default search action
Journal of Internet Services and Information Security, Volume 5
Volume 5, Number 1, February 2015
- Mario Bravetti, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi:
Guest Editorial: Special Issue on Service-Oriented Architectures and Programming. 1-2 - Nuno Oliveira, Alexandra Silva, Luís Soares Barbosa:
IMCReo: interactive Markov chains for Stochastic Reo. 3-28 - Carlos Parra, Diego Joya:
SPLIT: An Automated Approach for Enterprise Product Line Adoption Through SOA. 29-52 - Sushama Karumanchi, Anna Cinzia Squicciarini:
A Large Scale Study of Web Service Vulnerabilities. 53-69 - Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:
Investigating the leakage of sensitive personal and organisational information in email headers. 70-84
Volume 5, Number 2, May 2015
- Carol J. Fung, Weverton Cordeiro:
Guest Editorial: Special issue on Next Generation Networks and Systems Security. 1-3 - David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu:
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing. 4-23 - Mehrdad Nojoumian, Douglas R. Stinson:
Sequential Secret Sharing as a New Hierarchical Access Structure. 24-32 - Bahman Rashidi, Carol J. Fung:
Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model. 33-46 - Jiwan Ninglekhu, Ram Krishnan, Eugene John, Manoj Panday:
Securing Implantable Cardioverter Defibrillators Using Smartphones. 47-64
Volume 5, Number 3, August 2015
- M. Devipriya, Nithya Balasubramanian, C. Mala:
Hashing Based Distributed Backoff (HBDB) Mechanism for IEEE 802.11 Wireless Networks. 1-18 - Parisa Kaghazgaran, Hassan Takabi:
Toward an Insider Threat Detection Framework Using Honey Permissions. 19-36 - Sooyeon Shin, Taekyoung Kwon:
A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. 37-47 - Yong-Hwan Lee, Hyochang Ahn, Han-Jin Cho, June-Hwan Lee:
Object Recognition and Tracking based on Object Feature Extracting. 48-57 - Todd Booth, Karl Andersson:
Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks. 58-79
Volume 5, Number 4, November 2015
- Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng:
Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA. 1-19 - Kazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:
Construction of a Mega Disaster Crisis Management System. 20-40 - Cihan Tunc, Salim Hariri:
CLaaS: Cybersecurity Lab as a Service. 41-59 - Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko:
Methodological Primitives for Phased Construction of Data Visualization Models. 60-84 - Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
Anomaly Behavior Analysis of DNS Protocol. 85-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.