default search action
Journal of Information Security, Volume 2
Volume 2, Number 1, January 2011
- Tao Xu, Chunxiao Yi:
SOAP-Based Security Interaction of Web Service in Heterogeneous Platforms. 1-7 - Shaojun Zhang, Shanshan Song:
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network. 8-27 - Indraneel Mukhopadhyay, Mohuya Chakraborty, Satyajit Chakrabarti:
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems. 28-38 - Tarek S. Sobh, Yasser Aly:
Effective and Extensive Virtual Private Network. 39-49 - Sanjeev Kumar, Raja Sekhar Reddy Gade:
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks. 50-58
Volume 2, Number 2, April 2011
- Yasunari Yoshitomi, Taro Asada, Yohei Kinugawa, Masayoshi Tabuse:
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform. 59-68 - Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy:
A Comparison of Link Layer Attacks on Wireless Sensor Networks. 69-84 - Zakaria I. Saleh, Heba Refai, Ahmad Mashhour:
Proposed Framework for Security Risk Assessment. 85-90 - Basant Kumar, Harsh Vikram Singh, Surya Pal Singh, Anand Mohan:
Secure Spread-Spectrum Watermarking for Telemedicine Applications. 91-98
Volume 2, Number 3, July 2011
- Shinichi Murata, Yasunari Yoshitomi, Hiroaki Ishii:
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression. 99-112 - Sirisha Surisetty, Sanjeev Kumar:
McAfee SecurityCenter Evaluation under DDoS Attack Traffic. 113-121 - Saleem-Ullah Lar, Xiaofeng Liao, Aqeel-ur Rehman, Ma Qinglu:
Proactive Security Mechanism and Design for Firewall. 122-130 - Hari Krishna Vellalacheruvu, Sanjeev Kumar:
Effectiveness of Built-in Security Protection of Microsoft's Windows Server 2003 against TCP SYN Based DDoS Attacks. 131-138
Volume 2, Number 4, October 2011
- Kamlesh Gupta, Sanjay Silakari:
New Approach for Fast Color Image Encryption Using Chaotic Map. 139-150 - Charlie Obimbo, Benjamin Ferriman:
Vulnerabilities of LDAP As An Authentication Service. 151-157 - Zachary Miller, William Deitrick, Wei Hu:
Anomalous Network Packet Detection Using Data Stream Mining. 158-168 - Manjit Thapa, Sandeep K. Sood:
On Secure Digital Image Watermarking Techniques. 169-184 - Eliza Yingzi Du, Kai Yang, Zhi Zhou:
Key Incorporation Scheme for Cancelable Biometrics. 185-194 - Alok Sharma, Sunil Pranit Lal:
Tanimoto Based Similarity Measure for Intrusion Detection System. 195-201
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.