
Combined
Impact of Outsourcing and Hard Times
on
BPO Risk and
Security
24
C. Warren Axelrod, Delta Risk, USA Sukumar
Haldar, Anshinsoft Inc., USA
Chapter 3 Comparison of Cyber-Crime Definitions
A
in India and the United States
33
Himanshu H. S.
Maheshwari, University of South Florida, USA Hyman, University of South Florida, USA
Manish Agrawal,
University of South Florida, USA
Chapter 4
Emergency Response
of Mumbai Terror Attacks: An
Activity Theory Analysis
Divya Shankar, University of Buffalo at SUNY New York, USA Manish Agrawal, University of South Florida, USA H.
RaghavRao, University ofBuffalo
at
SUNY New
York, USA
46
Chapter
5
Pirates of the
Copyright
and
Cyberspace:
Issues Involved
59
Charulata
Chaudhary, Rajiv Gandhi National University of Law, India Ishupal Singh Kang, Rajiv Gandhi National University of Law, India
Section 2
Cyber-Security: Technology
Review
Chapter 6 Classifying Host Anomalies: Using Ontology in Information Security Monitoring
70
Ramachandran, Bhabha Atomic Research Centre, India
Suja
R. S. Mundada, Bhabha Atomic Research Centre, India A. K.
Bhatlacharjee, Bhabha Atomic Research Centre, India
C. S. R. C.
Murthy, Bhabha Atomic Research Centre, India
R. Sharma, Bhabha Atomic Research Centre, India
Chapter 7 Securing Next Generation Internet Services
87
Asoke K. Talukder, ABV Indian Institute
of Information Technology
&
Management,
India
& Geschickten Solutions, India
Chapter
8
An Examination
ofldentity Management Models in
Kenneth J. Giuliani, V. Kumar
Setting
106
Murty, University of Toronto, Canada
9
Securing
Cloud Environment
N. Harini, Amrita
T. R,
Internet
University of Toronto Mississauga, Canada
Chapter
C, K.
an
Shyamala,
Vishwa
115
India
Vidyapeetham, Vidyapeetham,
Amrita Vishwa
Padmanabhan,
Amrita Vishwa
Indie
Vidyapeetham, India
Chapter 10 DoS Attacks in MANETs: Detection and Countermeasure
Rajbir Kaur,
Malaviya
National Institute
of Technology,
124
India
M. S. Gaur,
Malaviya National Institute of Technology, India Lalith Suresh, Malaviya National Institute of Technology, India V. Laxmi,
Malaviya National Institute of Technology, India
Chapter 11 Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks Mohit Virendra, State University of New York at Buffalo, USA Qi Duan, State University of New York Shambhu
at
Buffalo, USA
Upadhyaya, State University ofNew York at Buffalo, USA
146
Chapter 12 Extended Time Machine
Design using Reconfigurable Computing Recording and Retrieval of Gigabit Network Traffic S.
Sajan Kumar, Amrita Vishwa Raju Pilli, Amrita
168
India
Vidyapeetham, Vidyapeetham, Vishwa Vidyapeetham, India
M. Hart Krishna Prasad, Amrita Vishwa Suresh
for Efficient
India
Chapter 13 Metamorphic Malwarc Analysis and Detection Methods Vinod P., V. Laxmi,
Malaviya
178
National Institute
India
of Technology, Malaviya National Institute of Technology, India
M. S. Gain;
Malaviya National Institute of Technology, India
Section 3
Cyber-Security: Methods Chapter Towards
Algorithms
14
Checking Tampering of Software
N. V, Narendra Kumar, Tata Institute
Harshit Shah, Amrita Vishwa R. K.
Chapter
and
Shyamasundar,
204
ofFundamental Research, India
Vidyapeetham, India
Tata Institute
of Fundamental Research, India
15
Complexity Measures
of
Cryptographically Secure Boolean Functions Chungath Srinivasan, Amrita Vishwa Vidyapeetham, India
Lakshmy M.
K. V., Amrita Vishwa
Sethumadhavan, Amrita
220
Vidyapeetham, India
Vishwa
Vidyapeetham, India
Chapter 16 Einstein-Podolsky-Rosen Paradox Some
and
Certain Aspects of Quantum Cryptology with
Applications
Narayanankutty Karuppath, P. Achuthan, Amrita Vishwa
231 Amrita Vishwa
Vidyapeetham,
Vidyapeetham, India India
Chapter 17 Error Linear
Complexity Measures of Binary Multisequences Sindhu M., Amrita Vishwa Vidyapeetham, India
Sajan Kumar S., Amrita Vishwa Vidyapeetham, India M, Sethumadhavan, Amrita Vishwa
Vidyapeetham, India
240
Chapter A
Survey
18
Digital Image Steganographic Methods Amritha. P. P., Amrita Vishwa Vidyapeetham, India Gireesh Kumar T., Amrita Vishwa Vidyapeetham, India on
Compilation
of References
250
259
About the Contributors
280
Index
287