default search action
ISC International Journal of Information Security, Volume 2
Volume 2, Number 1, January 2010
- Rasool Jalili:
Editorial. 1-2
- Vincent Rijmen:
Stream ciphers and the eSTREAM project. 3-11
- Mahdi Abadi, Saeed Jalili:
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs. 13-32 - Mohammad Saniee Abadeh, Jafar Habibi:
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection. 33-46 - Sareh Sadat Emami, Saadan Zokaei:
A context-sensitive dynamic role-based access control model for pervasive computing environments. 47-66
Volume 2, Number 2, July 2010
- Rasool Jalili:
Editorial. 67-68
- Farzad Salim, Jason Reid, Ed Dawson:
Authorization models for secure information sharing: a survey and research agenda. 69-87
- Ali Fanian, Mehdi Berenjkoub, Hossein Saidi, T. Aaron Gulliver:
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks. 89-105 - Adnan Abdul-Aziz Gutub, Ahmed Al-Nazer:
High capacity steganography tool for Arabic text using 'Kashida'. 107-118 - Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez:
Detection of perturbed quantization (PQ) steganography based on empirical matrix. 119-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.