default search action
International Journal of Security and Networks, Volume 7
Volume 7, Number 1, 2012
- Duncan S. Wong, Xiaojian Tian:
E-mail protocols with perfect forward secrecy. 1-5 - Lucas Vespa, Ritam Chakrovorty, Ning Weng:
Lightweight testbed for evaluating worm containment systems. 6-16 - Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Tie Wang:
A misleading active routing attack in mobile ad-hoc networks. 17-29 - Khalid Alsubhi, Yassir Alhazmi, Nizar Bouabdallah, Raouf Boutaba:
Security configuration management in intrusion detection and prevention systems. 30-39 - Zhifeng Xiao, Yang Xiao:
PeerReview re-evaluation for accountability in distributed systems or networks. 40-58 - Ziyad S. Al-Salloum:
Defensive computer worms: an overview. 59-70
Volume 7, Number 2, 2012
- Nizar Ben Neji, Adel Bouhoula:
Managing hybrid packet filter's specifications. 73-82 - Zubair A. Baig:
Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching. 83-94 - Stephane Boyer, Jean-Marc Robert, Hadi Otrok, Clement Rousseau:
An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. 95-106 - Ismail Butun, Yufeng Wang, Young-seok Lee, Ravi Sankar:
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks. 107-121 - Vladimir Kolesnikov, Wonsuck Lee:
MAC aggregation protocols resilient to DoS attacks. 122-132
Volume 7, Number 3, 2012
- Kun Peng:
How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks. 133-147 - Abdelrahman Desoky:
Jokestega: automatic joke generation-based steganography methodology. 148-160 - Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver:
A symmetric polynomial-based mutual authentication protocol for GSM networks. 161-173 - Zhaohu Xu, Xuyun Nie, Hui Wang, Yongjian Liao:
Cryptanalysis of an improved MFE public key cryptosystem. 174-180 - Veelasha Moonsamy, Moutaz Alazab, Lynn Margaret Batten:
Towards an understanding of the impact of advertising on data leaks. 181-193
Volume 7, Number 4, 2012
- Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments. 196-210 - Fuye Han, Zhen Chen, HongFeng Xu, Haopei Wang, Yong Liang:
A collaborative botnets suppression system based on overlay network. 211-219 - Shilei Lv, Shunzheng Yu:
A novel middleware-based approach for redundant reader elimination using PSO. 220-227 - Jing Liu, Yang Xiao, C. L. Philip Chen:
Internet of things' authentication and access control. 228-241 - Liudong Xing, Honggang Wang, Chaonan Wang, Yujie Wang:
BDD-based two-party trust sensitivity analysis for social networks. 242-251 - Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and compound classification of network traffic. 252-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.