default search action
International Journal of Security and Networks, Volume 17
Volume 17, Number 1, 2022
- Saeed Salah, Mohammad A. AL-Shudeifat, Raid Zaghal:
Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms. 1-12 - Anmol Agnihotri, R. Padmavathi, Santanu Chatterjee, Vinod Kumar Mahor:
Privacy in content-centric networking against side channel attacks. 13-27 - Jun Yan, Yupan Tian, Hai Liu, Zhenqiang Wu:
Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks. 28-38 - Vinod Kumar Mahor, R. Padmavathy, Santanu Chatterjee:
Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP. 39-47 - Mohammad H. Alshayeji, Sa'ed Abed:
Enhanced video-on-demand security in cloud computing against insider and outsider threats. 48-55 - Mingyue Qiu, Zhijie Bi:
Police alarm address recognition and classification based on convolutional neural networks. 56-62
Volume 17, Number 2, 2022
- Oscar Danilo Gavilánez Alvarez, Glen Dario Rodriguez Rafael:
VoIP security auditing model based on COBIT 4.1. 63-76 - Wilson S. Melo Jr., Lucas S. dos Santos, Lucila M. S. Bento, Paulo R. M. Nascimento, Carlos A. R. Oliveira, Ramon R. Rezende:
Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric. 77-91 - Syed Rameez Rehman, Mudassar Waheed, Ammar Masood:
Security-enhanced Android for an enterprise. 92-106 - Meriem Kherbache, Kamal Amroun, David Espes:
A new wrapper feature selection model for anomaly-based intrusion detection systems. 107-123 - Shizhen Huang, Anhua Guo, Kaikai Su, Siyu Chen, Ruiqi Chen:
Implementation of quasi-Newton algorithm on FPGA for IoT endpoint devices. 124-134
Volume 17, Number 3, 2022
- Xiaoteng Yang, Zhenqiang Wu, Jun Yan, Mubarak Umar:
Network tolerance optimisation to random and target attacks based on percolation theory. 135-146 - Ashutosh Bhatia, Deepak Kumar Vishvakarma, Rekha Kaushik, Ankit Agrawal:
Entropy and likelihood-based detection of DGA generated domain names and their families. 147-192 - María Hallo, Gabriela Suntaxi:
A survey on SQL injection attacks, detection and prevention techniques - a tertiary study. 193-202 - Ala' Masarweh, Jaafer Al-Saraireh:
Threat led advanced persistent threat penetration test. 203-219 - Yuan Zuo, Xiaozhou Zhu, Jiangyi Qin, Wen Yao:
Heterogeneous big data fusion in distributed networking systems for anomaly detection and localisation. 220-229
Volume 17, Number 4, 2022
- Rachana Yogesh Patil, Yogesh H. Patil:
A provably secure signcryption with proxy re-encryption for smart water grid network. 231-239 - Ponnuru Surya Ganesh, R. Padmavathy, Anil Pinapati:
An efficient scalar multiplication algorithm on Koblitz curves using τ3-NAF. 240-246 - Fateh Boutekkouk:
A literature review on security-aware design space exploration approaches for embedded systems. 247-268 - T. N. Nisha, Dhanya Pramod:
Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networks. 269-283 - Aaron Rasheed Rababaah:
Simulated study of the influence of node density on the performance of wireless sensor networks. 284-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.