default search action
International Journal of Security and Networks, Volume 9
Volume 9, Number 1, 2014
- Daniel Ricardo dos Santos, Tiago Jaime Nascimento, Carla Merkle Westphall, Marcos Aurélio Pedroso Leandro, Carlos Becker Westphall:
Privacy-preserving identity federations in the cloud: a proof of concept. 1-11 - István Vajda:
A proof technique for security assessment of on-demand ad hoc routing protocols. 12-19 - Hui Cui, Yi Mu, Man Ho Au:
Anonymous broadcast encryption with an untrusted gateway. 20-29 - Salekul Islam:
Security analysis of LMAP using AVISPA. 30-39 - Mohammed Rangwala, Ping Zhang, Xukai Zou, Feng Li:
A taxonomy of privilege escalation attacks in Android applications. 40-55 - Ziyad S. Al-Salloum:
GeoGraphical passwords. 56-62
Volume 9, Number 2, 2014
- Christopher W. Badenhop, Barry E. Mullins:
A black hole attack model using topology approximation for reactive ad-hoc routing protocols. 63-77 - Nagaraj Ambika, G. T. Raju:
ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network. 78-84 - Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Security properties analysis in a TPM-based protocol. 85-103 - Po-Jen Chuang, Ming-Yu Ni:
On access control policy assignments and negotiation strategies in automated trust negotiation. 104-113 - Wayne C. Henry, Barry E. Mullins:
VANISH: a variable advanced network IRC stealth handling system. 114-123
Volume 9, Number 3, 2014
- Ahmed Ahmim, Nacira Ghoualmi-Zine:
A new adaptive intrusion detection system based on the intersection of two different classifiers. 125-132 - Kun Peng:
Assumptions and conditions for mix networks: analysis, clarification and improvement. 133-143 - Ghita Mezzour, Kathleen M. Carley:
Spam diffusion in a social network initiated by hacked e-mail accounts. 144-153 - John T. Hagen, Barry E. Mullins:
Network vulnerability analysis of the Player command and control protocol. 154-166 - Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghézala:
Firewalls anomalies severity evaluation and classification. 167-176 - Jongdeug Kim, Taehyun Jeon:
Signalling optimisation for VoIP service in All-IP network. 177-184
Volume 9, Number 4, 2014
- Seongsoo Cho, Bhanu Shrestha, Jongsup Lee:
Method of recognising facial image using fuzzy measure. 185-189 - Min Soo Kang, Yong-Gyu Jung, Myung Ho Kim, Kichan Ahn:
Development of sensor nodes based on fault tolerance. 190-196 - Seong-Kweon Kim, Kyung-Ryang Lee, Jae-Sang Cha, Kyoung-Kun Lee, Seong-Jong Kim:
Implementation of battery inspection system for building energy management system. 197-201 - Kyungrak Lee, Jaeyoung Yoo, Inwhee Joe:
An environmental transition-aware data transmission scheme with energy efficiency in energy harvesting wireless sensor networks. 202-208 - Hwa-seon Kim, Seong-Jin Jang, Jong-Wook Jang:
Development of the knocking decision system using the CKP signal collection and analysis. 209-215 - Zuhong Feng, Jing Li, Jie Hu Meichsner:
A Bayesian network intrusion detection algorithm based on principal component analysis and sliding window. 216-221 - Jyoti Grover, Vijay Laxmi, Manoj Singh Gaur:
Sybil attack detection in VANET using neighbouring vehicles. 222-233 - Jennifer Seberry, Yi Mu, Fuchun Guo, Tim Wellsmore:
Efficient authentication and integrity protection for the border gateway protocol. 234-243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.