default search action
Search dblp for Publications
export results for "stream:journals/ijsn:"
@article{DBLP:journals/ijsn/AfroazRR24, author = {Khaleda Afroaz and Y. V. Subba Rao and N. Rukma Rekha}, title = {Secure identity-based encryption: overcoming the key escrow challenge}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {2}, pages = {55--62}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.140266}, doi = {10.1504/IJSN.2024.140266}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AfroazRR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BhatiaS24, author = {Rashmi Bhatia and Rohini Sharma}, title = {Multiclassification of DDoS attacks using machine and deep learning techniques}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {2}, pages = {63--76}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.140268}, doi = {10.1504/IJSN.2024.140268}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BhatiaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenLOL24, author = {Chia{-}Mei Chen and Ze{-}Yu Lin and Ya{-}Hui Ou and Jiunn{-}Wu Lin}, title = {A hybrid malware analysis approach for identifying process-injection malware based on machine learning}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {20--30}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137312}, doi = {10.1504/IJSN.2024.137312}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenLOL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChopraBKSN24, author = {Sumit Chopra and Gagandeep Singh Bains and Simranjot Kaur and Rajesh Sharma and Anchal Nayyar}, title = {A review of the various applications and security issues in IoT and its future aspects}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {3}, pages = {109--127}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.141781}, doi = {10.1504/IJSN.2024.141781}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChopraBKSN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Dong24, author = {Qinqin Dong}, title = {Safety monitoring system for tourist scenic spots based on crowd scene type recognition}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {3}, pages = {128--137}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.141780}, doi = {10.1504/IJSN.2024.141780}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Dong24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Ganesan24, author = {Sangeetha Ganesan}, title = {Enabling secure modern web browsers against cache-based timing attacks}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {43--54}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137330}, doi = {10.1504/IJSN.2024.137330}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Ganesan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuZFM24, author = {Yutao Hu and Yuntao Zhao and Yongxin Feng and Xiangyu Ma}, title = {OneR-DQN: a botnet traffic detection model based on deep {Q} network algorithm in deep reinforcement learning}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {31--42}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137334}, doi = {10.1504/IJSN.2024.137334}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuJZ24, author = {Huajin Liu and Chunhua Ju and Houyuan Zhang}, title = {A social network security user recommendation algorithm based on community user emotions}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {10--19}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137332}, doi = {10.1504/IJSN.2024.137332}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NallabothuRR24, author = {Shiva Krishna Nallabothu and N. Rukma Rekha and Y. V. Subba Rao}, title = {Generalised secret sharing scheme for non-monotone access structures using {MDS} codes}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {2}, pages = {101--108}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.140289}, doi = {10.1504/IJSN.2024.140289}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NallabothuRR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RemmideBB24, author = {Mohamed Abdelkarim Remmide and Fatima Boumahdi and Narhimene Boustia}, title = {Advancing automated social engineering detection with oversampling-based machine learning}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {3}, pages = {150--158}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.141783}, doi = {10.1504/IJSN.2024.141783}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RemmideBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanRW24, author = {Avinash Srinivasan and Christian Rose and Jie Wu}, title = {slackFS - resilient and persistent information hiding framework}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {2}, pages = {77--91}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.140278}, doi = {10.1504/IJSN.2024.140278}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SunWB24, author = {Wenbo Sun and Wei Wang and Chenguang Bai}, title = {A new method of large integer prime decomposition for network public key cryptosystem}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {3}, pages = {159--167}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.141784}, doi = {10.1504/IJSN.2024.141784}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SunWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/VijayachandranN24, author = {Vipin Vijayachandran and Suchithra Ramachandran Nair}, title = {{LR-SDP:} lightweight privacy preservation approach for distributed mobile devices in IoT environment}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {3}, pages = {138--149}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.141788}, doi = {10.1504/IJSN.2024.141788}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/VijayachandranN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XiongC24, author = {Yang Xiong and Yang Cheng}, title = {A new edge weight-based measure for k-shell influential node identification in complex networks}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {1--9}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137331}, doi = {10.1504/IJSN.2024.137331}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XiongC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZouL24, author = {Bailin Zou and Tianhang Liu}, title = {A network traffic classification and anomaly detection method based on parallel cross-convolutional neural networks}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {2}, pages = {92--100}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.140287}, doi = {10.1504/IJSN.2024.140287}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZouL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlbilaliAB23, author = {Amal Abduallah Nasser Albilali and Maysoon F. Abulkhair and Manal Sarhan Bayousef}, title = {An overview of location privacy protection in spatial crowdsourcing platforms during the task assignment process}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {227--244}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135509}, doi = {10.1504/IJSN.2023.135509}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/AlbilaliAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BabikerHMI23, author = {Asaad Balla Babiker and Mohamed Hadi Habaebi and Sinil Mubarak and Md. Rafiqul Islam}, title = {A detailed analysis of public industrial control system datasets}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {245--263}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135511}, doi = {10.1504/IJSN.2023.135511}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BabikerHMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Chaudhari23, author = {Payal Chaudhari}, title = {Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {106--116}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131611}, doi = {10.1504/IJSN.2023.131611}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Chaudhari23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChiniahG23, author = {Aatish Chiniah and Feroz Ghannoo}, title = {A multi-theory model to evaluate new factors influencing information security compliance}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {19--29}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129949}, doi = {10.1504/IJSN.2023.129949}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuJLZ23, author = {Xiaohui Hu and Huiwen Jia and Jingang Liu and Zhiqi Zhao}, title = {Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {213--226}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135516}, doi = {10.1504/IJSN.2023.135516}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/HuJLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Jana23, author = {Angshuman Jana}, title = {Sensitive information leakage analysis of database code by abstract interpretation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {91--105}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131599}, doi = {10.1504/IJSN.2023.131599}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Jana23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Jiang23, author = {Xiaoyu Jiang}, title = {Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {165--174}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134134}, doi = {10.1504/IJSN.2023.134134}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Jiang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JiangW23, author = {Suhan Jiang and Jie Wu}, title = {A blockchain-based {NFV} market in the multi-node edge computing network}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {52--64}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129943}, doi = {10.1504/IJSN.2023.129943}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JiangW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NiknamiW23, author = {Nadia Niknami and Jie Wu}, title = {{MB-CIM:} a multi-round budgeted competitive influence maximisation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {30--41}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129896}, doi = {10.1504/IJSN.2023.129896}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NiknamiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QianW23, author = {Jun Qian and Yubao Wu}, title = {Moving object location prediction based on a graph neural network with temporal attention}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {153--164}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134133}, doi = {10.1504/IJSN.2023.134133}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/QianW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QiuZW23, author = {Mingyue Qiu and Xueying Zhang and Xinmeng Wang}, title = {An ex-convict recognition method based on text mining}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {10--18}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129905}, doi = {10.1504/IJSN.2023.129905}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QiuZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SaadSS23, author = {Redhwan M. A. Saad and Khaled A. M. Al Soufy and Samir I. Shaheen}, title = {Security in smart home environment: issues, challenges, and countermeasures - a survey}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129887}, doi = {10.1504/IJSN.2023.129887}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Shi23, author = {Wuchao Shi}, title = {Research on system safety in the case of component failure based on degree correlation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {65--74}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131585}, doi = {10.1504/IJSN.2023.131585}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Shi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SubrahmanyamRR23, author = {Rolla Subrahmanyam and N. Rukma Rekha and Y. V. Subba Rao}, title = {Multi-group key agreement protocol using secret sharing scheme}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {143--152}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134119}, doi = {10.1504/IJSN.2023.134119}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SubrahmanyamRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangG23, author = {Yixuan Wang and Xian Guo}, title = {{CPPABK:} conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {199--212}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135510}, doi = {10.1504/IJSN.2023.135510}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WangG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangZZG23, author = {Chao Wang and Hongwei Zhang and Jinrui Zhang and Lichuan Gu}, title = {Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {175--188}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134116}, doi = {10.1504/IJSN.2023.134116}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WangZZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanHMSDX23, author = {Yan Yan and Eyeleko Anselme Herman and Adnan Mahmood and Zichao Sun and Zhuoyue Dong and Fei Xu}, title = {Privacy preserving dynamic data release based on non-synonymous diverse anatomy}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {75--90}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131595}, doi = {10.1504/IJSN.2023.131595}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanHMSDX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanZLQW23, author = {Hao Yan and Zheng Zhang and Yanan Liu and Shuo Qiu and Qiuling Wu}, title = {Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {125--132}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131610}, doi = {10.1504/IJSN.2023.131610}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangFZ23, author = {Yudi Zhang and Yongxin Feng and Yuntao Zhao}, title = {MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising {LSTM} trainable parameters}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {133--142}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134131}, doi = {10.1504/IJSN.2023.134131}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangYSLG23, author = {Hehui Zhang and Yong Yang and Xi Song and Wenhui Li and Shuqiang Guo}, title = {An abnormal intrusion detection method based on self-organising model}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {117--124}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131598}, doi = {10.1504/IJSN.2023.131598}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouSYG23, author = {Changsong Zhou and Guozi Sun and Xuan You and Yu Gu}, title = {A slice-based encryption scheme for {IPFS}}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {42--51}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129898}, doi = {10.1504/IJSN.2023.129898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouSYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuDMS23, author = {Dexin Zhu and Xiaogang Du and Jigui Mao and Lijun Song}, title = {A security control scheme based on quantum keys for IoT terminals}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {189--198}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134123}, doi = {10.1504/IJSN.2023.134123}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AgnihotriPCM22, author = {Anmol Agnihotri and R. Padmavathi and Santanu Chatterjee and Vinod Kumar Mahor}, title = {Privacy in content-centric networking against side channel attacks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {13--27}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122544}, doi = {10.1504/IJSN.2022.122544}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AgnihotriPCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlshayejiA22, author = {Mohammad H. Alshayeji and Sa'ed Abed}, title = {Enhanced video-on-demand security in cloud computing against insider and outsider threats}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {48--55}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122550}, doi = {10.1504/IJSN.2022.122550}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlshayejiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlvarezR22, author = {Oscar Danilo Gavil{\'{a}}nez Alvarez and Glen Dario Rodriguez Rafael}, title = {VoIP security auditing model based on {COBIT} 4.1}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {63--76}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123293}, doi = {10.1504/IJSN.2022.123293}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlvarezR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BhatiaVKA22, author = {Ashutosh Bhatia and Deepak Kumar Vishvakarma and Rekha Kaushik and Ankit Agrawal}, title = {Entropy and likelihood-based detection of {DGA} generated domain names and their families}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {147--192}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050429}, doi = {10.1504/IJSN.2022.10050429}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/BhatiaVKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Boutekkouk22, author = {Fateh Boutekkouk}, title = {A literature review on security-aware design space exploration approaches for embedded systems}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {247--268}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052252}, doi = {10.1504/IJSN.2022.10052252}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Boutekkouk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GaneshPP22, author = {Ponnuru Surya Ganesh and R. Padmavathy and Anil Pinapati}, title = {An efficient scalar multiplication algorithm on Koblitz curves using {\(\tau\)}\({}^{\mbox{3}}\)-NAF}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {240--246}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052251}, doi = {10.1504/IJSN.2022.10052251}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GaneshPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HalloS22, author = {Mar{\'{\i}}a Hallo and Gabriela Suntaxi}, title = {A survey on {SQL} injection attacks, detection and prevention techniques - a tertiary study}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {193--202}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050430}, doi = {10.1504/IJSN.2022.10050430}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HalloS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangGSCC22, author = {Shizhen Huang and Anhua Guo and Kaikai Su and Siyu Chen and Ruiqi Chen}, title = {Implementation of quasi-Newton algorithm on {FPGA} for IoT endpoint devices}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {124--134}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123300}, doi = {10.1504/IJSN.2022.123300}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuangGSCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KherbacheAE22, author = {Meriem Kherbache and Kamal Amroun and David Espes}, title = {A new wrapper feature selection model for anomaly-based intrusion detection systems}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {107--123}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123298}, doi = {10.1504/IJSN.2022.123298}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MahorPC22, author = {Vinod Kumar Mahor and R. Padmavathy and Santanu Chatterjee}, title = {Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through {SIP}}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {39--47}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122547}, doi = {10.1504/IJSN.2022.122547}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MahorPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MasarwehA22, author = {Ala' Masarweh and Jaafer Al{-}Saraireh}, title = {Threat led advanced persistent threat penetration test}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {203--219}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050431}, doi = {10.1504/IJSN.2022.10050431}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MasarwehA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MeloSBNOR22, author = {Wilson S. Melo Jr. and Lucas S. dos Santos and Lucila M. S. Bento and Paulo R. M. Nascimento and Carlos A. R. Oliveira and Ramon R. Rezende}, title = {Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {77--91}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123294}, doi = {10.1504/IJSN.2022.123294}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MeloSBNOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NishaP22, author = {T. N. Nisha and Dhanya Pramod}, title = {Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {269--283}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10051286}, doi = {10.1504/IJSN.2022.10051286}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/NishaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PatilP22, author = {Rachana Yogesh Patil and Yogesh H. Patil}, title = {A provably secure signcryption with proxy re-encryption for smart water grid network}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {231--239}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10045294}, doi = {10.1504/IJSN.2022.10045294}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PatilP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QiuB22, author = {Mingyue Qiu and Zhijie Bi}, title = {Police alarm address recognition and classification based on convolutional neural networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {56--62}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122575}, doi = {10.1504/IJSN.2022.122575}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QiuB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Rababaah22, author = {Aaron Rasheed Rababaah}, title = {Simulated study of the influence of node density on the performance of wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {284--292}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052246}, doi = {10.1504/IJSN.2022.10052246}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Rababaah22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RehmanWM22, author = {Syed Rameez Rehman and Mudassar Waheed and Ammar Masood}, title = {Security-enhanced Android for an enterprise}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {92--106}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123296}, doi = {10.1504/IJSN.2022.123296}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RehmanWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SalahAZ22, author = {Saeed Salah and Mohammad A. AL{-}Shudeifat and Raid Zaghal}, title = {Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122543}, doi = {10.1504/IJSN.2022.122543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SalahAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanTLW22, author = {Jun Yan and Yupan Tian and Hai Liu and Zhenqiang Wu}, title = {Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {28--38}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122545}, doi = {10.1504/IJSN.2022.122545}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanTLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YangWYU22, author = {Xiaoteng Yang and Zhenqiang Wu and Jun Yan and Mubarak Umar}, title = {Network tolerance optimisation to random and target attacks based on percolation theory}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {135--146}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2021.10040383}, doi = {10.1504/IJSN.2021.10040383}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YangWYU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZuoZQY22, author = {Yuan Zuo and Xiaozhou Zhu and Jiangyi Qin and Wen Yao}, title = {Heterogeneous big data fusion in distributed networking systems for anomaly detection and localisation}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {220--229}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050428}, doi = {10.1504/IJSN.2022.10050428}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZuoZQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlnefaieAC21, author = {Seham Alnefaie and Suhair Alshehri and Asma Cherif}, title = {A survey on access control in IoT: models, architectures and research opportunities}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {60--76}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112837}, doi = {10.1504/IJSN.2021.112837}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlnefaieAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenHLWP21, author = {Guanlin Chen and Qiao Hu and Kaimin Li and Wenyong Weng and Yubo Peng}, title = {A novel security management system for hazardous chemicals}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {135--140}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117869}, doi = {10.1504/IJSN.2021.117869}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ChenHLWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenLCCL21, author = {Chia{-}Mei Chen and Gu Hsin Lai and Zheng{-}Xun Cai and Tzu{-}Ching Chang and Boyi Lee}, title = {Detecting {PE} infection-based malware}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {191--199}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117871}, doi = {10.1504/IJSN.2021.117871}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ChenLCCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenSHDW21, author = {Guanlin Chen and Jiapeng Shen and Jiang He and Xu Dai and Wenyong Weng}, title = {An overall analysis method of urban road parking lots based on data mining}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {105--111}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116774}, doi = {10.1504/IJSN.2021.116774}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenSHDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenYCCL21, author = {Guanlin Chen and Rutao Yao and Gang Chen and Jie Chen and Tian Li}, title = {A smart urban management information public opinion analysis system}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {92--97}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116779}, doi = {10.1504/IJSN.2021.116779}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenYCCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DariBE21, author = {El Yazid Dari and Ahmed Bendahmane and Mohamed Essaaidi}, title = {Verification-based data integrity mechanism in smart grid network}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {1--11}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112835}, doi = {10.1504/IJSN.2021.112835}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/DariBE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DariBE21a, author = {El Yazid Dari and Ahmed Bendahmane and Mohamed Essaaidi}, title = {A novel approach for {COVID-19} outbreak spread monitoring and control using smart grid technology}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {112--116}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116776}, doi = {10.1504/IJSN.2021.116776}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/DariBE21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DouFH21, author = {Rulin Dou and Xuming Fang and Dandan Huang}, title = {An efficient range-free multi-hop localisation algorithm for irregular wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {37--48}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112839}, doi = {10.1504/IJSN.2021.112839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DouFH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EdrisALH21, author = {Ed Kamya Kiyemba Edris and Mahdi Aiash and Jonathan Kok{-}Keong Loo and Mohammad Shadi Al Hakeem}, title = {Formal verification of secondary authentication protocol for 5G secondary authentication}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {223--234}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119379}, doi = {10.1504/IJSN.2021.119379}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/EdrisALH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FanWZGMOA21, author = {Jinnan Fan and Fabian Willems and Jafar Zahed and John Gray and Serge Mister and Mike Ounsworth and Carlisle Adams}, title = {Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {200--211}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117887}, doi = {10.1504/IJSN.2021.117887}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/FanWZGMOA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FarooqH21, author = {Mansoor Farooq and Mubashir Hassan}, title = {IoT smart homes security challenges and solution}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {235--243}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119395}, doi = {10.1504/IJSN.2021.119395}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FarooqH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FehisNK21, author = {Saad Fehis and Omar Nouali and Mohand Tahar Kechadi}, title = {Encryption key management as a trusted security as a service for cloud computing}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {150--162}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117865}, doi = {10.1504/IJSN.2021.117865}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FehisNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FloraSHN21, author = {J. Blessy Annie Flora and Radha Sankararajan and Rajendran Hemalatha and Sukumaran Aasha Nandhini}, title = {Plant disease detection for banana using long range wide area network}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {129--134}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116778}, doi = {10.1504/IJSN.2021.116778}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FloraSHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GhorbelGJ21, author = {Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel}, title = {A model-based approach for multi-level privacy policies derivation for cloud services}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {12--27}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112836}, doi = {10.1504/IJSN.2021.112836}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GhorbelGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HademSM21, author = {Pynbianglut Hadem and Dilip Kumar Saikia and Soumen Moulik}, title = {{I-SMITE:} an {IP} traceback mechanism for inter-AS {SDN} networks using {BGP}}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {163--173}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117864}, doi = {10.1504/IJSN.2021.117864}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/HademSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JokicBHP21, author = {Aleksandar Jokic and Sabina Barakovic and Jasmina Barakovic Husic and Jasna Pleho}, title = {Partial rule security information and event management concept in detecting cyber incidents}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {117--128}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116777}, doi = {10.1504/IJSN.2021.116777}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JokicBHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiHZJT21, author = {Wenxin Li and Jingsha He and Nafei Zhu and Shuting Jin and Da Teng}, title = {An authorisation certificate-based access control model}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {258--266}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119393}, doi = {10.1504/IJSN.2021.119393}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiHZJT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Martinez-Magdaleno21, author = {Samuel Mart{\'{\i}}nez{-}Magdaleno and Victor Morales{-}Rocha and Ram{\'{o}}n Parra}, title = {A review of security risks and countermeasures in containers}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {183--190}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117867}, doi = {10.1504/IJSN.2021.117867}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Martinez-Magdaleno21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NagrathAP21, author = {Preeti Nagrath and Sandhya Aneja and G. N. Purohit}, title = {Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {77--91}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116772}, doi = {10.1504/IJSN.2021.116772}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NagrathAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OlakanmiO21, author = {Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi}, title = {A secure and privacy-preserving scheme for secure metering and cooperative communication in advanced metering infrastructure of smart grid networks}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {267--280}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119396}, doi = {10.1504/IJSN.2021.119396}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/OlakanmiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SharmaGS21, author = {Rohini Sharma and Ajay Guleria and R. K. Singla}, title = {Flow-based profile generation and network traffic detection for {DNS} anomalies using optimised entropy-based features selection and modified Holt Winter's method}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {244--257}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119380}, doi = {10.1504/IJSN.2021.119380}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SharmaGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SilveiraG21, author = {Matheus Monteiro Silveira and Rafael Lopes Gomes}, title = {{IMMI:} an architecture integrated for management of modern internet service providers}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {141--149}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117863}, doi = {10.1504/IJSN.2021.117863}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SilveiraG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Song21, author = {Sanhua Song}, title = {An effective congestion control scheme based on early offload for space delay/disruption tolerant network}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {28--36}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112838}, doi = {10.1504/IJSN.2021.112838}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Song21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TafazzoliAC21, author = {Tala Tafazzoli and Abouzar Arabsorkhi and Amirahmad Chapnevis}, title = {An automated method for detecting suspicious nodes in bitcoin address graph}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {4}, pages = {213--222}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.119391}, doi = {10.1504/IJSN.2021.119391}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/TafazzoliAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YangXL21, author = {Xiong Yang and Guangqian Xie and Xiaofang Li}, title = {Identifying influential spreaders in complex networks using neighbourhood coreness and path diversity}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {3}, pages = {174--182}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.117866}, doi = {10.1504/IJSN.2021.117866}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/YangXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouZZ21, author = {Jingchun Zhou and Dehuan Zhang and Weishi Zhang}, title = {Adaptive histogram fusion-based colour restoration and enhancement for underwater images}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {1}, pages = {49--59}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.112848}, doi = {10.1504/IJSN.2021.112848}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuX21, author = {Changhong Zhu and Ning Xiao}, title = {An algorithm of {NLOS} error identification and mitigation in mobile location estimation}, journal = {Int. J. Secur. Networks}, volume = {16}, number = {2}, pages = {98--104}, year = {2021}, url = {https://doi.org/10.1504/IJSN.2021.116773}, doi = {10.1504/IJSN.2021.116773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlmobaideenA20, author = {Wesam Almobaideen and Muhyidean Altarawneh}, title = {Fog computing: survey on decoy information technology}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {111--121}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106833}, doi = {10.1504/IJSN.2020.106833}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlmobaideenA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlvesBMS20, author = {Cl{\'{a}}udio Alves and Fl{\'{a}}via Bernardini and Edwin B. Mitacc Meza and Leandro Sousa}, title = {Evaluating the behaviour of stream learning algorithms for detecting invasion on wireless networks}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {133--140}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109691}, doi = {10.1504/IJSN.2020.109691}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlvesBMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AmmarARA20, author = {Mostafa H. Ammar and Ayman A. Abdel{-}Hamid and Mohamed R. M. Rizk and Magdy A. Ahmed}, title = {A framework for security enhancement in multitenant SDN-based datacentres}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {183--196}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111127}, doi = {10.1504/IJSN.2020.111127}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AmmarARA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Azab20, author = {Ahmad Azab}, title = {Packing resistant solution to group malware binaries}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {123--132}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109686}, doi = {10.1504/IJSN.2020.109686}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Azab20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BasodiTSP20, author = {Sunitha Basodi and Song Tan and WenZhan Song and Yi Pan}, title = {Data integrity attack detection in smart grid: a deep learning approach}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {15--24}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106506}, doi = {10.1504/IJSN.2020.106506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BasodiTSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Chen20, author = {Zesheng Chen}, title = {Characterising spatial dependence on epidemic thresholds in networks}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106503}, doi = {10.1504/IJSN.2020.106503}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Chen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenQTWLP20, author = {Tianwei Chen and Yongjun Qiang and Chunming Tang and Zairong Wang and Ping Luo and Lingxi Peng}, title = {Malicious behaviour identification for Android based on an {RBF} neural network}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {148--154}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109706}, doi = {10.1504/IJSN.2020.109706}, timestamp = {Tue, 08 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenQTWLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenSCZ20, author = {Guanlin Chen and Xiaolong Shi and Moke Chen and Liang Zhou}, title = {Text similarity semantic calculation based on deep reinforcement learning}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {59--66}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106526}, doi = {10.1504/IJSN.2020.106526}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenSCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenSXLY20, author = {Guanlin Chen and Jiawei Shi and Huang Xu and Tian Li and Wujian Yang}, title = {An improved genetic algorithm in shared bicycle parking point allocation}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {141--147}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109710}, doi = {10.1504/IJSN.2020.109710}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenSXLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Farahmand-Nejad20, author = {Akram Farahmand{-}Nejad and Samira Noferesti}, title = {A real-time botnet detection model based on an efficient wrapper feature selection method}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {36--45}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106509}, doi = {10.1504/IJSN.2020.106509}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Farahmand-Nejad20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HanZLWLZ20, author = {Haiqing Han and Siru Zhu and Qin Li and Xiao Wang and Yutian Lei and Yuwei Zhang}, title = {Public-key cryptosystem based on quantum {BCH} codes and its quantum digital signature}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {197--205}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111131}, doi = {10.1504/IJSN.2020.111131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HanZLWLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiGZH20, author = {Yufeng Li and Shiyu Gu and Weiping Zhao and Yufeng Huang}, title = {Space-time adaptive processing anti-jamming algorithm for navigation receiver}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {155--163}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109711}, doi = {10.1504/IJSN.2020.109711}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiGZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuDW20, author = {Haibo Liu and Yujie Dong and Fuzhong Wang}, title = {An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine underground}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {85--92}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106834}, doi = {10.1504/IJSN.2020.106834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MohantaJS20, author = {Bhabendu Kumar Mohanta and Debasish Jena and Srichandan Sobhanayak}, title = {Multi-party computation review for secure data processing in IoT-fog computing environment}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {164--174}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109697}, doi = {10.1504/IJSN.2020.109697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MohantaJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PingGWZ20, author = {Yuan Ping and Xuyang Guo and Baocang Wang and Jingxian Zhou}, title = {Secure outsourcing of modular inverses and scalar multiplications on elliptic curves}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {101--110}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106832}, doi = {10.1504/IJSN.2020.106832}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PingGWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SanoussiOH20, author = {Nouhad Sanoussi and Ghizlane Orhanou and Said El Hajji}, title = {A game theoretic approach based on intrusion tolerant systems}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {175--181}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109698}, doi = {10.1504/IJSN.2020.109698}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SanoussiOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShangW20, author = {Jiacheng Shang and Jie Wu}, title = {AudioKey: a usable device pairing system using audio signals on smartwatches}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {46--58}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106518}, doi = {10.1504/IJSN.2020.106518}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShangW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SinghKS20, author = {Rohit Singh and Mala Kalra and Shano Solanki}, title = {A hybrid approach for intrusion detection based on machine learning}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {233--242}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111128}, doi = {10.1504/IJSN.2020.111128}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SinghKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SinghS20, author = {Rajrupa Singh and R. Selvakumar}, title = {Designing a secure positioning system using blockchain technology}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {78--84}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106831}, doi = {10.1504/IJSN.2020.106831}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SinghS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangLL20, author = {Zeng{-}Guang Wang and Yu Lu and Xi Li}, title = {Optimal network defense strategy selection based on Bayesian game}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {67--77}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106830}, doi = {10.1504/IJSN.2020.106830}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangWLXL20, author = {Hao Wang and Xiuyou Wang and Huaming Liu and Dongqing Xu and Zhengyan Liu}, title = {A face recognition algorithm based on multiple convolution kernels and double layer sparse automatic encoder}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {224--232}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111134}, doi = {10.1504/IJSN.2020.111134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangWLXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanZWG20, author = {Yan Yan and Lianxiu Zhang and Bingqian Wang and Xin Gao}, title = {Location big data differential privacy dynamic partition release method}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {1}, pages = {25--35}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106505}, doi = {10.1504/IJSN.2020.106505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanZWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YangZHLY20, author = {Bing Yang and Gang Zhao and Ming{-}hua Hu and Chang{-}ping Liu and Ying{-}bao Yang}, title = {A cluster collaborative synchronisation dynamic model of the dissipative coupling supply chain network}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {214--223}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111132}, doi = {10.1504/IJSN.2020.111132}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/YangZHLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuJCSD20, author = {Along Yu and Jiajia Ji and Hao Cao and Hongbing Sun and Jinqiao Dai}, title = {Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensor}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {2}, pages = {93--100}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.106835}, doi = {10.1504/IJSN.2020.106835}, timestamp = {Thu, 07 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YuJCSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangWCSLZ20, author = {Yong Zhang and Tong Wang and Qi Chen and Yu Shi and Jinzhao Li and Liyi Zhang}, title = {Gas leakage acoustic source localisation with compressed sensing method in sensor networks}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {206--213}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111133}, doi = {10.1504/IJSN.2020.111133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangWCSLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BindraS19, author = {Naveen Bindra and Manu Sood}, title = {Why, what and how to measure and improve the security of networks (a snapshot of the current situation of security metrics and the way forward)}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {3}, pages = {158--166}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.10022703}, doi = {10.1504/IJSN.2019.10022703}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BindraS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BouabidiA19, author = {Imen Bouabidi and Pr. Mahmoud Abdellaoui}, title = {A novel cryptographic solution to secure mobile wireless sensors networks}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {221--237}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103166}, doi = {10.1504/IJSN.2019.103166}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BouabidiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BrogiB19, author = {Guillaume Brogi and Elena Di Bernardino}, title = {Hidden Markov models for advanced persistent threats}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {181--190}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103147}, doi = {10.1504/IJSN.2019.103147}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BrogiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CostaJMRZ19, author = {Victor G. T. da Costa and Sylvio Barbon Junior and Rodrigo Sanches Miani and Joel J. P. C. Rodrigues and Bruno Bogaz Zarpel{\~{a}}o}, title = {Mobile botnets detection based on machine learning over system calls}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {2}, pages = {103--118}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.100092}, doi = {10.1504/IJSN.2019.100092}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CostaJMRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CuiRFD19, author = {Yani Cui and Jia Ren and Delong Fu and Chao Dong}, title = {A formation generation algorithm of multiple agents in naval battlefield environments}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {1}, pages = {34--46}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.098916}, doi = {10.1504/IJSN.2019.098916}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CuiRFD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DiabGL19, author = {Tayeb Diab and Marc Gilg and Pascal Lorenz}, title = {A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {2}, pages = {61--77}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.100089}, doi = {10.1504/IJSN.2019.100089}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/DiabGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GhoubachAM19, author = {Imad El Ghoubach and Rachid Ben Abbou and Fatiha Mrabti}, title = {Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {3}, pages = {133--145}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.10022701}, doi = {10.1504/IJSN.2019.10022701}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GhoubachAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KannojiaK19, author = {Suresh Prasad Kannojia and Jasvant Kumar}, title = {XOR-based unexpanded meaningful visual secret sharing scheme}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {1}, pages = {1--9}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.098906}, doi = {10.1504/IJSN.2019.098906}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KannojiaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MancyV19, author = {L. Mancy and S. Maria Celestin Vigila}, title = {Medical image protection using diffusion, substitution and reversible data hiding based on prediction}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {238--249}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103167}, doi = {10.1504/IJSN.2019.103167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MancyV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PremkamalPA19, author = {Praveen Kumar Premkamal and Syam Kumar Pasupuleti and P. J. A. Alphonse}, title = {Efficient revocable {CP-ABE} for big data access control in cloud computing}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {3}, pages = {119--132}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.10022695}, doi = {10.1504/IJSN.2019.10022695}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PremkamalPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RekikMZN19, author = {Malek Rekik and Amel Meddeb{-}Makhlouf and Faouzi Zarai and Petros Nicopolitidis}, title = {{OAP-WMN:} optimised and secure authentication protocol for wireless mesh networks}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {205--220}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103151}, doi = {10.1504/IJSN.2019.103151}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RekikMZN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RizkiLTR19, author = {Kiki Rizki and Argyro Lamproudi and Marco Tiloca and Shahid Raza}, title = {Group-IKEv2 for multicast IPsec in the internet of things}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {1}, pages = {10--22}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.098908}, doi = {10.1504/IJSN.2019.098908}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RizkiLTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RochaSE19, author = {Thiago S. Rocha and Eduardo Souto and Khalil El{-}Khatib}, title = {Techniques to detect data leakage in mobile applications}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {3}, pages = {146--157}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.10022702}, doi = {10.1504/IJSN.2019.10022702}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RochaSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SmythH19, author = {Ben Smyth and Yoshikazu Hanatani}, title = {Non-malleable encryption with proofs of plaintext knowledge and applications to voting}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {4}, pages = {191--204}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.103150}, doi = {10.1504/IJSN.2019.103150}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SmythH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SongZY19, author = {Ling Song and Liqin Zhao and Jin Ye}, title = {A DV-Hop positioning algorithm based on the glowworm swarm optimisation of mixed chaotic strategy}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {1}, pages = {23--33}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.098909}, doi = {10.1504/IJSN.2019.098909}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SongZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Styugin19, author = {Mikhail Styugin}, title = {Dynamic key password authentication}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {2}, pages = {78--85}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.100090}, doi = {10.1504/IJSN.2019.100090}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Styugin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ThanudasSRSGJ19, author = {B. Thanudas and Sreelal Shridharan and Velankanni Cyril Raj and Anugolu Purnesh Sairam and Vinay Gajmoti and Palash Joshi}, title = {A novel architecture for an integrated enterprise network security system}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {1}, pages = {47--60}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.098919}, doi = {10.1504/IJSN.2019.098919}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ThanudasSRSGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Wang19, author = {Chao Wang}, title = {A dynamic evolution model of balanced energy consumption scale-free fault-tolerant topology based on fitness function for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {2}, pages = {86--94}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.100086}, doi = {10.1504/IJSN.2019.100086}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Wang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YadavRPS19, author = {Anil Yadav and Nitin Rakesh and Sujata Pandey and Rajat Kumar Singh}, title = {Optimising the {DTLS} handshake design for {TEE} enabled sensor nodes}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {3}, pages = {167--179}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.10022895}, doi = {10.1504/IJSN.2019.10022895}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YadavRPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuJS19, author = {Along Yu and Jiajia Ji and Shiyu Sun}, title = {An improved multi-objective genetic algorithm and data fusion in structural damage identification}, journal = {Int. J. Secur. Networks}, volume = {14}, number = {2}, pages = {95--102}, year = {2019}, url = {https://doi.org/10.1504/IJSN.2019.100087}, doi = {10.1504/IJSN.2019.100087}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YuJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AsaduzzamanMS18, author = {Abu Asaduzzaman and Shanta Mazumder and Sergio Salinas}, title = {A promising security protocol for protecting near field communication devices from networking attacks}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {2}, pages = {98--107}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.092448}, doi = {10.1504/IJSN.2018.092448}, timestamp = {Sat, 11 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AsaduzzamanMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BiswasW18, author = {Rajorshi Biswas and Jie Wu}, title = {Preserving source and destination location privacy with controlled routing protocol}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {3}, pages = {187--198}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10014320}, doi = {10.1504/IJSN.2018.10014320}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BiswasW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CarterLLSNQ18, author = {Nancy J. Carter and Cheng Li and Qun Li and Jennifer A. Stevens and Ed Novak and Zhengrui Qin}, title = {Graphical passwords for older computer users}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {211--227}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015815}, doi = {10.1504/IJSN.2018.10015815}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CarterLLSNQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Chan-TinR18, author = {Eric Chan{-}Tin and Rakesh Ravishankar}, title = {The case for {HTTPS:} measuring overhead and impact of certificate authorities}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {261--269}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015823}, doi = {10.1504/IJSN.2018.10015823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Chan-TinR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenWYNH18, author = {Zhijiang Chen and Sixiao Wei and Wei Yu and James H. Nguyen and William G. Hatcher}, title = {A cloud/edge computing streaming system for network traffic monitoring and threat detection}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {3}, pages = {169--186}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10014317}, doi = {10.1504/IJSN.2018.10014317}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenWYNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenYHZ18, author = {Guanlin Chen and Taimeng Yang and Rui Huang and Zhuoyue Zhu}, title = {A novel flood defense decision support system for smart urban management based on classification and regression tree}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {245--251}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015786}, doi = {10.1504/IJSN.2018.10015786}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenYHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenZZQ18, author = {Guanlin Chen and Zhikang Zhou and Rongxin Zheng and Tongjun Qi}, title = {A smart urban flood control and warning system based on big data}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {236--244}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015784}, doi = {10.1504/IJSN.2018.10015784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenZZQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DengS18, author = {Yun{-}Xia Deng and Run{-}Hua Shi}, title = {An efficient remote anonymous authentication scheme with user revocation}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {2}, pages = {84--97}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.092475}, doi = {10.1504/IJSN.2018.092475}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DengS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GeS18, author = {W. G. Ge and Li Sun}, title = {A security scheme of digital rights management based on agent encryption and key distribution in cloud computing}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {228--235}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015813}, doi = {10.1504/IJSN.2018.10015813}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoCZNC18, author = {Xian Guo and Cheng Chen and Ma{-}Jiang Zhang and Aristide Ngaboyindekwe and Laicheng Cao}, title = {Privacy-aware transmission scheme based on homomorphic proxy re-encryption for {NDN}}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {58--70}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011754}, doi = {10.1504/IJSN.2018.10011754}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoCZNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KhenousAB18, author = {Lachemi Khenous and Mourad Amad and Abdellah Boukerram}, title = {Enhanced source location privacy mechanism for WSNs}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {3}, pages = {199--210}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10014321}, doi = {10.1504/IJSN.2018.10014321}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KhenousAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MalinaDH18, author = {Lukas Malina and Petr Dzurenda and Jan Hajny}, title = {Evaluation of anonymous digital signatures for privacy-enhancing mobile applications}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {27--41}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011751}, doi = {10.1504/IJSN.2018.10011751}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MalinaDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MartinR18, author = {Robert Martin and Sanguthevar Rajasekaran}, title = {Information centric approach to analysing security threats and node behaviour in underwater senor networks}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {3}, pages = {139--152}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10014322}, doi = {10.1504/IJSN.2018.10014322}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MartinR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NejiBR18, author = {Wafa Neji and Kaouther Blibech and Narjes Ben Rajeb}, title = {A secure electronic voting protocol with a simple ballot's encryption function}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {10--26}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011755}, doi = {10.1504/IJSN.2018.10011755}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NejiBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Ramezani-Chemazi18, author = {Mohammadreza Ramezani{-}Chemazi and Maede Ashouri{-}Talouki}, title = {Toward signature extraction of Metasploit encoding algorithms using static analysis}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {2}, pages = {71--83}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.092472}, doi = {10.1504/IJSN.2018.092472}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Ramezani-Chemazi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShahP18, author = {Ronak Shah and Kailas Patil}, title = {A measurement study of the subresource integrity mechanism on real-world applications}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {2}, pages = {129--138}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.092474}, doi = {10.1504/IJSN.2018.092474}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ShahP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanW18, author = {Avinash Srinivasan and Jie Wu}, title = {{VOUCH-AP:} privacy preserving open-access 802.11 public hotspot {AP} authentication mechanism with co-located evil-twins}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {3}, pages = {153--168}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10014324}, doi = {10.1504/IJSN.2018.10014324}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TentuVP18, author = {Appala Naidu Tentu and China Venkaiah Vadlamudi and V. Kamakshi Prasad}, title = {{CRT} based multi-secret sharing schemes: revisited}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {1--9}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011749}, doi = {10.1504/IJSN.2018.10011749}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TentuVP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuHLWS18, author = {Ning Xu and Haiping Huang and Zhengtao Li and Yunqi Wang and Chao Sha}, title = {An ID-based authentication scheme to achieve the security of smart card}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {42--50}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011752}, doi = {10.1504/IJSN.2018.10011752}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuHLWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuZ18, author = {Huijuan J. Xu and Xin Zheng}, title = {Security mechanism of dynamic and differentiated protection for telecommunications services based on cloud computing}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {252--260}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015818}, doi = {10.1504/IJSN.2018.10015818}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuSX18, author = {Bencheng Yu and Peisen Song and Xiaoyuan Xu}, title = {An android malware static detection scheme based on cloud security structure}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {1}, pages = {51--57}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10011753}, doi = {10.1504/IJSN.2018.10011753}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YuSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZriraMB18, author = {Nabila Zrira and Soufiana Mekouar and El{-}Houssine Bouyakhf}, title = {A novel approach for graph-based global outlier detection in social networks}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {2}, pages = {108--128}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.092473}, doi = {10.1504/IJSN.2018.092473}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZriraMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Abdulla17, author = {Shubair A. Abdulla}, title = {Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {83--102}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004577}, doi = {10.1504/IJSN.2017.10004577}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Abdulla17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CharalampidouPM17, author = {Maria Charalampidou and George Pavlidis and Spyridon G. Mouroutsos}, title = {A novel modular wireless sensor networks approach for security applications}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {40--50}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001807}, doi = {10.1504/IJSN.2017.10001807}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CharalampidouPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChatterjeeK17, author = {Sumanta Chatterjee and Shashidhar G. Koolagudi}, title = {Hierarchical secret sharing scheme using parts of speech of English grammar}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {241--254}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009161}, doi = {10.1504/IJSN.2017.10009161}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChatterjeeK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenYW17, author = {Yingjie Victor Chen and Baijian Yang and Weijie Wang}, title = {NetFlowMatrix: a visual approach for analysing large NetFlow data}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {215--229}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009154}, doi = {10.1504/IJSN.2017.10009154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenZMXH17, author = {Li Jian Chen and Wei Yuan Zhou and Keji Mao and Ming Xia and Ruohong Huan}, title = {A beacon-free localisation algorithm in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {56--63}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001809}, doi = {10.1504/IJSN.2017.10001809}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenZMXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DengZH17, author = {Xiaojun Deng and Tao Zhang and Xunyu He}, title = {Finishing the tiny flows quickly for common data centre services}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {112--119}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004582}, doi = {10.1504/IJSN.2017.10004582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DengZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GhasemiE17, author = {Jamal Ghasemi and Jamal Esmaily}, title = {Intrusion detection systems using a hybrid SVD-based feature extraction method}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {230--240}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009160}, doi = {10.1504/IJSN.2017.10009160}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GhasemiE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KaurDS17, author = {Gurdip Kaur and Renu Dhir and Maninder Singh}, title = {Anatomy of ransomware malware: detection, analysis and reporting}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {188--197}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005218}, doi = {10.1504/IJSN.2017.10005218}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KaurDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KoDLT17, author = {Li Ling Ko and Dinil Mon Divakaran and Yung Siang Liau and Vrizlynn L. L. Thing}, title = {Insider threat detection and its future directions}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {168--187}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005217}, doi = {10.1504/IJSN.2017.10005217}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KoDLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiLZ17, author = {BaoHong Li and Baojun Li and Yinliang Zhao}, title = {Generic construction of role-based encryption in the standard model}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {198--205}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005219}, doi = {10.1504/IJSN.2017.10005219}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuWW17, author = {ZhiQiang Liu and Tong Wang and Xibo Wang}, title = {Destination unaware geometric routing for delay tolerant networks}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {103--111}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004581}, doi = {10.1504/IJSN.2017.10004581}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MakkarTVAS17, author = {Ismeet Kaur Makkar and Fabio Di Troia and Corrado Aaron Visaggio and Thomas H. Austin and Mark Stamp}, title = {SocioBot: a Twitter-based botnet}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {1--12}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001803}, doi = {10.1504/IJSN.2017.10001803}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MakkarTVAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ManPML17, author = {Junfeng Man and Cheng Peng and Yinghui Ma and Changyun Li}, title = {The network software multistep control algorithm based on {NNVD} research}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {65--69}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004573}, doi = {10.1504/IJSN.2017.10004573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ManPML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PengZPM17, author = {Cheng Peng and Canqing Zhang and Cheng Peng and Junfeng Man}, title = {A reinforcement learning approach to map reduce auto-configuration under networked environment}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {135--140}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005214}, doi = {10.1504/IJSN.2017.10005214}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PengZPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QassimZA17, author = {Qais Qassim and Abdullah Mohd Zin and Mohd Juzaiddin Ab Aziz}, title = {Anomaly-based network {IDS} false alarm filter using cluster-based alarm classification approach}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {13--26}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001805}, doi = {10.1504/IJSN.2017.10001805}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QassimZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RuanZ17, author = {Yefeng Ruan and Xukai Zou}, title = {Receipt-freeness and coercion resistance in remote E-voting systems}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {120--133}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004583}, doi = {10.1504/IJSN.2017.10004583}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RuanZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Shen17, author = {Yuxia Shen}, title = {Distributed storage system model design in internet of things based on hash distribution}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {141--151}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005215}, doi = {10.1504/IJSN.2017.10005215}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Shen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanWS17, author = {Avinash Srinivasan and Jie Wu and Justin Y. Shi}, title = {Secure android covert channel with robust survivability to service provider restrictions}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {27--39}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001806}, doi = {10.1504/IJSN.2017.10001806}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/VelascoR17, author = {Danny Velasco and Glen Dario Rodriguez Rafael}, title = {A review of the current state of Honeynet architectures and tools}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {255--272}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009165}, doi = {10.1504/IJSN.2017.10009165}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/VelascoR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WeiLMLX17, author = {Zhenhua Wei and Zhifeng Liu and Jie Miao and Lihua Li and Wei Xu}, title = {Configurable workflow platform based on SaaS model}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {207--214}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009153}, doi = {10.1504/IJSN.2017.10009153}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WeiLMLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WenDS17, author = {Chuah Chai Wen and Ed Dawson and Leonie Simpson}, title = {Stream cipher based key derivation function}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {70--82}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004574}, doi = {10.1504/IJSN.2017.10004574}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WenDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Zheng17, author = {Guangcheng Zheng}, title = {Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {152--167}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005216}, doi = {10.1504/IJSN.2017.10005216}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Zheng17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouCMXH17, author = {Wei Yuan Zhou and Li Jian Chen and Keji Mao and Ming Xia and Ruohong Huan}, title = {A RFID-based prisoner localisation system}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {51--55}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001808}, doi = {10.1504/IJSN.2017.10001808}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouCMXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbukhalafWZ16, author = {Hala Abukhalaf and Jianxin Wang and Shigeng Zhang}, title = {Distance outlier detection with a mobile beacon in wireless sensor networks localisation}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {3}, pages = {160--166}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.078392}, doi = {10.1504/IJSN.2016.078392}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbukhalafWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AnnaduraiY16, author = {P. Annadurai and S. Yazhini}, title = {Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {94--105}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075076}, doi = {10.1504/IJSN.2016.075076}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AnnaduraiY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BaekJ16, author = {Sung{-}Hyun Baek and Jong{-}Wook Jang}, title = {Design and implementation of the smart blackbox system}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {3}, pages = {167--174}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.078394}, doi = {10.1504/IJSN.2016.078394}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BaekJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Bi16, author = {Ye Bi}, title = {A hybrid {PSO-SVM} model for network intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {196--203}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.10000343}, doi = {10.1504/IJSN.2016.10000343}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Bi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenC16, author = {Zesheng Chen and Chao Chen}, title = {Characterising heterogeneity in vulnerable hosts on worm propagation}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {224--234}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079276}, doi = {10.1504/IJSN.2016.079276}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenGXYECE16, author = {Zhijiang Chen and Linqiang Ge and Guobin Xu and Wei Yu and Robert F. Erbacher and Hasan Cam and Nnanna Ekedebe}, title = {A threat monitoring system in enterprise networks with smart mobiles}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075073}, doi = {10.1504/IJSN.2016.075073}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ChenGXYECE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DadhichDG16, author = {Priyanka Dadhich and Kamlesh Dutta and Mahesh Chandra Govil}, title = {Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in {P2P} decentralised electronic communities}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {48--65}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075072}, doi = {10.1504/IJSN.2016.075072}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DadhichDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FerragNG16, author = {Mohamed Amine Ferrag and Mehdi Nafa and Salim Ghanemi}, title = {{EPSA:} an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {3}, pages = {107--125}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.10000172}, doi = {10.1504/IJSN.2016.10000172}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/FerragNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HeCZ16, author = {Pengju He and Xiaomeng Chen and Huazhi Zeng}, title = {Wireless sensor network for multi-target detection algorithm based on blind source separation}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {235--241}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079275}, doi = {10.1504/IJSN.2016.079275}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HeCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JinWL16, author = {Zhengping Jin and Qing Wang and Zhongxian Li}, title = {A formal construction of certificateless proxy multi-signature scheme}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {3}, pages = {126--139}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.078391}, doi = {10.1504/IJSN.2016.078391}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JinWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KarouiFG16, author = {Kamel Karoui and Fakher Ben Ftima and Henda Ben Gh{\'{e}}zala}, title = {A framework for firewalls policy representativeness testing based on classification and reversible metrics}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {3}, pages = {140--159}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.078393}, doi = {10.1504/IJSN.2016.078393}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KarouiFG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuHMX16, author = {Yanan Liu and Lein Harn and Lei Mao and Zhangliang Xiong}, title = {Full-healing group-key distribution in online social networks}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {12--24}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075070}, doi = {10.1504/IJSN.2016.075070}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiuHMX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NomulaRV16, author = {Rupesh Nomula and Mayssaa El Rifai and Pramode K. Verma}, title = {Multi-photon tolerant protocols for quantum secure communication in wireless standards}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {25--36}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075071}, doi = {10.1504/IJSN.2016.075071}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NomulaRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ParakhVS16, author = {Abhishek Parakh and Pramode K. Verma and Mahadevan Subramaniam}, title = {Improving efficiency of quantum key distribution with probabilistic measurements}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {37--47}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075075}, doi = {10.1504/IJSN.2016.075075}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ParakhVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RenHY16, author = {Gao Ren and Wang Hui and Zhang Yun}, title = {A multi-channel {MAC} protocol with power control in the distributed cognitive radio networks}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {204--212}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079282}, doi = {10.1504/IJSN.2016.079282}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RenHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShaoZZSC16, author = {Feng Shao and Shun Zhang and Hong Zhong and Runhua Shi and Jie Cui}, title = {Keyword search protocol with privacy preservation using ID-based proxy reencryption}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {188--195}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079307}, doi = {10.1504/IJSN.2016.079307}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShaoZZSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SubramaniamP16, author = {Pranav Subramaniam and Abhishek Parakh}, title = {A quantum Diffie-Hellman protocol}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {213--223}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079277}, doi = {10.1504/IJSN.2016.079277}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SubramaniamP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SubudhiP16, author = {Sharmila Subudhi and Suvasini Panigrahi}, title = {Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {3--11}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075069}, doi = {10.1504/IJSN.2016.075069}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SubudhiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Thamilarasu16, author = {Geethapriya Thamilarasu}, title = {iDetect: an intelligent intrusion detection system for wireless body area networks}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {82--93}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075074}, doi = {10.1504/IJSN.2016.075074}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Thamilarasu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WahaballaXLQQ16, author = {Abubaker Wahaballa and Hu Xiong and Fagen Li and Zhen Qin and Zhiguang Qin}, title = {Secure mobile agent-based English auction protocol using identity-based signature scheme}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {4}, pages = {175--187}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.079281}, doi = {10.1504/IJSN.2016.079281}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WahaballaXLQQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbdallahABAA15, author = {Alaa Eddien Abdallah and Emad Eddien Abdallah and Mohammad Bsoul and Ahmad Al{-}Khasawneh and Lina Amer}, title = {A blind 3D watermarking technique using spherical coordinates and skewness measure}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {1--8}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068390}, doi = {10.1504/IJSN.2015.068390}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallahABAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AgrawalS15, author = {Arshi Agrawal and Mark Stamp}, title = {Masquerade detection on GUI-based Windows systems}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {32--41}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068409}, doi = {10.1504/IJSN.2015.068409}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/AgrawalS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AtenieseMSVVF15, author = {Giuseppe Ateniese and Luigi V. Mancini and Angelo Spognardi and Antonio Villani and Domenico Vitali and Giovanni Felici}, title = {Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {137--150}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071829}, doi = {10.1504/IJSN.2015.071829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AtenieseMSVVF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BagaiTKS15, author = {Rajiv Bagai and Bin Tang and Ahsan A. Khan and Abdus Samad}, title = {A system-wide anonymity metric with message multiplicities}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {20--31}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068391}, doi = {10.1504/IJSN.2015.068391}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BagaiTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BenamaraL15, author = {Mohammed Amin Benamara and Huixian Li}, title = {Secure of personal health records shared in cloud computing using cipher-text attribute based encryption}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {183--190}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071833}, doi = {10.1504/IJSN.2015.071833}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BenamaraL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GaoXRS15, author = {Jingcheng Gao and Yang Xiao and Sneha Rao and Fnu Shalini}, title = {Security tests and attack experimentations of ProtoGENI}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {151--169}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071834}, doi = {10.1504/IJSN.2015.071834}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GaoXRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoX15, author = {Zuhua Guo and Lixin Xu}, title = {Research of security structure model for web application systems based on the relational database}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {207--213}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072437}, doi = {10.1504/IJSN.2015.072437}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Huang15, author = {Jian Huang}, title = {Research on optimisation and application of improved fuzzy neural network control algorithm}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {255--260}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072442}, doi = {10.1504/IJSN.2015.072442}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Huang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimJ15, author = {Jongdeug Kim and Taehyun Jeon}, title = {Efficient resource allocation for mobile instant messaging service in wireless network}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {48--55}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068411}, doi = {10.1504/IJSN.2015.068411}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KortesniemiKSK15, author = {Yki Kortesniemi and Timo Kiravuo and Mikko S{\"{a}}rel{\"{a}} and Hannu H. Kari}, title = {Chain reduction of authorisation certificates}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {107--123}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070424}, doi = {10.1504/IJSN.2015.070424}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KortesniemiKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KumarL15, author = {N. M. Saravana Kumar and S. Lavanya}, title = {A novel scheme for secure group communication in multicast network}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {65--75}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070409}, doi = {10.1504/IJSN.2015.070409}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KumarL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LeeAS15, author = {Jared Lee and Thomas H. Austin and Mark Stamp}, title = {Compression-based analysis of metamorphic malware}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {124--136}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070426}, doi = {10.1504/IJSN.2015.070426}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LeeAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LeeKJKICPLK15, author = {Ki Young Lee and Aleum Kim and Ye Eun Jeon and Jeong{-}Joon Kim and Yong Soon Im and Gyoo{-}Seok Choi and Sang{-}Bong Park and Yun Sik Lim and Jeong Jin Kang}, title = {Spatio-temporal {XACML:} the expansion of {XACML} for access control}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {56--63}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068412}, doi = {10.1504/IJSN.2015.068412}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LeeKJKICPLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NdatinyaXMMX15, author = {Vivens Ndatinya and Zhifeng Xiao and Vasudeva Rao Manepalli and Ke Meng and Yang Xiao}, title = {Network forensics analysis using Wireshark}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {91--106}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070421}, doi = {10.1504/IJSN.2015.070421}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/NdatinyaXMMX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OhK15, author = {Jai{-}Pil Oh and Dong Ho Kim}, title = {System architecture and platform design for terrestrial ultra-high definition {(UHD)} broadcasting service}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {76--83}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070413}, doi = {10.1504/IJSN.2015.070413}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OhK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ParkPC15, author = {Inkyoo Park and Jongjin Park and Gyoo{-}Seok Choi}, title = {Using Bayesian posterior probability in confidence of attributes for feature selection}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {2}, pages = {84--90}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.070418}, doi = {10.1504/IJSN.2015.070418}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ParkPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RudraV15, author = {Bhawana Rudra and O. P. Vyas}, title = {Understanding and mitigating security and authentication issues in service oriented network architecture}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {9--19}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068392}, doi = {10.1504/IJSN.2015.068392}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RudraV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Sarrab15, author = {Mohamed Sarrab}, title = {Bytecode instrumentation mechanism for monitoring mobile application information flow}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {191--206}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071835}, doi = {10.1504/IJSN.2015.071835}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Sarrab15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShaliniXS15, author = {Fnu Shalini and Yang Xiao and Bo Sun}, title = {ProtoGENI experiments}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {239--254}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072446}, doi = {10.1504/IJSN.2015.072446}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ShaliniXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShinCK15, author = {Jiyoung Shin and Eric Chan{-}Tin and Praveenkumar Khethavath}, title = {Accurate geolocation using network coordinates}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {170--182}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071830}, doi = {10.1504/IJSN.2015.071830}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShinCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SongCJ15, author = {Myungseok Song and Jun{-}Dong Cho and Jongpil Jeong}, title = {Random-walk mobility management scheme for sensor-based mobile networks}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {261--270}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072443}, doi = {10.1504/IJSN.2015.072443}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SongCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangZZ15, author = {Tong Wang and Xinlin Zhao and Yucai Zhou}, title = {Community detection in social network using shuffled frog-leaping optimisation}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {222--227}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072439}, doi = {10.1504/IJSN.2015.072439}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WongK15, author = {Alex Ming Hui Wong and Dae{-}Ki Kang}, title = {Game layout and artificial intelligence implementation in mobile 3D tower defence game}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {1}, pages = {42--47}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.068410}, doi = {10.1504/IJSN.2015.068410}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WongK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangWJD15, author = {Zhiming Zhang and Fuying Wu and Changgen Jiang and Jiangang Deng}, title = {An efficient detection scheme of node replication attacks for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {228--238}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072440}, doi = {10.1504/IJSN.2015.072440}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangWJD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouWZ15, author = {Yucai Zhou and Tong Wang and Xinlin Zhao}, title = {A hybrid recommendation algorithm based on time factor}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {4}, pages = {214--221}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.072438}, doi = {10.1504/IJSN.2015.072438}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AhmimG14, author = {Ahmed Ahmim and Nacira Ghoualmi{-}Zine}, title = {A new adaptive intrusion detection system based on the intersection of two different classifiers}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {125--132}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065710}, doi = {10.1504/IJSN.2014.065710}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AhmimG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Al-Salloum14, author = {Ziyad S. Al{-}Salloum}, title = {GeoGraphical passwords}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {56--62}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059330}, doi = {10.1504/IJSN.2014.059330}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Al-Salloum14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AmbikaR14, author = {Nagaraj Ambika and G. T. Raju}, title = {{ECAWSN:} eliminating compromised node with the help of auxiliary nodes in wireless sensor network}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {78--84}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060743}, doi = {10.1504/IJSN.2014.060743}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AmbikaR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BadenhopM14, author = {Christopher W. Badenhop and Barry E. Mullins}, title = {A black hole attack model using topology approximation for reactive ad-hoc routing protocols}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {63--77}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060755}, doi = {10.1504/IJSN.2014.060755}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BadenhopM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChoSL14, author = {Seongsoo Cho and Bhanu Shrestha and Jongsup Lee}, title = {Method of recognising facial image using fuzzy measure}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {185--189}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066188}, doi = {10.1504/IJSN.2014.066188}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChoSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChuangN14, author = {Po{-}Jen Chuang and Ming{-}Yu Ni}, title = {On access control policy assignments and negotiation strategies in automated trust negotiation}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {104--113}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060744}, doi = {10.1504/IJSN.2014.060744}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChuangN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CuiMA14, author = {Hui Cui and Yi Mu and Man Ho Au}, title = {Anonymous broadcast encryption with an untrusted gateway}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {20--29}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059326}, doi = {10.1504/IJSN.2014.059326}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CuiMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FengLM14, author = {Zuhong Feng and Jing Li and Jie Hu Meichsner}, title = {A Bayesian network intrusion detection algorithm based on principal component analysis and sliding window}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {216--221}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066177}, doi = {10.1504/IJSN.2014.066177}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FengLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GroverLG14, author = {Jyoti Grover and Vijay Laxmi and Manoj Singh Gaur}, title = {Sybil attack detection in {VANET} using neighbouring vehicles}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {222--233}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066178}, doi = {10.1504/IJSN.2014.066178}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GroverLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HagenM14, author = {John T. Hagen and Barry E. Mullins}, title = {Network vulnerability analysis of the Player command and control protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {154--166}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065708}, doi = {10.1504/IJSN.2014.065708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HagenM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HenryM14, author = {Wayne C. Henry and Barry E. Mullins}, title = {{VANISH:} a variable advanced network {IRC} stealth handling system}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {114--123}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060741}, doi = {10.1504/IJSN.2014.060741}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HenryM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Islam14, author = {Salekul Islam}, title = {Security analysis of {LMAP} using {AVISPA}}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {30--39}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059325}, doi = {10.1504/IJSN.2014.059325}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Islam14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KangJKA14, author = {Min Soo Kang and Yong{-}Gyu Jung and Myung Ho Kim and Kichan Ahn}, title = {Development of sensor nodes based on fault tolerance}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {190--196}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066181}, doi = {10.1504/IJSN.2014.066181}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KangJKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KarouiFG14, author = {Kamel Karoui and Fakher Ben Ftima and Henda Ben Gh{\'{e}}zala}, title = {Firewalls anomalies severity evaluation and classification}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {167--176}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065712}, doi = {10.1504/IJSN.2014.065712}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KarouiFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimJ14, author = {Jongdeug Kim and Taehyun Jeon}, title = {Signalling optimisation for VoIP service in All-IP network}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {177--184}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065721}, doi = {10.1504/IJSN.2014.065721}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimJJ14, author = {Hwa{-}seon Kim and Seong{-}Jin Jang and Jong{-}Wook Jang}, title = {Development of the knocking decision system using the {CKP} signal collection and analysis}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {209--215}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066183}, doi = {10.1504/IJSN.2014.066183}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimLCLK14, author = {Seong{-}Kweon Kim and Kyung{-}Ryang Lee and Jae{-}Sang Cha and Kyoung{-}Kun Lee and Seong{-}Jong Kim}, title = {Implementation of battery inspection system for building energy management system}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {197--201}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066180}, doi = {10.1504/IJSN.2014.066180}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimLCLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LeeYJ14, author = {Kyungrak Lee and Jaeyoung Yoo and Inwhee Joe}, title = {An environmental transition-aware data transmission scheme with energy efficiency in energy harvesting wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {202--208}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066182}, doi = {10.1504/IJSN.2014.066182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LeeYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MezzourC14, author = {Ghita Mezzour and Kathleen M. Carley}, title = {Spam diffusion in a social network initiated by hacked e-mail accounts}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {144--153}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065709}, doi = {10.1504/IJSN.2014.065709}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MezzourC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Peng14, author = {Kun Peng}, title = {Assumptions and conditions for mix networks: analysis, clarification and improvement}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {133--143}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065719}, doi = {10.1504/IJSN.2014.065719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Peng14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RangwalaZZL14, author = {Mohammed Rangwala and Ping Zhang and Xukai Zou and Feng Li}, title = {A taxonomy of privilege escalation attacks in Android applications}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {40--55}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059327}, doi = {10.1504/IJSN.2014.059327}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RangwalaZZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SantosNWLW14, author = {Daniel Ricardo dos Santos and Tiago Jaime Nascimento and Carla Merkle Westphall and Marcos Aur{\'{e}}lio Pedroso Leandro and Carlos Becker Westphall}, title = {Privacy-preserving identity federations in the cloud: a proof of concept}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059328}, doi = {10.1504/IJSN.2014.059328}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SantosNWLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SeberryMGW14, author = {Jennifer Seberry and Yi Mu and Fuchun Guo and Tim Wellsmore}, title = {Efficient authentication and integrity protection for the border gateway protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {234--243}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066179}, doi = {10.1504/IJSN.2014.066179}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SeberryMGW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SeifiSFB14, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, title = {Security properties analysis in a TPM-based protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {85--103}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060742}, doi = {10.1504/IJSN.2014.060742}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Vajda14, author = {Istv{\'{a}}n Vajda}, title = {A proof technique for security assessment of on-demand ad hoc routing protocols}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {12--19}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059329}, doi = {10.1504/IJSN.2014.059329}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Vajda14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbdallahABOA13, author = {Emad Eddien Abdallah and Alaa Eddien Abdallah and Mohammad Bsoul and Ahmed F. Otoom and Essam Al{-}Daoud}, title = {Simplified features for email authorship identification}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {72--81}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055941}, doi = {10.1504/IJSN.2013.055941}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallahABOA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CroninW13, author = {Brendan Cronin and Xiaojun Wang}, title = {Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {231--238}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058154}, doi = {10.1504/IJSN.2013.058154}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CroninW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CuiMG13, author = {Hui Cui and Yi Mu and Fuchun Guo}, title = {Server-aided identity-based anonymous broadcast encryption}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {29--39}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055038}, doi = {10.1504/IJSN.2013.055038}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CuiMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DondykRZ13, author = {Erich Dondyk and Louis Rivera and Cliff Changchun Zou}, title = {Wi-Fi access denial of service attack to smartphones}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {117--129}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057698}, doi = {10.1504/IJSN.2013.057698}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DondykRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GogoiBK13, author = {Prasanta Gogoi and Dhruba K. Bhattacharyya and Jugal K. Kalita}, title = {A rough set-based effective rule generation method for classification with an application in intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {61--71}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055939}, doi = {10.1504/IJSN.2013.055939}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GogoiBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JusteEWBF13, author = {Pierre St. Juste and Heungsik Eom and Benjamin Woodruff and Corey Baker and Renato J. O. Figueiredo}, title = {Enabling decentralised microblogging through P2PVPNs}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {169--178}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057699}, doi = {10.1504/IJSN.2013.057699}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JusteEWBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KalraS13, author = {Sheetal Kalra and Sandeep K. Sood}, title = {ECC-based anti-phishing protocol for cloud computing services}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {130--138}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057695}, doi = {10.1504/IJSN.2013.057695}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KalraS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiXZ13, author = {Qinyi Li and Hu Xiong and Fengli Zhang}, title = {Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {1--12}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055036}, doi = {10.1504/IJSN.2013.055036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RasslanA13, author = {Mohamed M. Nasreldin Rasslan and Heba Kamal Aslan}, title = {On the security of two improved authenticated encryption schemes}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {194--199}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058112}, doi = {10.1504/IJSN.2013.058112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RathC13, author = {Annanda Thavymony Rath and Jean{-}No{\"{e}}l Colin}, title = {Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {94--105}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055943}, doi = {10.1504/IJSN.2013.055943}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RathC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SantosLSB13, author = {Igor Santos and Carlos Laorden and Borja Sanz and Pablo Garc{\'{\i}}a Bringas}, title = {Reversing the effects of tokenisation attacks against content-based spam filters}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {106--116}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055944}, doi = {10.1504/IJSN.2013.055944}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SantosLSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Sarrab13, author = {Mohamed Sarrab}, title = {Runtime verification using policy-based approach to control information flow}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {212--230}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058153}, doi = {10.1504/IJSN.2013.058153}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Sarrab13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SaxenaC13, author = {Neetesh Saxena and Narendra S. Chaudhari}, title = {An enhanced {NPA} protocol for secure communications in {GSM} network}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {13--28}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055045}, doi = {10.1504/IJSN.2013.055045}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SaxenaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanK013, author = {Avinash Srinivasan and Satish Kolli and Jie Wu}, title = {Steganographic information hiding that exploits a novel file system vulnerability}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {82--93}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055942}, doi = {10.1504/IJSN.2013.055942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanK013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Tahat13, author = {Nedal Tahat}, title = {A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problem}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {207--211}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058113}, doi = {10.1504/IJSN.2013.058113}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Tahat13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TripathiS13, author = {Anshu Tripathi and Umesh Kumar Singh}, title = {A model for quantitative security measurement and prioritisation of vulnerability mitigation}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {139--153}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057696}, doi = {10.1504/IJSN.2013.057696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TripathiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XiaoFXCL13, author = {Zhifeng Xiao and Bo Fu and Yang Xiao and C. L. Philip Chen and Wei Liang}, title = {A review of {GENI} authentication and access control mechanisms}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {40--60}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055046}, doi = {10.1504/IJSN.2013.055046}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XiaoFXCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuGZHR13, author = {Wei Yu and Linqiang Ge and Difan Zhang and Rommie L. Hardy and Robert J. Reschly}, title = {On effective sampling techniques in host-based intrusion detection in tactical {MANET}}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {154--168}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057688}, doi = {10.1504/IJSN.2013.057688}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/YuGZHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuHC13, author = {Jia Yu and Rong Hao and Xiangguo Cheng}, title = {Security analysis and improvement of two verifiable multi-secret sharing schemes}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {200--206}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058147}, doi = {10.1504/IJSN.2013.058147}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YuHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangGYZHR13, author = {Difan Zhang and Linqiang Ge and Wei Yu and Hanlin Zhang and Rommie L. Hardy and Robert J. Reschly}, title = {On effective data aggregation techniques in host-based intrusion detection in {MANET}}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {179--193}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058152}, doi = {10.1504/IJSN.2013.058152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangGYZHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Al-Salloum12, author = {Ziyad S. Al{-}Salloum}, title = {Defensive computer worms: an overview}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {59--70}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048479}, doi = {10.1504/IJSN.2012.048479}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Al-Salloum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlsubhiABB12, author = {Khalid Alsubhi and Yassir Alhazmi and Nizar Bouabdallah and Raouf Boutaba}, title = {Security configuration management in intrusion detection and prevention systems}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {30--39}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048493}, doi = {10.1504/IJSN.2012.048493}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlsubhiABB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Baig12, author = {Zubair A. Baig}, title = {Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {2}, pages = {83--94}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.050025}, doi = {10.1504/IJSN.2012.050025}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Baig12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BoyerROR12, author = {Stephane Boyer and Jean{-}Marc Robert and Hadi Otrok and Clement Rousseau}, title = {An adaptive tit-for-tat strategy for {IEEE} 802.11 {CSMA/CA} protocol}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {2}, pages = {95--106}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.050026}, doi = {10.1504/IJSN.2012.050026}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BoyerROR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ButunWLS12, author = {Ismail Butun and Yufeng Wang and Young{-}seok Lee and Ravi Sankar}, title = {Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {2}, pages = {107--121}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.050027}, doi = {10.1504/IJSN.2012.050027}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ButunWLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Desoky12, author = {Abdelrahman Desoky}, title = {Jokestega: automatic joke generation-based steganography methodology}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {148--160}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052529}, doi = {10.1504/IJSN.2012.052529}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Desoky12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FanianBG12, author = {Ali Fanian and Mehdi Berenjkoub and T. Aaron Gulliver}, title = {A symmetric polynomial-based mutual authentication protocol for {GSM} networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {161--173}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052530}, doi = {10.1504/IJSN.2012.052530}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FanianBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HanCXWL12, author = {Fuye Han and Zhen Chen and HongFeng Xu and Haopei Wang and Yong Liang}, title = {A collaborative botnets suppression system based on overlay network}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {211--219}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053459}, doi = {10.1504/IJSN.2012.053459}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HanCXWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KandahSZW12, author = {Farah I. Kandah and Yashaswi Singh and Weiyi Zhang and Tie Wang}, title = {A misleading active routing attack in mobile ad-hoc networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {17--29}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048492}, doi = {10.1504/IJSN.2012.048492}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KandahSZW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KolesnikovL12, author = {Vladimir Kolesnikov and Wonsuck Lee}, title = {{MAC} aggregation protocols resilient to DoS attacks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {2}, pages = {122--132}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.050028}, doi = {10.1504/IJSN.2012.050028}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KolesnikovL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuXC12, author = {Jing Liu and Yang Xiao and C. L. Philip Chen}, title = {Internet of things' authentication and access control}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {228--241}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053461}, doi = {10.1504/IJSN.2012.053461}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiuXC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LvY12, author = {Shilei Lv and Shunzheng Yu}, title = {A novel middleware-based approach for redundant reader elimination using {PSO}}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {220--227}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053460}, doi = {10.1504/IJSN.2012.053460}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LvY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MoonsamyAB12, author = {Veelasha Moonsamy and Moutaz Alazab and Lynn Margaret Batten}, title = {Towards an understanding of the impact of advertising on data leaks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {181--193}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052540}, doi = {10.1504/IJSN.2012.052540}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MoonsamyAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NejiB12, author = {Nizar Ben Neji and Adel Bouhoula}, title = {Managing hybrid packet filter's specifications}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {2}, pages = {73--82}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.050024}, doi = {10.1504/IJSN.2012.050024}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NejiB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Peng12, author = {Kun Peng}, title = {How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {133--147}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052525}, doi = {10.1504/IJSN.2012.052525}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SunCMW12, author = {Dawei Sun and Guiran Chang and Changsheng Miao and Xingwei Wang}, title = {Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {196--210}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053458}, doi = {10.1504/IJSN.2012.053458}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SunCMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/VespaCW12, author = {Lucas Vespa and Ritam Chakrovorty and Ning Weng}, title = {Lightweight testbed for evaluating worm containment systems}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {6--16}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048478}, doi = {10.1504/IJSN.2012.048478}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/VespaCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WongT12, author = {Duncan S. Wong and Xiaojian Tian}, title = {E-mail protocols with perfect forward secrecy}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {1--5}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048491}, doi = {10.1504/IJSN.2012.048491}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XiaoX12, author = {Zhifeng Xiao and Yang Xiao}, title = {PeerReview re-evaluation for accountability in distributed systems or networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {1}, pages = {40--58}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.048494}, doi = {10.1504/IJSN.2012.048494}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/XiaoX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XingWWW12, author = {Liudong Xing and Honggang Wang and Chaonan Wang and Yujie Wang}, title = {BDD-based two-party trust sensitivity analysis for social networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {242--251}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053462}, doi = {10.1504/IJSN.2012.053462}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XingWWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuNWL12, author = {Zhaohu Xu and Xuyun Nie and Hui Wang and Yongjian Liao}, title = {Cryptanalysis of an improved {MFE} public key cryptosystem}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {174--180}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052532}, doi = {10.1504/IJSN.2012.052532}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuNWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangCXZ12, author = {Jun Zhang and Chao Chen and Yang Xiang and Wanlei Zhou}, title = {Semi-supervised and compound classification of network traffic}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {4}, pages = {252--261}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.053463}, doi = {10.1504/IJSN.2012.053463}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangCXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AmpahASA11, author = {Nana K. Ampah and Cajetan M. Akujuobi and Matthew N. O. Sadiku and Shumon Alam}, title = {An intrusion detection technique based on continuous binary communication channels}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {174--180}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043674}, doi = {10.1504/IJSN.2011.043674}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AmpahASA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BaruaLLS11, author = {Mrinmoy Barua and Xiaohui Liang and Rongxing Lu and Xuemin Shen}, title = {{ESPAC:} Enabling Security and Patient-centric Access Control for eHealth in cloud computing}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {67--76}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043666}, doi = {10.1504/IJSN.2011.043666}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/BaruaLLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChaiG11, author = {Qi Chai and Guang Gong}, title = {On the (in)security of two Joint Encryption and Error Correction schemes}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {191--200}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045227}, doi = {10.1504/IJSN.2011.045227}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChaiG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChangWT11, author = {Wei Chang and Jie Wu and Chiu C. Tan}, title = {Friendship-based location privacy in Mobile Social Networks}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {226--236}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045230}, doi = {10.1504/IJSN.2011.045230}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ChangWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChengGM11, author = {Ningning Cheng and Kannan Govindan and Prasant Mohapatra}, title = {Rendezvous based trust propagation to enhance distributed network security}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {112--122}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043670}, doi = {10.1504/IJSN.2011.043670}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChengGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChoiAG11, author = {Taehwan Choi and Hrishikesh B. Acharya and Mohamed G. Gouda}, title = {Is that you? Authentication in a network without identities}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {181--190}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045226}, doi = {10.1504/IJSN.2011.045226}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChoiAG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChowY11, author = {Sherman S. M. Chow and Siu{-}Ming Yiu}, title = {Exclusion-intersection encryption}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {136--146}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043672}, doi = {10.1504/IJSN.2011.043672}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChowY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Desoky11, author = {Abdelrahman Desoky}, title = {Edustega: an Education-Centric Steganography methodology}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {153--173}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043653}, doi = {10.1504/IJSN.2011.043653}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Desoky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FathyEY11, author = {Ahmed Osama Fathy Atya and Tamer A. ElBatt and Moustafa Youssef}, title = {A source authentication scheme using network coding}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {101--111}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043669}, doi = {10.1504/IJSN.2011.043669}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/FathyEY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JaggiRB11, author = {Neeraj Jaggi and Umesh Marappa Reddy and Rajiv Bagai}, title = {A three dimensional sender anonymity metric}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {77--89}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043667}, doi = {10.1504/IJSN.2011.043667}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JaggiRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KalogridisDLC11, author = {Georgios Kalogridis and Stojan Z. Denic and Tim A. Lewis and Rafael Cepeda}, title = {Privacy protection system and metrics for hiding electrical events}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {14--27}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039630}, doi = {10.1504/IJSN.2011.039630}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KalogridisDLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KundurFMLZB11, author = {Deepa Kundur and Xianyong Feng and Salman Mashayekh and Shan Liu and Takis Zourntos and Karen L. Butler{-}Purry}, title = {Towards modelling the impact of cyber attacks on a smart grid}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {2--13}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039629}, doi = {10.1504/IJSN.2011.039629}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KundurFMLZB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiLL11, author = {Fengjun Li and Bo Luo and Peng Liu}, title = {Secure and privacy-preserving information aggregation for smart grids}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {28--39}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039631}, doi = {10.1504/IJSN.2011.039631}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuXZFW11, author = {Li Liu and Yang Xiao and Jingyuan Zhang and Andrew Faulkner and Keith Weber}, title = {Hidden information in Microsoft Word}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {123--135}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043671}, doi = {10.1504/IJSN.2011.043671}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiuXZFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LuoS11, author = {Guoqi Luo and K. P. Subbalakshmi}, title = {KL-sense secure image steganography}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {211--225}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045229}, doi = {10.1504/IJSN.2011.045229}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LuoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RamseyMTA11, author = {Benjamin W. P. Ramsey and Barry E. Mullins and Ryan W. Thomas and Todd R. Andel}, title = {Subjective audio quality over a secure {IEEE} 802.11n network}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {53--63}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039633}, doi = {10.1504/IJSN.2011.039633}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RamseyMTA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SharmaL11, author = {Madhu J. Sharma and Victor C. M. Leung}, title = {Improved {IP} Multimedia Subsystem authentication mechanism for 3G-WLAN networks}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {90--100}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043668}, doi = {10.1504/IJSN.2011.043668}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SharmaL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TangL11, author = {Shensheng Tang and Wei Li}, title = {An epidemic model with adaptive virus spread control for Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {201--210}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045228}, doi = {10.1504/IJSN.2011.045228}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WalkerL11, author = {David J. Walker and Shahram Latifi}, title = {Partial iris and recognition as a viable biometric scheme}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {2/3}, pages = {147--152}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.043673}, doi = {10.1504/IJSN.2011.043673}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WalkerL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangG11, author = {Jianqing Zhang and Carl A. Gunter}, title = {Application-aware secure multicast for power grid communications}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {1}, pages = {40--52}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.039632}, doi = {10.1504/IJSN.2011.039632}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhaoLX11, author = {Xinxin Zhao and Lingjun Li and Guoliang Xue}, title = {Authenticating strangers in Online Social Networks}, journal = {Int. J. Secur. Networks}, volume = {6}, number = {4}, pages = {237--248}, year = {2011}, url = {https://doi.org/10.1504/IJSN.2011.045231}, doi = {10.1504/IJSN.2011.045231}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhaoLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbbesBR10, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Efficient decision tree for protocol analysis in intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {220--235}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037661}, doi = {10.1504/IJSN.2010.037661}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AzevedoF10, author = {Susana Garrido Azevedo and Jo{\~{a}}o J. Ferreira}, title = {Radio frequency identification: a case study of healthcare organisations}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {147--155}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032213}, doi = {10.1504/IJSN.2010.032213}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/AzevedoF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenCW10, author = {Zesheng Chen and Chao Chen and Qian Wang}, title = {On the scalability of Delay-Tolerant Botnets}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {248--258}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037664}, doi = {10.1504/IJSN.2010.037664}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DaltonEMR10, author = {George C. Dalton II and Kenneth S. Edge and Robert F. Mills and Richard A. Raines}, title = {Analysing security risks in computer and Radio Frequency Identification {(RFID)} networks using attack and protection trees}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {87--95}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032207}, doi = {10.1504/IJSN.2010.032207}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DaltonEMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DongHRW10, author = {Yuhong Dong and Sam Hsu and Saeed Rajput and Bing Wu}, title = {Experimental analysis of application-level intrusion detection algorithms}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {198--205}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032218}, doi = {10.1504/IJSN.2010.032218}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DongHRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoMZL10, author = {Hua Guo and Yi Mu and Xiyong Zhang and Zhoujun Li}, title = {Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {173--187}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032216}, doi = {10.1504/IJSN.2010.032216}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoMZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoP10, author = {Yinghua Guo and Sylvie Perreau}, title = {Detect DDoS flooding attacks in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {259--269}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037666}, doi = {10.1504/IJSN.2010.037666}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsiaoH10, author = {Yu{-}Kai Hsiao and Ren{-}Junn Hwang}, title = {An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {26--34}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030720}, doi = {10.1504/IJSN.2010.030720}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsiaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangS10, author = {Shih{-}I Huang and Shiuhpyng Shieh}, title = {Authentication and secret search mechanisms for RFID-aware wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {15--25}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030719}, doi = {10.1504/IJSN.2010.030719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HutterPF10, author = {Michael Hutter and Thomas Plos and Martin Feldhofer}, title = {On the security of {RFID} devices against implementation attacks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {106--118}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032209}, doi = {10.1504/IJSN.2010.032209}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ImasakiZJ10, author = {Yasuhiro Imasaki and Yongbing Zhang and Yusheng Ji}, title = {Secure and efficient data transmission in {RFID} sensor networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {119--127}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032210}, doi = {10.1504/IJSN.2010.032210}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ImasakiZJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LengLMM10, author = {Xuefei Leng and Yuanhung Lien and Keith Mayes and Konstantinos Markantonakis}, title = {An {RFID} grouping proof protocol exploiting anti-collision algorithm for subgroup dividing}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {79--86}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032206}, doi = {10.1504/IJSN.2010.032206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LengLMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MalligaT10, author = {S. Malliga and A. Tamilarasi}, title = {A backpressure technique for filtering spoofed traffic at upstream routers}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {3--14}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030718}, doi = {10.1504/IJSN.2010.030718}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MalligaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Raad10, author = {Muhammad Wassim Raad}, title = {A ubiquitous mobile telemedicine system for the elderly using {RFID}}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {156--164}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032214}, doi = {10.1504/IJSN.2010.032214}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Raad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RichardAK10, author = {Richard O. Afolabi and Aftab Ahmad and Kiseon Kim}, title = {Security assessments of {IEEE} 802.15.4 standard based on {X.805} framework}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {188--197}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032217}, doi = {10.1504/IJSN.2010.032217}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RichardAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RodriguesJ10, author = {Mark J. Rodrigues and Kieran James}, title = {Perceived barriers to the widespread commercial use of Radio Frequency Identification technology}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {165--172}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032215}, doi = {10.1504/IJSN.2010.032215}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RodriguesJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SchraderMPM10, author = {Karl R. Schrader and Barry E. Mullins and Gilbert L. Peterson and Robert F. Mills}, title = {An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {236--247}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037662}, doi = {10.1504/IJSN.2010.037662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SchraderMPM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SinghL10, author = {Manmeet Mahinderjit Singh and Xue Li}, title = {Trust in RFID-enabled Supply-Chain Management}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {96--105}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032208}, doi = {10.1504/IJSN.2010.032208}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SinghL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Sun10, author = {L. Sun}, title = {Security and privacy on low-cost Radio Frequency Identification systems}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {128--134}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032211}, doi = {10.1504/IJSN.2010.032211}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Sun10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TsaiHW10, author = {Kuo{-}Yu Tsai and Chien{-}Lung Hsu and Tzong{-}Chen Wu}, title = {Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {45--52}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030722}, doi = {10.1504/IJSN.2010.030722}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TsaiHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangS10, author = {Ju Wang and G. L. Smith}, title = {A cross-layer authentication design for secure video transportation in wireless sensor network}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {63--76}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030724}, doi = {10.1504/IJSN.2010.030724}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuCHM10, author = {Li Xu and Sisheng Chen and Xinyi Huang and Yi Mu}, title = {Bloom filter based secure and anonymous {DSR} protocol in wireless ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030721}, doi = {10.1504/IJSN.2010.030721}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuCHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Yang10, author = {Ming{-}Hour Yang}, title = {Lightweight authentication protocol for mobile {RFID} networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {53--62}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030723}, doi = {10.1504/IJSN.2010.030723}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Yang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangGS10, author = {Xiaowen Zhang and Qinghai Gao and Mohamed K. Saad}, title = {Looking at a class of {RFID} APs through {GNY} logic}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {135--146}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032212}, doi = {10.1504/IJSN.2010.032212}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuangLC10, author = {Zhenyun Zhuang and Ying Li and Zesheng Chen}, title = {Enhancing Intrusion Detection System with proximity information}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {207--219}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037660}, doi = {10.1504/IJSN.2010.037660}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuangLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BaiZ09, author = {Li Bai and Xukai Zou}, title = {A Proactive Secret Sharing Scheme in matrix projection method}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {201--209}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028667}, doi = {10.1504/IJSN.2009.028667}, timestamp = {Thu, 29 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BaiZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BerthierC09, author = {Robin Berthier and Michel Cukier}, title = {An evaluation of connection characteristics for separating network attacks}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {110--124}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023430}, doi = {10.1504/IJSN.2009.023430}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BerthierC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BettaharAB09, author = {Hatem Bettahar and Mothanna Alkubeily and Abdelmadjid Bouabdallah}, title = {{TKS:} a transition key management scheme for secure application level multicast}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {210--222}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028668}, doi = {10.1504/IJSN.2009.028668}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BettaharAB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BuhanBDHV09, author = {Ileana Buhan and Bas Boom and Jeroen Doumen and Pieter H. Hartel and Raymond N. J. Veldhuis}, title = {Secure pairing with biometrics}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {27--42}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023424}, doi = {10.1504/IJSN.2009.023424}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChakrabartiCS09, author = {Saikat Chakrabarti and Santosh Chandrasekhar and Mukesh Singhal}, title = {An escrow-less identity-based group-key agreement protocol for dynamic peer groups}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {171--188}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027343}, doi = {10.1504/IJSN.2009.027343}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChakrabartiCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenCL09, author = {Zesheng Chen and Chao Chen and Yubin Li}, title = {Deriving a closed-form expression for worm-scanning strategies}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {135--144}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027339}, doi = {10.1504/IJSN.2009.027339}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DjenouriBM09, author = {Djamel Djenouri and Mohamed Bouamama and Othmane Mahmoudi}, title = {Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {246--262}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028671}, doi = {10.1504/IJSN.2009.028671}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DjenouriBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DrakakisPC09, author = {Konstantinos E. Drakakis and Athanasios D. Panagopoulos and Panayotis G. Cottis}, title = {Overview of satellite communication networks security: introduction of {EAP}}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {164--170}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027342}, doi = {10.1504/IJSN.2009.027342}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DrakakisPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EhlertRM09, author = {Sven Ehlert and Yacine Rebahi and Thomas Magedanz}, title = {Intrusion Detection System for Denial-of-Service flooding attacks in {SIP} communication networks}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {189--200}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027344}, doi = {10.1504/IJSN.2009.027344}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EhlertRM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GoodrichSSSTU09, author = {Michael T. Goodrich and Michael Sirivianos and John Solis and Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {Using audio in secure device pairing}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {57--68}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023426}, doi = {10.1504/IJSN.2009.023426}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuDX09, author = {Fei Hu and De{-}Cun Dong and Yang Xiao}, title = {Attacks and countermeasures in multi-hop Cognitive Radio Networks}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {263--271}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028672}, doi = {10.1504/IJSN.2009.028672}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/HuDX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangKLW09, author = {Hejiao Huang and H{\'{e}}l{\`{e}}ne Kirchner and Songyun Liu and Weili Wu}, title = {Handling inheritance violation for secure interoperation of heterogeneous systems}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {223--233}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028669}, doi = {10.1504/IJSN.2009.028669}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/HuangKLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KuoPW09, author = {Cynthia Kuo and Adrian Perrig and Jesse Walker}, title = {Designing user studies for security applications: a case study with wireless network configuration}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {101--109}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023429}, doi = {10.1504/IJSN.2009.023429}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KuoPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LaurP09, author = {Sven Laur and Sylvain Pasini}, title = {User-aided data authentication}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {69--86}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023427}, doi = {10.1504/IJSN.2009.023427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LaurP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LeeS09, author = {Sookyoung Lee and Krishna M. Sivalingam}, title = {An efficient One-Time Password authentication scheme using a smart card}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {145--152}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027340}, doi = {10.1504/IJSN.2009.027340}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LeeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/McCunePR09, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, title = {Seeing-Is-Believing: using camera phones for human-verifiable authentication}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {43--56}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023425}, doi = {10.1504/IJSN.2009.023425}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/McCunePR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RekhisB09, author = {Slim Rekhis and Noureddine Boudriga}, title = {Visibility: a novel concept for characterising provable network digital evidences}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {4}, pages = {234--245}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.028670}, doi = {10.1504/IJSN.2009.028670}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RekhisB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ScannellVLL09, author = {Adin Scannell and Alex Varshavsky and Anthony LaMarca and Eyal de Lara}, title = {Proximity-based authentication of mobile devices}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {4--16}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023422}, doi = {10.1504/IJSN.2009.023422}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ScannellVLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SorienteTU09, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {Secure pairing of interface constrained devices}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {17--26}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023423}, doi = {10.1504/IJSN.2009.023423}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SuomalainenVA09, author = {Jani Suomalainen and Jukka Valkonen and N. Asokan}, title = {Standards for security associations in personal networks: a comparative analysis}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {87--100}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023428}, doi = {10.1504/IJSN.2009.023428}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SuomalainenVA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WatkinsBC09, author = {Lanier A. Watkins and Raheem A. Beyah and Cherita L. Corbett}, title = {Using link {RTT} to passively detect unapproved wireless nodes}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {3}, pages = {153--163}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.027341}, doi = {10.1504/IJSN.2009.027341}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WatkinsBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WuWD09, author = {Bing Wu and Jie Wu and Yuhong Dong}, title = {An efficient group key management scheme for mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {4}, number = {1/2}, pages = {125--134}, year = {2009}, url = {https://doi.org/10.1504/IJSN.2009.023431}, doi = {10.1504/IJSN.2009.023431}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WuWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AsadpourSM08, author = {Mahdi Asadpour and Behnam Sattarzadeh and Ali Movaghar}, title = {Anonymous authentication protocol for {GSM} networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {54--62}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016202}, doi = {10.1504/IJSN.2008.016202}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AsadpourSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BouhoulaTBB08, author = {Adel Bouhoula and Zouheir Trabelsi and Ezedin Barka and Mohammed Anis Benelbahri}, title = {Firewall filtering rules analysis for anomalies detection}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {161--172}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020090}, doi = {10.1504/IJSN.2008.020090}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BouhoulaTBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BurtDRTW08, author = {Andrew Burt and Michael Darschewski and Indrajit Ray and Ramakrishna Thurimella and Hailin Wu}, title = {Origins: an approach to trace fast spreading worms to their roots}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {36--46}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016200}, doi = {10.1504/IJSN.2008.016200}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BurtDRTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChallalGBB08, author = {Yacine Challal and Said Gharout and Abdelmadjid Bouabdallah and Hatem Bettahar}, title = {Adaptive clustering for scalable key management in dynamic group communications}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {133--146}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017226}, doi = {10.1504/IJSN.2008.017226}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChallalGBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CroninSB08, author = {Eric Cronin and Micah Sherr and Matt Blaze}, title = {On the (un)reliability of eavesdropping}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {103--113}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017223}, doi = {10.1504/IJSN.2008.017223}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsiehCLCLL08, author = {Cheng{-}Kuan Hsieh and Jyh{-}Cheng Chen and Yi{-}Bing Lin and Kuei{-}Hui Chen and Hsin{-}Yu Liao and Ching{-}Feng Liang}, title = {NTP-DownloadT: a conformance test tool for secured mobile download services}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {240--249}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020731}, doi = {10.1504/IJSN.2008.020731}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsiehCLCLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuRC08, author = {Fei Hu and Amish Rughoonundon and Laura Celentano}, title = {Towards a realistic testbed for wireless network reliability and security performance studies}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {63--77}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016203}, doi = {10.1504/IJSN.2008.016203}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KandikattuJ08, author = {Ramanarayana Kandikattu and Lillykutty Jacob}, title = {Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {258--274}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020733}, doi = {10.1504/IJSN.2008.020733}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KandikattuJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KilpatrickGCPS08, author = {Tim Kilpatrick and Jes{\'{u}}s Gonz{\'{a}}lez and Rodrigo Chandia and Mauricio Papa and Sujeet Shenoi}, title = {Forensic analysis of {SCADA} systems and networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {95--102}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017222}, doi = {10.1504/IJSN.2008.017222}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KilpatrickGCPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KotzanikolaouVSM08, author = {Panayiotis Kotzanikolaou and Dimitrios D. Vergados and Giannis Stergiou and Emmanouil Magkos}, title = {Multilayer key establishment for large-scale sensor networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {1--9}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016197}, doi = {10.1504/IJSN.2008.016197}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KotzanikolaouVSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiSW08, author = {Feng Li and Avinash Srinivasan and Jie Wu}, title = {{PVFS:} {A} Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {173--182}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020091}, doi = {10.1504/IJSN.2008.020091}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiXH08, author = {Fagen Li and Xiangjun Xin and Yupu Hu}, title = {ID-based threshold proxy signcryption scheme from bilinear pairings}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {206--215}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020095}, doi = {10.1504/IJSN.2008.020095}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiXH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LinLZHS08, author = {Xiaodong Lin and Xinhua Ling and Haojin Zhu and Pin{-}Han Ho and Xuemin Shen}, title = {A novel localised authentication scheme in {IEEE} 802.11 based Wireless Mesh Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {122--132}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017225}, doi = {10.1504/IJSN.2008.017225}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LinLZHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MaC08, author = {Xiaoqi Ma and Xiaochun Cheng}, title = {Verifying security protocols by knowledge analysis}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {183--192}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020092}, doi = {10.1504/IJSN.2008.020092}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MaTXD08, author = {Liran Ma and Amin Y. Teymorian and Kai Xing and Ding{-}Zhu Du}, title = {An one-way function based framework for pairwise key establishment in sensor networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {217--225}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020729}, doi = {10.1504/IJSN.2008.020729}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MaTXD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OkolicaPM08, author = {James S. Okolica and Gilbert L. Peterson and Robert F. Mills}, title = {Using {PLSI-U} to detect insider threats by datamining e-mail}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {114--121}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017224}, doi = {10.1504/IJSN.2008.017224}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OkolicaPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RayP08, author = {Indrajit Ray and Nayot Poolsappasit}, title = {Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {80--94}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017221}, doi = {10.1504/IJSN.2008.017221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RayP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SadowitzLW08, author = {Michael Sadowitz and Shahram Latifi and David J. Walker}, title = {An iris and retina multimodal biometric system}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {250--257}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020732}, doi = {10.1504/IJSN.2008.020732}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SadowitzLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ScheirerC08, author = {Walter J. Scheirer and Mooi Choo Chuah}, title = {Syntax vs. semantics: competing approaches to dynamic network intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {24--35}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016199}, doi = {10.1504/IJSN.2008.016199}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ScheirerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanLWL08, author = {Avinash Srinivasan and Feng Li and Jie Wu and Minglu Li}, title = {Clique-based group key assignment in Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {226--239}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020730}, doi = {10.1504/IJSN.2008.020730}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanLWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TripathyN08, author = {Somanath Tripathy and Sukumar Nandi}, title = {Secure user-identification and key distribution scheme preserving anonymity}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {201--205}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020094}, doi = {10.1504/IJSN.2008.020094}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TripathyN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/UphoffW08, author = {Benjamin Uphoff and Johnny S. Wong}, title = {An agent-based framework for intrusion detection alert verification and event correlation}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {193--200}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020093}, doi = {10.1504/IJSN.2008.020093}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/UphoffW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangKBG08, author = {Weichao Wang and Jiejun Kong and Bharat K. Bhargava and Mario Gerla}, title = {Visualisation of wormholes in underwater sensor networks: a distributed approach}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {10--23}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016198}, doi = {10.1504/IJSN.2008.016198}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangKBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuAR08, author = {Haiping Xu and Mihir M. Ayachit and Abhinay Reddyreddy}, title = {Formal modelling and analysis of {XML} firewall for service-oriented systems}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {147--160}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020089}, doi = {10.1504/IJSN.2008.020089}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuAR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZouK08, author = {Xukai Zou and Yogesh Karandikar}, title = {A novel Conference Key Management solution for Secure Dynamic Conferencing}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {47--53}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016201}, doi = {10.1504/IJSN.2008.016201}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZouK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbdallaBCMP07, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, title = {Strong password-based authentication in {TLS} using the three-party group Diffie?Hellman protocol}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {284--296}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013181}, doi = {10.1504/IJSN.2007.013181}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ArtanC07, author = {N. Sertac Artan and H. Jonathan Chao}, title = {Design and analysis of a multipacket signature detection system}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {122--136}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012830}, doi = {10.1504/IJSN.2007.012830}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ArtanC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BhaskarHL07, author = {Raghav Bhaskar and Javier Herranz and Fabien Laguillaumie}, title = {Aggregate designated verifier signatures and application to secure routing}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {192--201}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013173}, doi = {10.1504/IJSN.2007.013173}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BhaskarHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenJ07, author = {Zesheng Chen and Chuanyi Ji}, title = {Optimal worm-scanning method using vulnerable-host distributions}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {71--80}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012826}, doi = {10.1504/IJSN.2007.012826}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChengC07, author = {Zhaohui Cheng and Liqun Chen}, title = {On security proof of McCullagh?Barreto's key agreement protocol and its variants}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {251--259}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013178}, doi = {10.1504/IJSN.2007.013178}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChengC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ErdoganC07, author = {Ozgun Erdogan and Pei Cao}, title = {Hash-AV: fast virus signature scanning by cache-resident filters}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {50--59}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012824}, doi = {10.1504/IJSN.2007.012824}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ErdoganC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FinniginMRP07, author = {Kevin M. Finnigin and Barry E. Mullins and Richard A. Raines and Henry B. Potoczny}, title = {Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {260--271}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013179}, doi = {10.1504/IJSN.2007.013179}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FinniginMRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuLCZ07, author = {Qijun Gu and Peng Liu and Chao{-}Hsien Chu and Sencun Zhu}, title = {Defence against packet injection in ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {154--169}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012832}, doi = {10.1504/IJSN.2007.012832}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HoeperG07, author = {Katrin Hoeper and Guang Gong}, title = {Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {239--250}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013177}, doi = {10.1504/IJSN.2007.013177}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HoeperG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsuZH07, author = {Hung{-}Yuan Hsu and Sencun Zhu and Ali R. Hurson}, title = {{LIP:} a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {202--215}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013174}, doi = {10.1504/IJSN.2007.013174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Huang07, author = {Dijiang Huang}, title = {Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {272--283}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013180}, doi = {10.1504/IJSN.2007.013180}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Huang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KorkmazGSD07, author = {Turgay Korkmaz and Chao Gong and Kamil Sara{\c{c}} and Sandra G. Dykes}, title = {Single packet {IP} traceback in AS-level partial deployment scenario}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {95--108}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012828}, doi = {10.1504/IJSN.2007.012828}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KorkmazGSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiLC07, author = {Ruidong Li and Jie Li and Hsiao{-}Hwa Chen}, title = {{DKMS:} distributed hierarchical access control for multimedia networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {3--10}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012821}, doi = {10.1504/IJSN.2007.012821}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LingZ07, author = {Hui Ling and Taieb Znati}, title = {End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {109--121}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012829}, doi = {10.1504/IJSN.2007.012829}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LingZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Malaney07, author = {Robert A. Malaney}, title = {Securing Wi-Fi networks with position verification: extended version}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {27--36}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012822}, doi = {10.1504/IJSN.2007.012822}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Malaney07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MichailPTKG07, author = {Harris E. Michail and George A. Panagiotakopoulos and Vasilis N. Thanasoulis and Athanasios Kakarountas and Costas E. Goutis}, title = {Server side hashing core exceeding 3 Gbps of throughput}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {228--238}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013176}, doi = {10.1504/IJSN.2007.013176}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MichailPTKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OliveiraWLD07, author = {Leonardo B. Oliveira and Hao Chi Wong and Antonio Alfredo Ferreira Loureiro and Ricardo Dahab}, title = {On the design of secure protocols for hierarchical sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {216--227}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013175}, doi = {10.1504/IJSN.2007.013175}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OliveiraWLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PanCS07, author = {Jianping Pan and Lin Cai and Xuemin Shen}, title = {Vulnerabilities in distance-indexed {IP} traceback schemes}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {81--94}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012827}, doi = {10.1504/IJSN.2007.012827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PanCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RabinovichS07, author = {Paul Rabinovich and Robert Simon}, title = {Secure message delivery in publish/subscribe networks using overlay multicast}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {60--70}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012825}, doi = {10.1504/IJSN.2007.012825}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RabinovichS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SakarindrA07, author = {Pitipatana Sakarindr and Nirwan Ansari}, title = {Adaptive trust-based anonymous network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {11--26}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012820}, doi = {10.1504/IJSN.2007.012820}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SakarindrA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SunS07, author = {Fangting Sun and Mark A. Shayman}, title = {On pairwise connectivity of wireless multihop networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {37--49}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012823}, doi = {10.1504/IJSN.2007.012823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SunS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, title = {Efficient multicast stream authentication for the fully adversarial network model}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {175--191}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013172}, doi = {10.1504/IJSN.2007.013172}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuFBZ07, author = {Ye Zhu and Xinwen Fu and Riccardo Bettati and Wei Zhao}, title = {Analysis of flow-correlation attacks in anonymity network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {137--153}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012831}, doi = {10.1504/IJSN.2007.012831}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuFBZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Al-Karaki06, author = {Jamal N. Al{-}Karaki}, title = {Analysis of routing security-energy trade-offs in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {147--157}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011774}, doi = {10.1504/IJSN.2006.011774}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Al-Karaki06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AraziQ06, author = {Ortal Arazi and Hairong Qi}, title = {Load-balanced key establishment methodologies in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {158--166}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011775}, doi = {10.1504/IJSN.2006.011775}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AraziQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenSM06, author = {Yiqun Chen and Willy Susilo and Yi Mu}, title = {Convertible identity-based anonymous designated ring signatures}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {218--225}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011781}, doi = {10.1504/IJSN.2006.011781}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DengHM06, author = {Jing Deng and Richard Han and Shivakant Mishra}, title = {Limiting DoS attacks during multihop data delivery in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {167--178}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011776}, doi = {10.1504/IJSN.2006.011776}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/DengHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EnglundJ06, author = {H{\aa}kan Englund and Thomas Johansson}, title = {Three ways to mount distinguishing attacks on irregularly clocked stream ciphers}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {95--102}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010826}, doi = {10.1504/IJSN.2006.010826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EvansWE06, author = {Joseph B. Evans and Weichao Wang and Benjamin J. Ewy}, title = {Wireless networking security: open issues in trust, management, interoperation and measurement}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {84--94}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010825}, doi = {10.1504/IJSN.2006.010825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EvansWE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Franklin06, author = {Matthew K. Franklin}, title = {A survey of key evolving cryptosystems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {46--53}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010822}, doi = {10.1504/IJSN.2006.010822}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Franklin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HamadehK06, author = {Ihab Hamadeh and George Kesidis}, title = {A taxonomy of internet traceback}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {54--61}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010823}, doi = {10.1504/IJSN.2006.010823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HwuHLC06, author = {Jing{-}Shyang Hwu and Shih{-}Feng Hsu and Yi{-}Bing Lin and Rong{-}Jaye Chen}, title = {End-to-end security mechanisms for {SMS}}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {177--183}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011777}, doi = {10.1504/IJSN.2006.011777}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HwuHLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JhumkaFFS06, author = {Arshad Jhumka and Felix C. Freiling and Christof Fetzer and Neeraj Suri}, title = {An approach to synthesise safe systems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {62--74}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010824}, doi = {10.1504/IJSN.2006.010824}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JiangLSS06, author = {Yixin Jiang and Chuang Lin and Minghui Shi and Xuemin Shen}, title = {A self-encryption authentication protocol for teleconference services}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {198--205}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011779}, doi = {10.1504/IJSN.2006.011779}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/JiangLSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JungG06, author = {Eunjin Jung and Mohamed G. Gouda}, title = {Vulnerability analysis of certificate graphs}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {13--23}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010820}, doi = {10.1504/IJSN.2006.010820}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JungG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KaryotisPGM06, author = {Vasileios Karyotis and Symeon Papavassiliou and Mary Grammatikou and Vasilis Maglaris}, title = {A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {255--265}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011785}, doi = {10.1504/IJSN.2006.011785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KaryotisPGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Secure scalable group signature with dynamic joins and separable authorities}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {24--45}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010821}, doi = {10.1504/IJSN.2006.010821}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuCM06, author = {Yu Liu and Cristina Comaniciu and Hong Man}, title = {Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {243--254}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011784}, doi = {10.1504/IJSN.2006.011784}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OwensL06, author = {Stephen F. Owens and Reuven R. Levary}, title = {An adaptive expert system approach for intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {206--217}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011780}, doi = {10.1504/IJSN.2006.011780}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OwensL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RamkumarM06, author = {Mahalingam Ramkumar and Nasir D. Memon}, title = {Secure collaborations over message boards}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {113--124}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010828}, doi = {10.1504/IJSN.2006.010828}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/RamkumarM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShehabBG06, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, title = {Workflow authorisation in mediator-free environments}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {2--12}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010819}, doi = {10.1504/IJSN.2006.010819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Tan06, author = {Chik How Tan}, title = {A new signature scheme without random oracles}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {237--242}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011783}, doi = {10.1504/IJSN.2006.011783}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Tan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TeoTN06, author = {Joseph Chee Ming Teo and Chik How Tan and Jim Mee Ng}, title = {Low-power authenticated group key agreement for heterogeneous wireless networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {226--236}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011782}, doi = {10.1504/IJSN.2006.011782}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TeoTN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Wang06, author = {Xinyuan Wang}, title = {The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {184--197}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011778}, doi = {10.1504/IJSN.2006.011778}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangSL06, author = {Haodong Wang and Bo Sheng and Qun Li}, title = {Elliptic curve cryptography-based access control in sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {127--137}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011772}, doi = {10.1504/IJSN.2006.011772}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhengLLA06, author = {Jianliang Zheng and Jie Li and Myung J. Lee and Michael Anshel}, title = {A lightweight encryption and authentication scheme for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {138--146}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011773}, doi = {10.1504/IJSN.2006.011773}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhengLLA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuJK06, author = {Bo Zhu and Sushil Jajodia and Mohan S. Kankanhalli}, title = {Building trust in peer-to-peer systems: a review}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {103--112}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010827}, doi = {10.1504/IJSN.2006.010827}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.