default search action
International Journal of Security and Networks, Volume 10
Volume 10, Number 1, 2015
- Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer:
A blind 3D watermarking technique using spherical coordinates and skewness measure. 1-8 - Bhawana Rudra, O. P. Vyas:
Understanding and mitigating security and authentication issues in service oriented network architecture. 9-19 - Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad:
A system-wide anonymity metric with message multiplicities. 20-31 - Arshi Agrawal, Mark Stamp:
Masquerade detection on GUI-based Windows systems. 32-41 - Alex Ming Hui Wong, Dae-Ki Kang:
Game layout and artificial intelligence implementation in mobile 3D tower defence game. 42-47 - Jongdeug Kim, Taehyun Jeon:
Efficient resource allocation for mobile instant messaging service in wireless network. 48-55 - Ki Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo-Seok Choi, Sang-Bong Park, Yun Sik Lim, Jeong Jin Kang:
Spatio-temporal XACML: the expansion of XACML for access control. 56-63
Volume 10, Number 2, 2015
- N. M. Saravana Kumar, S. Lavanya:
A novel scheme for secure group communication in multicast network. 65-75 - Jai-Pil Oh, Dong Ho Kim:
System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service. 76-83 - Inkyoo Park, Jongjin Park, Gyoo-Seok Choi:
Using Bayesian posterior probability in confidence of attributes for feature selection. 84-90 - Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao:
Network forensics analysis using Wireshark. 91-106 - Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari:
Chain reduction of authorisation certificates. 107-123 - Jared Lee, Thomas H. Austin, Mark Stamp:
Compression-based analysis of metamorphic malware. 124-136
Volume 10, Number 3, 2015
- Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. 137-150 - Jingcheng Gao, Yang Xiao, Sneha Rao, Fnu Shalini:
Security tests and attack experimentations of ProtoGENI. 151-169 - Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath:
Accurate geolocation using network coordinates. 170-182 - Mohammed Amin Benamara, Huixian Li:
Secure of personal health records shared in cloud computing using cipher-text attribute based encryption. 183-190 - Mohamed Sarrab:
Bytecode instrumentation mechanism for monitoring mobile application information flow. 191-206
Volume 10, Number 4, 2015
- Zuhua Guo, Lixin Xu:
Research of security structure model for web application systems based on the relational database. 207-213 - Yucai Zhou, Tong Wang, Xinlin Zhao:
A hybrid recommendation algorithm based on time factor. 214-221 - Tong Wang, Xinlin Zhao, Yucai Zhou:
Community detection in social network using shuffled frog-leaping optimisation. 222-227 - Zhiming Zhang, Fuying Wu, Changgen Jiang, Jiangang Deng:
An efficient detection scheme of node replication attacks for wireless sensor networks. 228-238 - Fnu Shalini, Yang Xiao, Bo Sun:
ProtoGENI experiments. 239-254 - Jian Huang:
Research on optimisation and application of improved fuzzy neural network control algorithm. 255-260 - Myungseok Song, Jun-Dong Cho, Jongpil Jeong:
Random-walk mobility management scheme for sensor-based mobile networks. 261-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.