Search dblp for Publications

export results for "stream:journals/ijsn:"

 download as .bib file

@article{DBLP:journals/ijsn/AfroazRR24,
  author       = {Khaleda Afroaz and
                  Y. V. Subba Rao and
                  N. Rukma Rekha},
  title        = {Secure identity-based encryption: overcoming the key escrow challenge},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {2},
  pages        = {55--62},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.140266},
  doi          = {10.1504/IJSN.2024.140266},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AfroazRR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BhatiaS24,
  author       = {Rashmi Bhatia and
                  Rohini Sharma},
  title        = {Multiclassification of DDoS attacks using machine and deep learning
                  techniques},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {2},
  pages        = {63--76},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.140268},
  doi          = {10.1504/IJSN.2024.140268},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BhatiaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenLOL24,
  author       = {Chia{-}Mei Chen and
                  Ze{-}Yu Lin and
                  Ya{-}Hui Ou and
                  Jiunn{-}Wu Lin},
  title        = {A hybrid malware analysis approach for identifying process-injection
                  malware based on machine learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {20--30},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137312},
  doi          = {10.1504/IJSN.2024.137312},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenLOL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChopraBKSN24,
  author       = {Sumit Chopra and
                  Gagandeep Singh Bains and
                  Simranjot Kaur and
                  Rajesh Sharma and
                  Anchal Nayyar},
  title        = {A review of the various applications and security issues in IoT and
                  its future aspects},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {3},
  pages        = {109--127},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.141781},
  doi          = {10.1504/IJSN.2024.141781},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChopraBKSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Dong24,
  author       = {Qinqin Dong},
  title        = {Safety monitoring system for tourist scenic spots based on crowd scene
                  type recognition},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {3},
  pages        = {128--137},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.141780},
  doi          = {10.1504/IJSN.2024.141780},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Dong24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Ganesan24,
  author       = {Sangeetha Ganesan},
  title        = {Enabling secure modern web browsers against cache-based timing attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {43--54},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137330},
  doi          = {10.1504/IJSN.2024.137330},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Ganesan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuZFM24,
  author       = {Yutao Hu and
                  Yuntao Zhao and
                  Yongxin Feng and
                  Xiangyu Ma},
  title        = {OneR-DQN: a botnet traffic detection model based on deep {Q} network
                  algorithm in deep reinforcement learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {31--42},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137334},
  doi          = {10.1504/IJSN.2024.137334},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuJZ24,
  author       = {Huajin Liu and
                  Chunhua Ju and
                  Houyuan Zhang},
  title        = {A social network security user recommendation algorithm based on community
                  user emotions},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {10--19},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137332},
  doi          = {10.1504/IJSN.2024.137332},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NallabothuRR24,
  author       = {Shiva Krishna Nallabothu and
                  N. Rukma Rekha and
                  Y. V. Subba Rao},
  title        = {Generalised secret sharing scheme for non-monotone access structures
                  using {MDS} codes},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {2},
  pages        = {101--108},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.140289},
  doi          = {10.1504/IJSN.2024.140289},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NallabothuRR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RemmideBB24,
  author       = {Mohamed Abdelkarim Remmide and
                  Fatima Boumahdi and
                  Narhimene Boustia},
  title        = {Advancing automated social engineering detection with oversampling-based
                  machine learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {3},
  pages        = {150--158},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.141783},
  doi          = {10.1504/IJSN.2024.141783},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RemmideBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanRW24,
  author       = {Avinash Srinivasan and
                  Christian Rose and
                  Jie Wu},
  title        = {slackFS - resilient and persistent information hiding framework},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {2},
  pages        = {77--91},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.140278},
  doi          = {10.1504/IJSN.2024.140278},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SunWB24,
  author       = {Wenbo Sun and
                  Wei Wang and
                  Chenguang Bai},
  title        = {A new method of large integer prime decomposition for network public
                  key cryptosystem},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {3},
  pages        = {159--167},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.141784},
  doi          = {10.1504/IJSN.2024.141784},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SunWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/VijayachandranN24,
  author       = {Vipin Vijayachandran and
                  Suchithra Ramachandran Nair},
  title        = {{LR-SDP:} lightweight privacy preservation approach for distributed
                  mobile devices in IoT environment},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {3},
  pages        = {138--149},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.141788},
  doi          = {10.1504/IJSN.2024.141788},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/VijayachandranN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XiongC24,
  author       = {Yang Xiong and
                  Yang Cheng},
  title        = {A new edge weight-based measure for k-shell influential node identification
                  in complex networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {1--9},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137331},
  doi          = {10.1504/IJSN.2024.137331},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XiongC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZouL24,
  author       = {Bailin Zou and
                  Tianhang Liu},
  title        = {A network traffic classification and anomaly detection method based
                  on parallel cross-convolutional neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {2},
  pages        = {92--100},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.140287},
  doi          = {10.1504/IJSN.2024.140287},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZouL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlbilaliAB23,
  author       = {Amal Abduallah Nasser Albilali and
                  Maysoon F. Abulkhair and
                  Manal Sarhan Bayousef},
  title        = {An overview of location privacy protection in spatial crowdsourcing
                  platforms during the task assignment process},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {227--244},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135509},
  doi          = {10.1504/IJSN.2023.135509},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlbilaliAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BabikerHMI23,
  author       = {Asaad Balla Babiker and
                  Mohamed Hadi Habaebi and
                  Sinil Mubarak and
                  Md. Rafiqul Islam},
  title        = {A detailed analysis of public industrial control system datasets},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {245--263},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135511},
  doi          = {10.1504/IJSN.2023.135511},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BabikerHMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Chaudhari23,
  author       = {Payal Chaudhari},
  title        = {Privacy-preserving cost-effective work distribution with fine-grained
                  access control for mobile crowdsensing},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {106--116},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131611},
  doi          = {10.1504/IJSN.2023.131611},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Chaudhari23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChiniahG23,
  author       = {Aatish Chiniah and
                  Feroz Ghannoo},
  title        = {A multi-theory model to evaluate new factors influencing information
                  security compliance},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {19--29},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129949},
  doi          = {10.1504/IJSN.2023.129949},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuJLZ23,
  author       = {Xiaohui Hu and
                  Huiwen Jia and
                  Jingang Liu and
                  Zhiqi Zhao},
  title        = {Efficient identity-based ring identification scheme and identity-based
                  ring signature scheme on lattices},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {213--226},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135516},
  doi          = {10.1504/IJSN.2023.135516},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuJLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Jana23,
  author       = {Angshuman Jana},
  title        = {Sensitive information leakage analysis of database code by abstract
                  interpretation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {91--105},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131599},
  doi          = {10.1504/IJSN.2023.131599},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Jana23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Jiang23,
  author       = {Xiaoyu Jiang},
  title        = {Adaptive fault diagnosis model for high-speed railway turnout using
                  deep convolutional neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {165--174},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134134},
  doi          = {10.1504/IJSN.2023.134134},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Jiang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JiangW23,
  author       = {Suhan Jiang and
                  Jie Wu},
  title        = {A blockchain-based {NFV} market in the multi-node edge computing network},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {52--64},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129943},
  doi          = {10.1504/IJSN.2023.129943},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JiangW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NiknamiW23,
  author       = {Nadia Niknami and
                  Jie Wu},
  title        = {{MB-CIM:} a multi-round budgeted competitive influence maximisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {30--41},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129896},
  doi          = {10.1504/IJSN.2023.129896},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NiknamiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QianW23,
  author       = {Jun Qian and
                  Yubao Wu},
  title        = {Moving object location prediction based on a graph neural network
                  with temporal attention},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {153--164},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134133},
  doi          = {10.1504/IJSN.2023.134133},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/QianW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QiuZW23,
  author       = {Mingyue Qiu and
                  Xueying Zhang and
                  Xinmeng Wang},
  title        = {An ex-convict recognition method based on text mining},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {10--18},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129905},
  doi          = {10.1504/IJSN.2023.129905},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QiuZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SaadSS23,
  author       = {Redhwan M. A. Saad and
                  Khaled A. M. Al Soufy and
                  Samir I. Shaheen},
  title        = {Security in smart home environment: issues, challenges, and countermeasures
                  - a survey},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129887},
  doi          = {10.1504/IJSN.2023.129887},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Shi23,
  author       = {Wuchao Shi},
  title        = {Research on system safety in the case of component failure based on
                  degree correlation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {65--74},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131585},
  doi          = {10.1504/IJSN.2023.131585},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Shi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SubrahmanyamRR23,
  author       = {Rolla Subrahmanyam and
                  N. Rukma Rekha and
                  Y. V. Subba Rao},
  title        = {Multi-group key agreement protocol using secret sharing scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {143--152},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134119},
  doi          = {10.1504/IJSN.2023.134119},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SubrahmanyamRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangG23,
  author       = {Yixuan Wang and
                  Xian Guo},
  title        = {{CPPABK:} conditional privacy-preserving authentication scheme for
                  VANETs based on the key derivation algorithm},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {199--212},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135510},
  doi          = {10.1504/IJSN.2023.135510},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangZZG23,
  author       = {Chao Wang and
                  Hongwei Zhang and
                  Jinrui Zhang and
                  Lichuan Gu},
  title        = {Multi-modal rumour detection using bilinear pooling and domain adversarial
                  neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {175--188},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134116},
  doi          = {10.1504/IJSN.2023.134116},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangZZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanHMSDX23,
  author       = {Yan Yan and
                  Eyeleko Anselme Herman and
                  Adnan Mahmood and
                  Zichao Sun and
                  Zhuoyue Dong and
                  Fei Xu},
  title        = {Privacy preserving dynamic data release based on non-synonymous diverse
                  anatomy},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {75--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131595},
  doi          = {10.1504/IJSN.2023.131595},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanHMSDX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanZLQW23,
  author       = {Hao Yan and
                  Zheng Zhang and
                  Yanan Liu and
                  Shuo Qiu and
                  Qiuling Wu},
  title        = {Comments on a dynamic cloud data integrity verification scheme: security
                  analysis and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {125--132},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131610},
  doi          = {10.1504/IJSN.2023.131610},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangFZ23,
  author       = {Yudi Zhang and
                  Yongxin Feng and
                  Yuntao Zhao},
  title        = {MalGA-LSTM: a malicious code detection model based on genetic algorithm
                  optimising {LSTM} trainable parameters},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {133--142},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134131},
  doi          = {10.1504/IJSN.2023.134131},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangYSLG23,
  author       = {Hehui Zhang and
                  Yong Yang and
                  Xi Song and
                  Wenhui Li and
                  Shuqiang Guo},
  title        = {An abnormal intrusion detection method based on self-organising model},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {117--124},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131598},
  doi          = {10.1504/IJSN.2023.131598},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouSYG23,
  author       = {Changsong Zhou and
                  Guozi Sun and
                  Xuan You and
                  Yu Gu},
  title        = {A slice-based encryption scheme for {IPFS}},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {42--51},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129898},
  doi          = {10.1504/IJSN.2023.129898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouSYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuDMS23,
  author       = {Dexin Zhu and
                  Xiaogang Du and
                  Jigui Mao and
                  Lijun Song},
  title        = {A security control scheme based on quantum keys for IoT terminals},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {189--198},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134123},
  doi          = {10.1504/IJSN.2023.134123},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AgnihotriPCM22,
  author       = {Anmol Agnihotri and
                  R. Padmavathi and
                  Santanu Chatterjee and
                  Vinod Kumar Mahor},
  title        = {Privacy in content-centric networking against side channel attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {13--27},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122544},
  doi          = {10.1504/IJSN.2022.122544},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AgnihotriPCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlshayejiA22,
  author       = {Mohammad H. Alshayeji and
                  Sa'ed Abed},
  title        = {Enhanced video-on-demand security in cloud computing against insider
                  and outsider threats},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {48--55},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122550},
  doi          = {10.1504/IJSN.2022.122550},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlshayejiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlvarezR22,
  author       = {Oscar Danilo Gavil{\'{a}}nez Alvarez and
                  Glen Dario Rodriguez Rafael},
  title        = {VoIP security auditing model based on {COBIT} 4.1},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {63--76},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123293},
  doi          = {10.1504/IJSN.2022.123293},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlvarezR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BhatiaVKA22,
  author       = {Ashutosh Bhatia and
                  Deepak Kumar Vishvakarma and
                  Rekha Kaushik and
                  Ankit Agrawal},
  title        = {Entropy and likelihood-based detection of {DGA} generated domain names
                  and their families},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {147--192},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050429},
  doi          = {10.1504/IJSN.2022.10050429},
  timestamp    = {Mon, 07 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/BhatiaVKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Boutekkouk22,
  author       = {Fateh Boutekkouk},
  title        = {A literature review on security-aware design space exploration approaches
                  for embedded systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {247--268},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052252},
  doi          = {10.1504/IJSN.2022.10052252},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Boutekkouk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GaneshPP22,
  author       = {Ponnuru Surya Ganesh and
                  R. Padmavathy and
                  Anil Pinapati},
  title        = {An efficient scalar multiplication algorithm on Koblitz curves using
                  {\(\tau\)}\({}^{\mbox{3}}\)-NAF},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {240--246},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052251},
  doi          = {10.1504/IJSN.2022.10052251},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GaneshPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HalloS22,
  author       = {Mar{\'{\i}}a Hallo and
                  Gabriela Suntaxi},
  title        = {A survey on {SQL} injection attacks, detection and prevention techniques
                  - a tertiary study},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {193--202},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050430},
  doi          = {10.1504/IJSN.2022.10050430},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HalloS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangGSCC22,
  author       = {Shizhen Huang and
                  Anhua Guo and
                  Kaikai Su and
                  Siyu Chen and
                  Ruiqi Chen},
  title        = {Implementation of quasi-Newton algorithm on {FPGA} for IoT endpoint
                  devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {124--134},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123300},
  doi          = {10.1504/IJSN.2022.123300},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangGSCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KherbacheAE22,
  author       = {Meriem Kherbache and
                  Kamal Amroun and
                  David Espes},
  title        = {A new wrapper feature selection model for anomaly-based intrusion
                  detection systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {107--123},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123298},
  doi          = {10.1504/IJSN.2022.123298},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MahorPC22,
  author       = {Vinod Kumar Mahor and
                  R. Padmavathy and
                  Santanu Chatterjee},
  title        = {Chebyshev chaotic map-based efficient authentication scheme for secure
                  access of VoIP services through {SIP}},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {39--47},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122547},
  doi          = {10.1504/IJSN.2022.122547},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MahorPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MasarwehA22,
  author       = {Ala' Masarweh and
                  Jaafer Al{-}Saraireh},
  title        = {Threat led advanced persistent threat penetration test},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {203--219},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050431},
  doi          = {10.1504/IJSN.2022.10050431},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MasarwehA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MeloSBNOR22,
  author       = {Wilson S. Melo Jr. and
                  Lucas S. dos Santos and
                  Lucila M. S. Bento and
                  Paulo R. M. Nascimento and
                  Carlos A. R. Oliveira and
                  Ramon R. Rezende},
  title        = {Using blockchains to protect critical infrastructures: a comparison
                  between Ethereum and Hyperledger Fabric},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {77--91},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123294},
  doi          = {10.1504/IJSN.2022.123294},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MeloSBNOR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NishaP22,
  author       = {T. N. Nisha and
                  Dhanya Pramod},
  title        = {Network event-based model using finite state machine to detect and
                  predict insider intrusion on enterprise networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {269--283},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10051286},
  doi          = {10.1504/IJSN.2022.10051286},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/NishaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PatilP22,
  author       = {Rachana Yogesh Patil and
                  Yogesh H. Patil},
  title        = {A provably secure signcryption with proxy re-encryption for smart
                  water grid network},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {231--239},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10045294},
  doi          = {10.1504/IJSN.2022.10045294},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PatilP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QiuB22,
  author       = {Mingyue Qiu and
                  Zhijie Bi},
  title        = {Police alarm address recognition and classification based on convolutional
                  neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {56--62},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122575},
  doi          = {10.1504/IJSN.2022.122575},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QiuB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Rababaah22,
  author       = {Aaron Rasheed Rababaah},
  title        = {Simulated study of the influence of node density on the performance
                  of wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {284--292},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052246},
  doi          = {10.1504/IJSN.2022.10052246},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Rababaah22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RehmanWM22,
  author       = {Syed Rameez Rehman and
                  Mudassar Waheed and
                  Ammar Masood},
  title        = {Security-enhanced Android for an enterprise},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {92--106},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123296},
  doi          = {10.1504/IJSN.2022.123296},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RehmanWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SalahAZ22,
  author       = {Saeed Salah and
                  Mohammad A. AL{-}Shudeifat and
                  Raid Zaghal},
  title        = {Desktop and mobile operating system fingerprinting based on IPv6 protocol
                  using machine learning algorithms},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {1--12},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122543},
  doi          = {10.1504/IJSN.2022.122543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SalahAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanTLW22,
  author       = {Jun Yan and
                  Yupan Tian and
                  Hai Liu and
                  Zhenqiang Wu},
  title        = {Uncertain graph generating approach based on differential privacy
                  for preserving link relationship of social networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {28--38},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122545},
  doi          = {10.1504/IJSN.2022.122545},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanTLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YangWYU22,
  author       = {Xiaoteng Yang and
                  Zhenqiang Wu and
                  Jun Yan and
                  Mubarak Umar},
  title        = {Network tolerance optimisation to random and target attacks based
                  on percolation theory},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {135--146},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2021.10040383},
  doi          = {10.1504/IJSN.2021.10040383},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YangWYU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZuoZQY22,
  author       = {Yuan Zuo and
                  Xiaozhou Zhu and
                  Jiangyi Qin and
                  Wen Yao},
  title        = {Heterogeneous big data fusion in distributed networking systems for
                  anomaly detection and localisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {220--229},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050428},
  doi          = {10.1504/IJSN.2022.10050428},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZuoZQY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlnefaieAC21,
  author       = {Seham Alnefaie and
                  Suhair Alshehri and
                  Asma Cherif},
  title        = {A survey on access control in IoT: models, architectures and research
                  opportunities},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {60--76},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112837},
  doi          = {10.1504/IJSN.2021.112837},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlnefaieAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenHLWP21,
  author       = {Guanlin Chen and
                  Qiao Hu and
                  Kaimin Li and
                  Wenyong Weng and
                  Yubo Peng},
  title        = {A novel security management system for hazardous chemicals},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {135--140},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117869},
  doi          = {10.1504/IJSN.2021.117869},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenHLWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenLCCL21,
  author       = {Chia{-}Mei Chen and
                  Gu Hsin Lai and
                  Zheng{-}Xun Cai and
                  Tzu{-}Ching Chang and
                  Boyi Lee},
  title        = {Detecting {PE} infection-based malware},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {191--199},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117871},
  doi          = {10.1504/IJSN.2021.117871},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenLCCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenSHDW21,
  author       = {Guanlin Chen and
                  Jiapeng Shen and
                  Jiang He and
                  Xu Dai and
                  Wenyong Weng},
  title        = {An overall analysis method of urban road parking lots based on data
                  mining},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {105--111},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116774},
  doi          = {10.1504/IJSN.2021.116774},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenSHDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenYCCL21,
  author       = {Guanlin Chen and
                  Rutao Yao and
                  Gang Chen and
                  Jie Chen and
                  Tian Li},
  title        = {A smart urban management information public opinion analysis system},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {92--97},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116779},
  doi          = {10.1504/IJSN.2021.116779},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenYCCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DariBE21,
  author       = {El Yazid Dari and
                  Ahmed Bendahmane and
                  Mohamed Essaaidi},
  title        = {Verification-based data integrity mechanism in smart grid network},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {1--11},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112835},
  doi          = {10.1504/IJSN.2021.112835},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/DariBE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DariBE21a,
  author       = {El Yazid Dari and
                  Ahmed Bendahmane and
                  Mohamed Essaaidi},
  title        = {A novel approach for {COVID-19} outbreak spread monitoring and control
                  using smart grid technology},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {112--116},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116776},
  doi          = {10.1504/IJSN.2021.116776},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/DariBE21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DouFH21,
  author       = {Rulin Dou and
                  Xuming Fang and
                  Dandan Huang},
  title        = {An efficient range-free multi-hop localisation algorithm for irregular
                  wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {37--48},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112839},
  doi          = {10.1504/IJSN.2021.112839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DouFH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EdrisALH21,
  author       = {Ed Kamya Kiyemba Edris and
                  Mahdi Aiash and
                  Jonathan Kok{-}Keong Loo and
                  Mohammad Shadi Al Hakeem},
  title        = {Formal verification of secondary authentication protocol for 5G secondary
                  authentication},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {223--234},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119379},
  doi          = {10.1504/IJSN.2021.119379},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/EdrisALH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FanWZGMOA21,
  author       = {Jinnan Fan and
                  Fabian Willems and
                  Jafar Zahed and
                  John Gray and
                  Serge Mister and
                  Mike Ounsworth and
                  Carlisle Adams},
  title        = {Impact of post-quantum hybrid certificates on PKI, common libraries,
                  and protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {200--211},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117887},
  doi          = {10.1504/IJSN.2021.117887},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/FanWZGMOA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FarooqH21,
  author       = {Mansoor Farooq and
                  Mubashir Hassan},
  title        = {IoT smart homes security challenges and solution},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {235--243},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119395},
  doi          = {10.1504/IJSN.2021.119395},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FarooqH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FehisNK21,
  author       = {Saad Fehis and
                  Omar Nouali and
                  Mohand Tahar Kechadi},
  title        = {Encryption key management as a trusted security as a service for cloud
                  computing},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {150--162},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117865},
  doi          = {10.1504/IJSN.2021.117865},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FehisNK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FloraSHN21,
  author       = {J. Blessy Annie Flora and
                  Radha Sankararajan and
                  Rajendran Hemalatha and
                  Sukumaran Aasha Nandhini},
  title        = {Plant disease detection for banana using long range wide area network},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {129--134},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116778},
  doi          = {10.1504/IJSN.2021.116778},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FloraSHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GhorbelGJ21,
  author       = {Amal Ghorbel and
                  Mahmoud Ghorbel and
                  Mohamed Jmaiel},
  title        = {A model-based approach for multi-level privacy policies derivation
                  for cloud services},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {12--27},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112836},
  doi          = {10.1504/IJSN.2021.112836},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GhorbelGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HademSM21,
  author       = {Pynbianglut Hadem and
                  Dilip Kumar Saikia and
                  Soumen Moulik},
  title        = {{I-SMITE:} an {IP} traceback mechanism for inter-AS {SDN} networks
                  using {BGP}},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {163--173},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117864},
  doi          = {10.1504/IJSN.2021.117864},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/HademSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JokicBHP21,
  author       = {Aleksandar Jokic and
                  Sabina Barakovic and
                  Jasmina Barakovic Husic and
                  Jasna Pleho},
  title        = {Partial rule security information and event management concept in
                  detecting cyber incidents},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {117--128},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116777},
  doi          = {10.1504/IJSN.2021.116777},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JokicBHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiHZJT21,
  author       = {Wenxin Li and
                  Jingsha He and
                  Nafei Zhu and
                  Shuting Jin and
                  Da Teng},
  title        = {An authorisation certificate-based access control model},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {258--266},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119393},
  doi          = {10.1504/IJSN.2021.119393},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiHZJT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Martinez-Magdaleno21,
  author       = {Samuel Mart{\'{\i}}nez{-}Magdaleno and
                  Victor Morales{-}Rocha and
                  Ram{\'{o}}n Parra},
  title        = {A review of security risks and countermeasures in containers},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {183--190},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117867},
  doi          = {10.1504/IJSN.2021.117867},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Martinez-Magdaleno21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NagrathAP21,
  author       = {Preeti Nagrath and
                  Sandhya Aneja and
                  G. N. Purohit},
  title        = {Taxonomy of reputation-based defending mechanisms against types of
                  attacks in delay tolerant networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {77--91},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116772},
  doi          = {10.1504/IJSN.2021.116772},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NagrathAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OlakanmiO21,
  author       = {Oladayo Olufemi Olakanmi and
                  Kehinde Oluwasesan Odeyemi},
  title        = {A secure and privacy-preserving scheme for secure metering and cooperative
                  communication in advanced metering infrastructure of smart grid networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {267--280},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119396},
  doi          = {10.1504/IJSN.2021.119396},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/OlakanmiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SharmaGS21,
  author       = {Rohini Sharma and
                  Ajay Guleria and
                  R. K. Singla},
  title        = {Flow-based profile generation and network traffic detection for {DNS}
                  anomalies using optimised entropy-based features selection and modified
                  Holt Winter's method},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {244--257},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119380},
  doi          = {10.1504/IJSN.2021.119380},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SharmaGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SilveiraG21,
  author       = {Matheus Monteiro Silveira and
                  Rafael Lopes Gomes},
  title        = {{IMMI:} an architecture integrated for management of modern internet
                  service providers},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {141--149},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117863},
  doi          = {10.1504/IJSN.2021.117863},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SilveiraG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Song21,
  author       = {Sanhua Song},
  title        = {An effective congestion control scheme based on early offload for
                  space delay/disruption tolerant network},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {28--36},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112838},
  doi          = {10.1504/IJSN.2021.112838},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Song21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TafazzoliAC21,
  author       = {Tala Tafazzoli and
                  Abouzar Arabsorkhi and
                  Amirahmad Chapnevis},
  title        = {An automated method for detecting suspicious nodes in bitcoin address
                  graph},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {4},
  pages        = {213--222},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.119391},
  doi          = {10.1504/IJSN.2021.119391},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/TafazzoliAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YangXL21,
  author       = {Xiong Yang and
                  Guangqian Xie and
                  Xiaofang Li},
  title        = {Identifying influential spreaders in complex networks using neighbourhood
                  coreness and path diversity},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {3},
  pages        = {174--182},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.117866},
  doi          = {10.1504/IJSN.2021.117866},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/YangXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouZZ21,
  author       = {Jingchun Zhou and
                  Dehuan Zhang and
                  Weishi Zhang},
  title        = {Adaptive histogram fusion-based colour restoration and enhancement
                  for underwater images},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {1},
  pages        = {49--59},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.112848},
  doi          = {10.1504/IJSN.2021.112848},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuX21,
  author       = {Changhong Zhu and
                  Ning Xiao},
  title        = {An algorithm of {NLOS} error identification and mitigation in mobile
                  location estimation},
  journal      = {Int. J. Secur. Networks},
  volume       = {16},
  number       = {2},
  pages        = {98--104},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJSN.2021.116773},
  doi          = {10.1504/IJSN.2021.116773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlmobaideenA20,
  author       = {Wesam Almobaideen and
                  Muhyidean Altarawneh},
  title        = {Fog computing: survey on decoy information technology},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {111--121},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106833},
  doi          = {10.1504/IJSN.2020.106833},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlmobaideenA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlvesBMS20,
  author       = {Cl{\'{a}}udio Alves and
                  Fl{\'{a}}via Bernardini and
                  Edwin B. Mitacc Meza and
                  Leandro Sousa},
  title        = {Evaluating the behaviour of stream learning algorithms for detecting
                  invasion on wireless networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {133--140},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109691},
  doi          = {10.1504/IJSN.2020.109691},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlvesBMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AmmarARA20,
  author       = {Mostafa H. Ammar and
                  Ayman A. Abdel{-}Hamid and
                  Mohamed R. M. Rizk and
                  Magdy A. Ahmed},
  title        = {A framework for security enhancement in multitenant SDN-based datacentres},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {183--196},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111127},
  doi          = {10.1504/IJSN.2020.111127},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AmmarARA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Azab20,
  author       = {Ahmad Azab},
  title        = {Packing resistant solution to group malware binaries},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {123--132},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109686},
  doi          = {10.1504/IJSN.2020.109686},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Azab20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BasodiTSP20,
  author       = {Sunitha Basodi and
                  Song Tan and
                  WenZhan Song and
                  Yi Pan},
  title        = {Data integrity attack detection in smart grid: a deep learning approach},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {15--24},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106506},
  doi          = {10.1504/IJSN.2020.106506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BasodiTSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Chen20,
  author       = {Zesheng Chen},
  title        = {Characterising spatial dependence on epidemic thresholds in networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106503},
  doi          = {10.1504/IJSN.2020.106503},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Chen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenQTWLP20,
  author       = {Tianwei Chen and
                  Yongjun Qiang and
                  Chunming Tang and
                  Zairong Wang and
                  Ping Luo and
                  Lingxi Peng},
  title        = {Malicious behaviour identification for Android based on an {RBF} neural
                  network},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {148--154},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109706},
  doi          = {10.1504/IJSN.2020.109706},
  timestamp    = {Tue, 08 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenQTWLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenSCZ20,
  author       = {Guanlin Chen and
                  Xiaolong Shi and
                  Moke Chen and
                  Liang Zhou},
  title        = {Text similarity semantic calculation based on deep reinforcement learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {59--66},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106526},
  doi          = {10.1504/IJSN.2020.106526},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenSCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenSXLY20,
  author       = {Guanlin Chen and
                  Jiawei Shi and
                  Huang Xu and
                  Tian Li and
                  Wujian Yang},
  title        = {An improved genetic algorithm in shared bicycle parking point allocation},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {141--147},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109710},
  doi          = {10.1504/IJSN.2020.109710},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenSXLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Farahmand-Nejad20,
  author       = {Akram Farahmand{-}Nejad and
                  Samira Noferesti},
  title        = {A real-time botnet detection model based on an efficient wrapper feature
                  selection method},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {36--45},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106509},
  doi          = {10.1504/IJSN.2020.106509},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Farahmand-Nejad20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HanZLWLZ20,
  author       = {Haiqing Han and
                  Siru Zhu and
                  Qin Li and
                  Xiao Wang and
                  Yutian Lei and
                  Yuwei Zhang},
  title        = {Public-key cryptosystem based on quantum {BCH} codes and its quantum
                  digital signature},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {197--205},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111131},
  doi          = {10.1504/IJSN.2020.111131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HanZLWLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiGZH20,
  author       = {Yufeng Li and
                  Shiyu Gu and
                  Weiping Zhao and
                  Yufeng Huang},
  title        = {Space-time adaptive processing anti-jamming algorithm for navigation
                  receiver},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {155--163},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109711},
  doi          = {10.1504/IJSN.2020.109711},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiGZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuDW20,
  author       = {Haibo Liu and
                  Yujie Dong and
                  Fuzhong Wang},
  title        = {An improved weighted centroid localisation algorithm for wireless
                  sensor networks in coal mine underground},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {85--92},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106834},
  doi          = {10.1504/IJSN.2020.106834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MohantaJS20,
  author       = {Bhabendu Kumar Mohanta and
                  Debasish Jena and
                  Srichandan Sobhanayak},
  title        = {Multi-party computation review for secure data processing in IoT-fog
                  computing environment},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {164--174},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109697},
  doi          = {10.1504/IJSN.2020.109697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MohantaJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PingGWZ20,
  author       = {Yuan Ping and
                  Xuyang Guo and
                  Baocang Wang and
                  Jingxian Zhou},
  title        = {Secure outsourcing of modular inverses and scalar multiplications
                  on elliptic curves},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {101--110},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106832},
  doi          = {10.1504/IJSN.2020.106832},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PingGWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SanoussiOH20,
  author       = {Nouhad Sanoussi and
                  Ghizlane Orhanou and
                  Said El Hajji},
  title        = {A game theoretic approach based on intrusion tolerant systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {175--181},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109698},
  doi          = {10.1504/IJSN.2020.109698},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SanoussiOH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShangW20,
  author       = {Jiacheng Shang and
                  Jie Wu},
  title        = {AudioKey: a usable device pairing system using audio signals on smartwatches},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {46--58},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106518},
  doi          = {10.1504/IJSN.2020.106518},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShangW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SinghKS20,
  author       = {Rohit Singh and
                  Mala Kalra and
                  Shano Solanki},
  title        = {A hybrid approach for intrusion detection based on machine learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {233--242},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111128},
  doi          = {10.1504/IJSN.2020.111128},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SinghKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SinghS20,
  author       = {Rajrupa Singh and
                  R. Selvakumar},
  title        = {Designing a secure positioning system using blockchain technology},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {78--84},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106831},
  doi          = {10.1504/IJSN.2020.106831},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SinghS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangLL20,
  author       = {Zeng{-}Guang Wang and
                  Yu Lu and
                  Xi Li},
  title        = {Optimal network defense strategy selection based on Bayesian game},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {67--77},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106830},
  doi          = {10.1504/IJSN.2020.106830},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangWLXL20,
  author       = {Hao Wang and
                  Xiuyou Wang and
                  Huaming Liu and
                  Dongqing Xu and
                  Zhengyan Liu},
  title        = {A face recognition algorithm based on multiple convolution kernels
                  and double layer sparse automatic encoder},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {224--232},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111134},
  doi          = {10.1504/IJSN.2020.111134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangWLXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanZWG20,
  author       = {Yan Yan and
                  Lianxiu Zhang and
                  Bingqian Wang and
                  Xin Gao},
  title        = {Location big data differential privacy dynamic partition release method},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {1},
  pages        = {25--35},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106505},
  doi          = {10.1504/IJSN.2020.106505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanZWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YangZHLY20,
  author       = {Bing Yang and
                  Gang Zhao and
                  Ming{-}hua Hu and
                  Chang{-}ping Liu and
                  Ying{-}bao Yang},
  title        = {A cluster collaborative synchronisation dynamic model of the dissipative
                  coupling supply chain network},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {214--223},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111132},
  doi          = {10.1504/IJSN.2020.111132},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/YangZHLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuJCSD20,
  author       = {Along Yu and
                  Jiajia Ji and
                  Hao Cao and
                  Hongbing Sun and
                  Jinqiao Dai},
  title        = {Wireless corrosion monitoring system based on an interdigital capacitive
                  corrosion sensor},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {2},
  pages        = {93--100},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.106835},
  doi          = {10.1504/IJSN.2020.106835},
  timestamp    = {Thu, 07 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuJCSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangWCSLZ20,
  author       = {Yong Zhang and
                  Tong Wang and
                  Qi Chen and
                  Yu Shi and
                  Jinzhao Li and
                  Liyi Zhang},
  title        = {Gas leakage acoustic source localisation with compressed sensing method
                  in sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {206--213},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111133},
  doi          = {10.1504/IJSN.2020.111133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangWCSLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BindraS19,
  author       = {Naveen Bindra and
                  Manu Sood},
  title        = {Why, what and how to measure and improve the security of networks
                  (a snapshot of the current situation of security metrics and the way
                  forward)},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {3},
  pages        = {158--166},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.10022703},
  doi          = {10.1504/IJSN.2019.10022703},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BindraS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BouabidiA19,
  author       = {Imen Bouabidi and
                  Pr. Mahmoud Abdellaoui},
  title        = {A novel cryptographic solution to secure mobile wireless sensors networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {221--237},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103166},
  doi          = {10.1504/IJSN.2019.103166},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BouabidiA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BrogiB19,
  author       = {Guillaume Brogi and
                  Elena Di Bernardino},
  title        = {Hidden Markov models for advanced persistent threats},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {181--190},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103147},
  doi          = {10.1504/IJSN.2019.103147},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BrogiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CostaJMRZ19,
  author       = {Victor G. T. da Costa and
                  Sylvio Barbon Junior and
                  Rodrigo Sanches Miani and
                  Joel J. P. C. Rodrigues and
                  Bruno Bogaz Zarpel{\~{a}}o},
  title        = {Mobile botnets detection based on machine learning over system calls},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {2},
  pages        = {103--118},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.100092},
  doi          = {10.1504/IJSN.2019.100092},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CostaJMRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CuiRFD19,
  author       = {Yani Cui and
                  Jia Ren and
                  Delong Fu and
                  Chao Dong},
  title        = {A formation generation algorithm of multiple agents in naval battlefield
                  environments},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {1},
  pages        = {34--46},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.098916},
  doi          = {10.1504/IJSN.2019.098916},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CuiRFD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DiabGL19,
  author       = {Tayeb Diab and
                  Marc Gilg and
                  Pascal Lorenz},
  title        = {A secure communication model using lightweight Diffie-Hellman method
                  in vehicular ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {2},
  pages        = {61--77},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.100089},
  doi          = {10.1504/IJSN.2019.100089},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/DiabGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GhoubachAM19,
  author       = {Imad El Ghoubach and
                  Rachid Ben Abbou and
                  Fatiha Mrabti},
  title        = {Efficient and secure data sharing with outsourced decryption and efficient
                  revocation for cloud storage systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {3},
  pages        = {133--145},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.10022701},
  doi          = {10.1504/IJSN.2019.10022701},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GhoubachAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KannojiaK19,
  author       = {Suresh Prasad Kannojia and
                  Jasvant Kumar},
  title        = {XOR-based unexpanded meaningful visual secret sharing scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {1},
  pages        = {1--9},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.098906},
  doi          = {10.1504/IJSN.2019.098906},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KannojiaK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MancyV19,
  author       = {L. Mancy and
                  S. Maria Celestin Vigila},
  title        = {Medical image protection using diffusion, substitution and reversible
                  data hiding based on prediction},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {238--249},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103167},
  doi          = {10.1504/IJSN.2019.103167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MancyV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PremkamalPA19,
  author       = {Praveen Kumar Premkamal and
                  Syam Kumar Pasupuleti and
                  P. J. A. Alphonse},
  title        = {Efficient revocable {CP-ABE} for big data access control in cloud
                  computing},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {3},
  pages        = {119--132},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.10022695},
  doi          = {10.1504/IJSN.2019.10022695},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PremkamalPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RekikMZN19,
  author       = {Malek Rekik and
                  Amel Meddeb{-}Makhlouf and
                  Faouzi Zarai and
                  Petros Nicopolitidis},
  title        = {{OAP-WMN:} optimised and secure authentication protocol for wireless
                  mesh networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {205--220},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103151},
  doi          = {10.1504/IJSN.2019.103151},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RekikMZN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RizkiLTR19,
  author       = {Kiki Rizki and
                  Argyro Lamproudi and
                  Marco Tiloca and
                  Shahid Raza},
  title        = {Group-IKEv2 for multicast IPsec in the internet of things},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {1},
  pages        = {10--22},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.098908},
  doi          = {10.1504/IJSN.2019.098908},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RizkiLTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RochaSE19,
  author       = {Thiago S. Rocha and
                  Eduardo Souto and
                  Khalil El{-}Khatib},
  title        = {Techniques to detect data leakage in mobile applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {3},
  pages        = {146--157},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.10022702},
  doi          = {10.1504/IJSN.2019.10022702},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RochaSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SmythH19,
  author       = {Ben Smyth and
                  Yoshikazu Hanatani},
  title        = {Non-malleable encryption with proofs of plaintext knowledge and applications
                  to voting},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {4},
  pages        = {191--204},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.103150},
  doi          = {10.1504/IJSN.2019.103150},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SmythH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SongZY19,
  author       = {Ling Song and
                  Liqin Zhao and
                  Jin Ye},
  title        = {A DV-Hop positioning algorithm based on the glowworm swarm optimisation
                  of mixed chaotic strategy},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {1},
  pages        = {23--33},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.098909},
  doi          = {10.1504/IJSN.2019.098909},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SongZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Styugin19,
  author       = {Mikhail Styugin},
  title        = {Dynamic key password authentication},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {2},
  pages        = {78--85},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.100090},
  doi          = {10.1504/IJSN.2019.100090},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Styugin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ThanudasSRSGJ19,
  author       = {B. Thanudas and
                  Sreelal Shridharan and
                  Velankanni Cyril Raj and
                  Anugolu Purnesh Sairam and
                  Vinay Gajmoti and
                  Palash Joshi},
  title        = {A novel architecture for an integrated enterprise network security
                  system},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {1},
  pages        = {47--60},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.098919},
  doi          = {10.1504/IJSN.2019.098919},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ThanudasSRSGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Wang19,
  author       = {Chao Wang},
  title        = {A dynamic evolution model of balanced energy consumption scale-free
                  fault-tolerant topology based on fitness function for wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {2},
  pages        = {86--94},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.100086},
  doi          = {10.1504/IJSN.2019.100086},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Wang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YadavRPS19,
  author       = {Anil Yadav and
                  Nitin Rakesh and
                  Sujata Pandey and
                  Rajat Kumar Singh},
  title        = {Optimising the {DTLS} handshake design for {TEE} enabled sensor nodes},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {3},
  pages        = {167--179},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.10022895},
  doi          = {10.1504/IJSN.2019.10022895},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YadavRPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuJS19,
  author       = {Along Yu and
                  Jiajia Ji and
                  Shiyu Sun},
  title        = {An improved multi-objective genetic algorithm and data fusion in structural
                  damage identification},
  journal      = {Int. J. Secur. Networks},
  volume       = {14},
  number       = {2},
  pages        = {95--102},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJSN.2019.100087},
  doi          = {10.1504/IJSN.2019.100087},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AsaduzzamanMS18,
  author       = {Abu Asaduzzaman and
                  Shanta Mazumder and
                  Sergio Salinas},
  title        = {A promising security protocol for protecting near field communication
                  devices from networking attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {2},
  pages        = {98--107},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.092448},
  doi          = {10.1504/IJSN.2018.092448},
  timestamp    = {Sat, 11 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AsaduzzamanMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BiswasW18,
  author       = {Rajorshi Biswas and
                  Jie Wu},
  title        = {Preserving source and destination location privacy with controlled
                  routing protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {3},
  pages        = {187--198},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10014320},
  doi          = {10.1504/IJSN.2018.10014320},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BiswasW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CarterLLSNQ18,
  author       = {Nancy J. Carter and
                  Cheng Li and
                  Qun Li and
                  Jennifer A. Stevens and
                  Ed Novak and
                  Zhengrui Qin},
  title        = {Graphical passwords for older computer users},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {211--227},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015815},
  doi          = {10.1504/IJSN.2018.10015815},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CarterLLSNQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Chan-TinR18,
  author       = {Eric Chan{-}Tin and
                  Rakesh Ravishankar},
  title        = {The case for {HTTPS:} measuring overhead and impact of certificate
                  authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {261--269},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015823},
  doi          = {10.1504/IJSN.2018.10015823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Chan-TinR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenWYNH18,
  author       = {Zhijiang Chen and
                  Sixiao Wei and
                  Wei Yu and
                  James H. Nguyen and
                  William G. Hatcher},
  title        = {A cloud/edge computing streaming system for network traffic monitoring
                  and threat detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {3},
  pages        = {169--186},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10014317},
  doi          = {10.1504/IJSN.2018.10014317},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenWYNH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenYHZ18,
  author       = {Guanlin Chen and
                  Taimeng Yang and
                  Rui Huang and
                  Zhuoyue Zhu},
  title        = {A novel flood defense decision support system for smart urban management
                  based on classification and regression tree},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {245--251},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015786},
  doi          = {10.1504/IJSN.2018.10015786},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenYHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenZZQ18,
  author       = {Guanlin Chen and
                  Zhikang Zhou and
                  Rongxin Zheng and
                  Tongjun Qi},
  title        = {A smart urban flood control and warning system based on big data},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {236--244},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015784},
  doi          = {10.1504/IJSN.2018.10015784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenZZQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DengS18,
  author       = {Yun{-}Xia Deng and
                  Run{-}Hua Shi},
  title        = {An efficient remote anonymous authentication scheme with user revocation},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {2},
  pages        = {84--97},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.092475},
  doi          = {10.1504/IJSN.2018.092475},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DengS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GeS18,
  author       = {W. G. Ge and
                  Li Sun},
  title        = {A security scheme of digital rights management based on agent encryption
                  and key distribution in cloud computing},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {228--235},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015813},
  doi          = {10.1504/IJSN.2018.10015813},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoCZNC18,
  author       = {Xian Guo and
                  Cheng Chen and
                  Ma{-}Jiang Zhang and
                  Aristide Ngaboyindekwe and
                  Laicheng Cao},
  title        = {Privacy-aware transmission scheme based on homomorphic proxy re-encryption
                  for {NDN}},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {58--70},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011754},
  doi          = {10.1504/IJSN.2018.10011754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoCZNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KhenousAB18,
  author       = {Lachemi Khenous and
                  Mourad Amad and
                  Abdellah Boukerram},
  title        = {Enhanced source location privacy mechanism for WSNs},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {3},
  pages        = {199--210},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10014321},
  doi          = {10.1504/IJSN.2018.10014321},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KhenousAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MalinaDH18,
  author       = {Lukas Malina and
                  Petr Dzurenda and
                  Jan Hajny},
  title        = {Evaluation of anonymous digital signatures for privacy-enhancing mobile
                  applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {27--41},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011751},
  doi          = {10.1504/IJSN.2018.10011751},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MalinaDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MartinR18,
  author       = {Robert Martin and
                  Sanguthevar Rajasekaran},
  title        = {Information centric approach to analysing security threats and node
                  behaviour in underwater senor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {3},
  pages        = {139--152},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10014322},
  doi          = {10.1504/IJSN.2018.10014322},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MartinR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NejiBR18,
  author       = {Wafa Neji and
                  Kaouther Blibech and
                  Narjes Ben Rajeb},
  title        = {A secure electronic voting protocol with a simple ballot's encryption
                  function},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {10--26},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011755},
  doi          = {10.1504/IJSN.2018.10011755},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NejiBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Ramezani-Chemazi18,
  author       = {Mohammadreza Ramezani{-}Chemazi and
                  Maede Ashouri{-}Talouki},
  title        = {Toward signature extraction of Metasploit encoding algorithms using
                  static analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {2},
  pages        = {71--83},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.092472},
  doi          = {10.1504/IJSN.2018.092472},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Ramezani-Chemazi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShahP18,
  author       = {Ronak Shah and
                  Kailas Patil},
  title        = {A measurement study of the subresource integrity mechanism on real-world
                  applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {2},
  pages        = {129--138},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.092474},
  doi          = {10.1504/IJSN.2018.092474},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShahP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanW18,
  author       = {Avinash Srinivasan and
                  Jie Wu},
  title        = {{VOUCH-AP:} privacy preserving open-access 802.11 public hotspot {AP}
                  authentication mechanism with co-located evil-twins},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {3},
  pages        = {153--168},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10014324},
  doi          = {10.1504/IJSN.2018.10014324},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TentuVP18,
  author       = {Appala Naidu Tentu and
                  China Venkaiah Vadlamudi and
                  V. Kamakshi Prasad},
  title        = {{CRT} based multi-secret sharing schemes: revisited},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {1--9},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011749},
  doi          = {10.1504/IJSN.2018.10011749},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TentuVP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuHLWS18,
  author       = {Ning Xu and
                  Haiping Huang and
                  Zhengtao Li and
                  Yunqi Wang and
                  Chao Sha},
  title        = {An ID-based authentication scheme to achieve the security of smart
                  card},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {42--50},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011752},
  doi          = {10.1504/IJSN.2018.10011752},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuHLWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuZ18,
  author       = {Huijuan J. Xu and
                  Xin Zheng},
  title        = {Security mechanism of dynamic and differentiated protection for telecommunications
                  services based on cloud computing},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {4},
  pages        = {252--260},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10015818},
  doi          = {10.1504/IJSN.2018.10015818},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuSX18,
  author       = {Bencheng Yu and
                  Peisen Song and
                  Xiaoyuan Xu},
  title        = {An android malware static detection scheme based on cloud security
                  structure},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {1},
  pages        = {51--57},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.10011753},
  doi          = {10.1504/IJSN.2018.10011753},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZriraMB18,
  author       = {Nabila Zrira and
                  Soufiana Mekouar and
                  El{-}Houssine Bouyakhf},
  title        = {A novel approach for graph-based global outlier detection in social
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {13},
  number       = {2},
  pages        = {108--128},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJSN.2018.092473},
  doi          = {10.1504/IJSN.2018.092473},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZriraMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Abdulla17,
  author       = {Shubair A. Abdulla},
  title        = {Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {83--102},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004577},
  doi          = {10.1504/IJSN.2017.10004577},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Abdulla17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CharalampidouPM17,
  author       = {Maria Charalampidou and
                  George Pavlidis and
                  Spyridon G. Mouroutsos},
  title        = {A novel modular wireless sensor networks approach for security applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {40--50},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001807},
  doi          = {10.1504/IJSN.2017.10001807},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CharalampidouPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChatterjeeK17,
  author       = {Sumanta Chatterjee and
                  Shashidhar G. Koolagudi},
  title        = {Hierarchical secret sharing scheme using parts of speech of English
                  grammar},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {241--254},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009161},
  doi          = {10.1504/IJSN.2017.10009161},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChatterjeeK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenYW17,
  author       = {Yingjie Victor Chen and
                  Baijian Yang and
                  Weijie Wang},
  title        = {NetFlowMatrix: a visual approach for analysing large NetFlow data},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {215--229},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009154},
  doi          = {10.1504/IJSN.2017.10009154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenZMXH17,
  author       = {Li Jian Chen and
                  Wei Yuan Zhou and
                  Keji Mao and
                  Ming Xia and
                  Ruohong Huan},
  title        = {A beacon-free localisation algorithm in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {56--63},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001809},
  doi          = {10.1504/IJSN.2017.10001809},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenZMXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DengZH17,
  author       = {Xiaojun Deng and
                  Tao Zhang and
                  Xunyu He},
  title        = {Finishing the tiny flows quickly for common data centre services},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {112--119},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004582},
  doi          = {10.1504/IJSN.2017.10004582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DengZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GhasemiE17,
  author       = {Jamal Ghasemi and
                  Jamal Esmaily},
  title        = {Intrusion detection systems using a hybrid SVD-based feature extraction
                  method},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {230--240},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009160},
  doi          = {10.1504/IJSN.2017.10009160},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GhasemiE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KaurDS17,
  author       = {Gurdip Kaur and
                  Renu Dhir and
                  Maninder Singh},
  title        = {Anatomy of ransomware malware: detection, analysis and reporting},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {188--197},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005218},
  doi          = {10.1504/IJSN.2017.10005218},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KaurDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KoDLT17,
  author       = {Li Ling Ko and
                  Dinil Mon Divakaran and
                  Yung Siang Liau and
                  Vrizlynn L. L. Thing},
  title        = {Insider threat detection and its future directions},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {168--187},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005217},
  doi          = {10.1504/IJSN.2017.10005217},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KoDLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiLZ17,
  author       = {BaoHong Li and
                  Baojun Li and
                  Yinliang Zhao},
  title        = {Generic construction of role-based encryption in the standard model},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {198--205},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005219},
  doi          = {10.1504/IJSN.2017.10005219},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuWW17,
  author       = {ZhiQiang Liu and
                  Tong Wang and
                  Xibo Wang},
  title        = {Destination unaware geometric routing for delay tolerant networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {103--111},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004581},
  doi          = {10.1504/IJSN.2017.10004581},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MakkarTVAS17,
  author       = {Ismeet Kaur Makkar and
                  Fabio Di Troia and
                  Corrado Aaron Visaggio and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {SocioBot: a Twitter-based botnet},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {1--12},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001803},
  doi          = {10.1504/IJSN.2017.10001803},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MakkarTVAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ManPML17,
  author       = {Junfeng Man and
                  Cheng Peng and
                  Yinghui Ma and
                  Changyun Li},
  title        = {The network software multistep control algorithm based on {NNVD} research},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {65--69},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004573},
  doi          = {10.1504/IJSN.2017.10004573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ManPML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PengZPM17,
  author       = {Cheng Peng and
                  Canqing Zhang and
                  Cheng Peng and
                  Junfeng Man},
  title        = {A reinforcement learning approach to map reduce auto-configuration
                  under networked environment},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {135--140},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005214},
  doi          = {10.1504/IJSN.2017.10005214},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PengZPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QassimZA17,
  author       = {Qais Qassim and
                  Abdullah Mohd Zin and
                  Mohd Juzaiddin Ab Aziz},
  title        = {Anomaly-based network {IDS} false alarm filter using cluster-based
                  alarm classification approach},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {13--26},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001805},
  doi          = {10.1504/IJSN.2017.10001805},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QassimZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RuanZ17,
  author       = {Yefeng Ruan and
                  Xukai Zou},
  title        = {Receipt-freeness and coercion resistance in remote E-voting systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {120--133},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004583},
  doi          = {10.1504/IJSN.2017.10004583},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RuanZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Shen17,
  author       = {Yuxia Shen},
  title        = {Distributed storage system model design in internet of things based
                  on hash distribution},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {141--151},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005215},
  doi          = {10.1504/IJSN.2017.10005215},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Shen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanWS17,
  author       = {Avinash Srinivasan and
                  Jie Wu and
                  Justin Y. Shi},
  title        = {Secure android covert channel with robust survivability to service
                  provider restrictions},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {27--39},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001806},
  doi          = {10.1504/IJSN.2017.10001806},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/VelascoR17,
  author       = {Danny Velasco and
                  Glen Dario Rodriguez Rafael},
  title        = {A review of the current state of Honeynet architectures and tools},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {255--272},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009165},
  doi          = {10.1504/IJSN.2017.10009165},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/VelascoR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WeiLMLX17,
  author       = {Zhenhua Wei and
                  Zhifeng Liu and
                  Jie Miao and
                  Lihua Li and
                  Wei Xu},
  title        = {Configurable workflow platform based on SaaS model},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {207--214},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009153},
  doi          = {10.1504/IJSN.2017.10009153},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WeiLMLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WenDS17,
  author       = {Chuah Chai Wen and
                  Ed Dawson and
                  Leonie Simpson},
  title        = {Stream cipher based key derivation function},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {70--82},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004574},
  doi          = {10.1504/IJSN.2017.10004574},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WenDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Zheng17,
  author       = {Guangcheng Zheng},
  title        = {Optimisation methods for performance of communication interaction
                  based on cooperative vehicle infrastructure system},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {152--167},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005216},
  doi          = {10.1504/IJSN.2017.10005216},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Zheng17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouCMXH17,
  author       = {Wei Yuan Zhou and
                  Li Jian Chen and
                  Keji Mao and
                  Ming Xia and
                  Ruohong Huan},
  title        = {A RFID-based prisoner localisation system},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {51--55},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001808},
  doi          = {10.1504/IJSN.2017.10001808},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouCMXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbukhalafWZ16,
  author       = {Hala Abukhalaf and
                  Jianxin Wang and
                  Shigeng Zhang},
  title        = {Distance outlier detection with a mobile beacon in wireless sensor
                  networks localisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {3},
  pages        = {160--166},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.078392},
  doi          = {10.1504/IJSN.2016.078392},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbukhalafWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AnnaduraiY16,
  author       = {P. Annadurai and
                  S. Yazhini},
  title        = {Optimising on trust value-based clustering using trust evaluation
                  scheme for ad hoc network},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {94--105},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075076},
  doi          = {10.1504/IJSN.2016.075076},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AnnaduraiY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BaekJ16,
  author       = {Sung{-}Hyun Baek and
                  Jong{-}Wook Jang},
  title        = {Design and implementation of the smart blackbox system},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {3},
  pages        = {167--174},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.078394},
  doi          = {10.1504/IJSN.2016.078394},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BaekJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Bi16,
  author       = {Ye Bi},
  title        = {A hybrid {PSO-SVM} model for network intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {196--203},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.10000343},
  doi          = {10.1504/IJSN.2016.10000343},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Bi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenC16,
  author       = {Zesheng Chen and
                  Chao Chen},
  title        = {Characterising heterogeneity in vulnerable hosts on worm propagation},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {224--234},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079276},
  doi          = {10.1504/IJSN.2016.079276},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenGXYECE16,
  author       = {Zhijiang Chen and
                  Linqiang Ge and
                  Guobin Xu and
                  Wei Yu and
                  Robert F. Erbacher and
                  Hasan Cam and
                  Nnanna Ekedebe},
  title        = {A threat monitoring system in enterprise networks with smart mobiles},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075073},
  doi          = {10.1504/IJSN.2016.075073},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenGXYECE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DadhichDG16,
  author       = {Priyanka Dadhich and
                  Kamlesh Dutta and
                  Mahesh Chandra Govil},
  title        = {Detection of slanders through Euclidean distance similarity assessment
                  for securing e-commerce agents in {P2P} decentralised electronic communities},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {48--65},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075072},
  doi          = {10.1504/IJSN.2016.075072},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DadhichDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FerragNG16,
  author       = {Mohamed Amine Ferrag and
                  Mehdi Nafa and
                  Salim Ghanemi},
  title        = {{EPSA:} an efficient and privacy-preserving scheme against wormhole
                  attack on reactive routing for mobile ad hoc social networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {3},
  pages        = {107--125},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.10000172},
  doi          = {10.1504/IJSN.2016.10000172},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/FerragNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HeCZ16,
  author       = {Pengju He and
                  Xiaomeng Chen and
                  Huazhi Zeng},
  title        = {Wireless sensor network for multi-target detection algorithm based
                  on blind source separation},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {235--241},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079275},
  doi          = {10.1504/IJSN.2016.079275},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HeCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JinWL16,
  author       = {Zhengping Jin and
                  Qing Wang and
                  Zhongxian Li},
  title        = {A formal construction of certificateless proxy multi-signature scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {3},
  pages        = {126--139},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.078391},
  doi          = {10.1504/IJSN.2016.078391},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JinWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KarouiFG16,
  author       = {Kamel Karoui and
                  Fakher Ben Ftima and
                  Henda Ben Gh{\'{e}}zala},
  title        = {A framework for firewalls policy representativeness testing based
                  on classification and reversible metrics},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {3},
  pages        = {140--159},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.078393},
  doi          = {10.1504/IJSN.2016.078393},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KarouiFG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuHMX16,
  author       = {Yanan Liu and
                  Lein Harn and
                  Lei Mao and
                  Zhangliang Xiong},
  title        = {Full-healing group-key distribution in online social networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {12--24},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075070},
  doi          = {10.1504/IJSN.2016.075070},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuHMX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NomulaRV16,
  author       = {Rupesh Nomula and
                  Mayssaa El Rifai and
                  Pramode K. Verma},
  title        = {Multi-photon tolerant protocols for quantum secure communication in
                  wireless standards},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {25--36},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075071},
  doi          = {10.1504/IJSN.2016.075071},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NomulaRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ParakhVS16,
  author       = {Abhishek Parakh and
                  Pramode K. Verma and
                  Mahadevan Subramaniam},
  title        = {Improving efficiency of quantum key distribution with probabilistic
                  measurements},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {37--47},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075075},
  doi          = {10.1504/IJSN.2016.075075},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ParakhVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RenHY16,
  author       = {Gao Ren and
                  Wang Hui and
                  Zhang Yun},
  title        = {A multi-channel {MAC} protocol with power control in the distributed
                  cognitive radio networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {204--212},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079282},
  doi          = {10.1504/IJSN.2016.079282},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RenHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShaoZZSC16,
  author       = {Feng Shao and
                  Shun Zhang and
                  Hong Zhong and
                  Runhua Shi and
                  Jie Cui},
  title        = {Keyword search protocol with privacy preservation using ID-based proxy
                  reencryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {188--195},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079307},
  doi          = {10.1504/IJSN.2016.079307},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShaoZZSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SubramaniamP16,
  author       = {Pranav Subramaniam and
                  Abhishek Parakh},
  title        = {A quantum Diffie-Hellman protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {213--223},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079277},
  doi          = {10.1504/IJSN.2016.079277},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SubramaniamP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SubudhiP16,
  author       = {Sharmila Subudhi and
                  Suvasini Panigrahi},
  title        = {Use of fuzzy clustering and support vector machine for detecting fraud
                  in mobile telecommunication networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {3--11},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075069},
  doi          = {10.1504/IJSN.2016.075069},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SubudhiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Thamilarasu16,
  author       = {Geethapriya Thamilarasu},
  title        = {iDetect: an intelligent intrusion detection system for wireless body
                  area networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {82--93},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075074},
  doi          = {10.1504/IJSN.2016.075074},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Thamilarasu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WahaballaXLQQ16,
  author       = {Abubaker Wahaballa and
                  Hu Xiong and
                  Fagen Li and
                  Zhen Qin and
                  Zhiguang Qin},
  title        = {Secure mobile agent-based English auction protocol using identity-based
                  signature scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {4},
  pages        = {175--187},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.079281},
  doi          = {10.1504/IJSN.2016.079281},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WahaballaXLQQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbdallahABAA15,
  author       = {Alaa Eddien Abdallah and
                  Emad Eddien Abdallah and
                  Mohammad Bsoul and
                  Ahmad Al{-}Khasawneh and
                  Lina Amer},
  title        = {A blind 3D watermarking technique using spherical coordinates and
                  skewness measure},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {1--8},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068390},
  doi          = {10.1504/IJSN.2015.068390},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallahABAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AgrawalS15,
  author       = {Arshi Agrawal and
                  Mark Stamp},
  title        = {Masquerade detection on GUI-based Windows systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {32--41},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068409},
  doi          = {10.1504/IJSN.2015.068409},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/AgrawalS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AtenieseMSVVF15,
  author       = {Giuseppe Ateniese and
                  Luigi V. Mancini and
                  Angelo Spognardi and
                  Antonio Villani and
                  Domenico Vitali and
                  Giovanni Felici},
  title        = {Hacking smart machines with smarter ones: How to extract meaningful
                  data from machine learning classifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {137--150},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071829},
  doi          = {10.1504/IJSN.2015.071829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AtenieseMSVVF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BagaiTKS15,
  author       = {Rajiv Bagai and
                  Bin Tang and
                  Ahsan A. Khan and
                  Abdus Samad},
  title        = {A system-wide anonymity metric with message multiplicities},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {20--31},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068391},
  doi          = {10.1504/IJSN.2015.068391},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BagaiTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BenamaraL15,
  author       = {Mohammed Amin Benamara and
                  Huixian Li},
  title        = {Secure of personal health records shared in cloud computing using
                  cipher-text attribute based encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {183--190},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071833},
  doi          = {10.1504/IJSN.2015.071833},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BenamaraL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GaoXRS15,
  author       = {Jingcheng Gao and
                  Yang Xiao and
                  Sneha Rao and
                  Fnu Shalini},
  title        = {Security tests and attack experimentations of ProtoGENI},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {151--169},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071834},
  doi          = {10.1504/IJSN.2015.071834},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GaoXRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoX15,
  author       = {Zuhua Guo and
                  Lixin Xu},
  title        = {Research of security structure model for web application systems based
                  on the relational database},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {207--213},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072437},
  doi          = {10.1504/IJSN.2015.072437},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Huang15,
  author       = {Jian Huang},
  title        = {Research on optimisation and application of improved fuzzy neural
                  network control algorithm},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {255--260},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072442},
  doi          = {10.1504/IJSN.2015.072442},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Huang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimJ15,
  author       = {Jongdeug Kim and
                  Taehyun Jeon},
  title        = {Efficient resource allocation for mobile instant messaging service
                  in wireless network},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {48--55},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068411},
  doi          = {10.1504/IJSN.2015.068411},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KortesniemiKSK15,
  author       = {Yki Kortesniemi and
                  Timo Kiravuo and
                  Mikko S{\"{a}}rel{\"{a}} and
                  Hannu H. Kari},
  title        = {Chain reduction of authorisation certificates},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {107--123},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070424},
  doi          = {10.1504/IJSN.2015.070424},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KortesniemiKSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KumarL15,
  author       = {N. M. Saravana Kumar and
                  S. Lavanya},
  title        = {A novel scheme for secure group communication in multicast network},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {65--75},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070409},
  doi          = {10.1504/IJSN.2015.070409},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KumarL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LeeAS15,
  author       = {Jared Lee and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {Compression-based analysis of metamorphic malware},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {124--136},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070426},
  doi          = {10.1504/IJSN.2015.070426},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LeeAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LeeKJKICPLK15,
  author       = {Ki Young Lee and
                  Aleum Kim and
                  Ye Eun Jeon and
                  Jeong{-}Joon Kim and
                  Yong Soon Im and
                  Gyoo{-}Seok Choi and
                  Sang{-}Bong Park and
                  Yun Sik Lim and
                  Jeong Jin Kang},
  title        = {Spatio-temporal {XACML:} the expansion of {XACML} for access control},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {56--63},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068412},
  doi          = {10.1504/IJSN.2015.068412},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LeeKJKICPLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NdatinyaXMMX15,
  author       = {Vivens Ndatinya and
                  Zhifeng Xiao and
                  Vasudeva Rao Manepalli and
                  Ke Meng and
                  Yang Xiao},
  title        = {Network forensics analysis using Wireshark},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {91--106},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070421},
  doi          = {10.1504/IJSN.2015.070421},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/NdatinyaXMMX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OhK15,
  author       = {Jai{-}Pil Oh and
                  Dong Ho Kim},
  title        = {System architecture and platform design for terrestrial ultra-high
                  definition {(UHD)} broadcasting service},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {76--83},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070413},
  doi          = {10.1504/IJSN.2015.070413},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OhK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ParkPC15,
  author       = {Inkyoo Park and
                  Jongjin Park and
                  Gyoo{-}Seok Choi},
  title        = {Using Bayesian posterior probability in confidence of attributes for
                  feature selection},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {2},
  pages        = {84--90},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.070418},
  doi          = {10.1504/IJSN.2015.070418},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ParkPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RudraV15,
  author       = {Bhawana Rudra and
                  O. P. Vyas},
  title        = {Understanding and mitigating security and authentication issues in
                  service oriented network architecture},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {9--19},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068392},
  doi          = {10.1504/IJSN.2015.068392},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RudraV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Sarrab15,
  author       = {Mohamed Sarrab},
  title        = {Bytecode instrumentation mechanism for monitoring mobile application
                  information flow},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {191--206},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071835},
  doi          = {10.1504/IJSN.2015.071835},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Sarrab15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShaliniXS15,
  author       = {Fnu Shalini and
                  Yang Xiao and
                  Bo Sun},
  title        = {ProtoGENI experiments},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {239--254},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072446},
  doi          = {10.1504/IJSN.2015.072446},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShaliniXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShinCK15,
  author       = {Jiyoung Shin and
                  Eric Chan{-}Tin and
                  Praveenkumar Khethavath},
  title        = {Accurate geolocation using network coordinates},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {170--182},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071830},
  doi          = {10.1504/IJSN.2015.071830},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShinCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SongCJ15,
  author       = {Myungseok Song and
                  Jun{-}Dong Cho and
                  Jongpil Jeong},
  title        = {Random-walk mobility management scheme for sensor-based mobile networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {261--270},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072443},
  doi          = {10.1504/IJSN.2015.072443},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SongCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangZZ15,
  author       = {Tong Wang and
                  Xinlin Zhao and
                  Yucai Zhou},
  title        = {Community detection in social network using shuffled frog-leaping
                  optimisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {222--227},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072439},
  doi          = {10.1504/IJSN.2015.072439},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WongK15,
  author       = {Alex Ming Hui Wong and
                  Dae{-}Ki Kang},
  title        = {Game layout and artificial intelligence implementation in mobile 3D
                  tower defence game},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {1},
  pages        = {42--47},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.068410},
  doi          = {10.1504/IJSN.2015.068410},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WongK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangWJD15,
  author       = {Zhiming Zhang and
                  Fuying Wu and
                  Changgen Jiang and
                  Jiangang Deng},
  title        = {An efficient detection scheme of node replication attacks for wireless
                  sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {228--238},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072440},
  doi          = {10.1504/IJSN.2015.072440},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangWJD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouWZ15,
  author       = {Yucai Zhou and
                  Tong Wang and
                  Xinlin Zhao},
  title        = {A hybrid recommendation algorithm based on time factor},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {4},
  pages        = {214--221},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.072438},
  doi          = {10.1504/IJSN.2015.072438},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AhmimG14,
  author       = {Ahmed Ahmim and
                  Nacira Ghoualmi{-}Zine},
  title        = {A new adaptive intrusion detection system based on the intersection
                  of two different classifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {125--132},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065710},
  doi          = {10.1504/IJSN.2014.065710},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AhmimG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Al-Salloum14,
  author       = {Ziyad S. Al{-}Salloum},
  title        = {GeoGraphical passwords},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {56--62},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059330},
  doi          = {10.1504/IJSN.2014.059330},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Al-Salloum14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AmbikaR14,
  author       = {Nagaraj Ambika and
                  G. T. Raju},
  title        = {{ECAWSN:} eliminating compromised node with the help of auxiliary
                  nodes in wireless sensor network},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {78--84},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060743},
  doi          = {10.1504/IJSN.2014.060743},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AmbikaR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BadenhopM14,
  author       = {Christopher W. Badenhop and
                  Barry E. Mullins},
  title        = {A black hole attack model using topology approximation for reactive
                  ad-hoc routing protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {63--77},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060755},
  doi          = {10.1504/IJSN.2014.060755},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BadenhopM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChoSL14,
  author       = {Seongsoo Cho and
                  Bhanu Shrestha and
                  Jongsup Lee},
  title        = {Method of recognising facial image using fuzzy measure},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {185--189},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066188},
  doi          = {10.1504/IJSN.2014.066188},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChoSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChuangN14,
  author       = {Po{-}Jen Chuang and
                  Ming{-}Yu Ni},
  title        = {On access control policy assignments and negotiation strategies in
                  automated trust negotiation},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {104--113},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060744},
  doi          = {10.1504/IJSN.2014.060744},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChuangN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CuiMA14,
  author       = {Hui Cui and
                  Yi Mu and
                  Man Ho Au},
  title        = {Anonymous broadcast encryption with an untrusted gateway},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {20--29},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059326},
  doi          = {10.1504/IJSN.2014.059326},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CuiMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FengLM14,
  author       = {Zuhong Feng and
                  Jing Li and
                  Jie Hu Meichsner},
  title        = {A Bayesian network intrusion detection algorithm based on principal
                  component analysis and sliding window},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {216--221},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066177},
  doi          = {10.1504/IJSN.2014.066177},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FengLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GroverLG14,
  author       = {Jyoti Grover and
                  Vijay Laxmi and
                  Manoj Singh Gaur},
  title        = {Sybil attack detection in {VANET} using neighbouring vehicles},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {222--233},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066178},
  doi          = {10.1504/IJSN.2014.066178},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GroverLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HagenM14,
  author       = {John T. Hagen and
                  Barry E. Mullins},
  title        = {Network vulnerability analysis of the Player command and control protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {154--166},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065708},
  doi          = {10.1504/IJSN.2014.065708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HagenM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HenryM14,
  author       = {Wayne C. Henry and
                  Barry E. Mullins},
  title        = {{VANISH:} a variable advanced network {IRC} stealth handling system},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {114--123},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060741},
  doi          = {10.1504/IJSN.2014.060741},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HenryM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Islam14,
  author       = {Salekul Islam},
  title        = {Security analysis of {LMAP} using {AVISPA}},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {30--39},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059325},
  doi          = {10.1504/IJSN.2014.059325},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Islam14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KangJKA14,
  author       = {Min Soo Kang and
                  Yong{-}Gyu Jung and
                  Myung Ho Kim and
                  Kichan Ahn},
  title        = {Development of sensor nodes based on fault tolerance},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {190--196},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066181},
  doi          = {10.1504/IJSN.2014.066181},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KangJKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KarouiFG14,
  author       = {Kamel Karoui and
                  Fakher Ben Ftima and
                  Henda Ben Gh{\'{e}}zala},
  title        = {Firewalls anomalies severity evaluation and classification},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {167--176},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065712},
  doi          = {10.1504/IJSN.2014.065712},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KarouiFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimJ14,
  author       = {Jongdeug Kim and
                  Taehyun Jeon},
  title        = {Signalling optimisation for VoIP service in All-IP network},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {177--184},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065721},
  doi          = {10.1504/IJSN.2014.065721},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimJJ14,
  author       = {Hwa{-}seon Kim and
                  Seong{-}Jin Jang and
                  Jong{-}Wook Jang},
  title        = {Development of the knocking decision system using the {CKP} signal
                  collection and analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {209--215},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066183},
  doi          = {10.1504/IJSN.2014.066183},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimLCLK14,
  author       = {Seong{-}Kweon Kim and
                  Kyung{-}Ryang Lee and
                  Jae{-}Sang Cha and
                  Kyoung{-}Kun Lee and
                  Seong{-}Jong Kim},
  title        = {Implementation of battery inspection system for building energy management
                  system},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {197--201},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066180},
  doi          = {10.1504/IJSN.2014.066180},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimLCLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LeeYJ14,
  author       = {Kyungrak Lee and
                  Jaeyoung Yoo and
                  Inwhee Joe},
  title        = {An environmental transition-aware data transmission scheme with energy
                  efficiency in energy harvesting wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {202--208},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066182},
  doi          = {10.1504/IJSN.2014.066182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LeeYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MezzourC14,
  author       = {Ghita Mezzour and
                  Kathleen M. Carley},
  title        = {Spam diffusion in a social network initiated by hacked e-mail accounts},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {144--153},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065709},
  doi          = {10.1504/IJSN.2014.065709},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MezzourC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Peng14,
  author       = {Kun Peng},
  title        = {Assumptions and conditions for mix networks: analysis, clarification
                  and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {133--143},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065719},
  doi          = {10.1504/IJSN.2014.065719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Peng14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RangwalaZZL14,
  author       = {Mohammed Rangwala and
                  Ping Zhang and
                  Xukai Zou and
                  Feng Li},
  title        = {A taxonomy of privilege escalation attacks in Android applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {40--55},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059327},
  doi          = {10.1504/IJSN.2014.059327},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RangwalaZZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SantosNWLW14,
  author       = {Daniel Ricardo dos Santos and
                  Tiago Jaime Nascimento and
                  Carla Merkle Westphall and
                  Marcos Aur{\'{e}}lio Pedroso Leandro and
                  Carlos Becker Westphall},
  title        = {Privacy-preserving identity federations in the cloud: a proof of concept},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059328},
  doi          = {10.1504/IJSN.2014.059328},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SantosNWLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SeberryMGW14,
  author       = {Jennifer Seberry and
                  Yi Mu and
                  Fuchun Guo and
                  Tim Wellsmore},
  title        = {Efficient authentication and integrity protection for the border gateway
                  protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {234--243},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066179},
  doi          = {10.1504/IJSN.2014.066179},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SeberryMGW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SeifiSFB14,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  title        = {Security properties analysis in a TPM-based protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {85--103},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060742},
  doi          = {10.1504/IJSN.2014.060742},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Vajda14,
  author       = {Istv{\'{a}}n Vajda},
  title        = {A proof technique for security assessment of on-demand ad hoc routing
                  protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {12--19},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059329},
  doi          = {10.1504/IJSN.2014.059329},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Vajda14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbdallahABOA13,
  author       = {Emad Eddien Abdallah and
                  Alaa Eddien Abdallah and
                  Mohammad Bsoul and
                  Ahmed F. Otoom and
                  Essam Al{-}Daoud},
  title        = {Simplified features for email authorship identification},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {72--81},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055941},
  doi          = {10.1504/IJSN.2013.055941},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallahABOA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CroninW13,
  author       = {Brendan Cronin and
                  Xiaojun Wang},
  title        = {Pattern overlap in bit-parallel implementation of regular expression
                  repetition quantifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {231--238},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058154},
  doi          = {10.1504/IJSN.2013.058154},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CroninW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CuiMG13,
  author       = {Hui Cui and
                  Yi Mu and
                  Fuchun Guo},
  title        = {Server-aided identity-based anonymous broadcast encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {29--39},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055038},
  doi          = {10.1504/IJSN.2013.055038},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CuiMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DondykRZ13,
  author       = {Erich Dondyk and
                  Louis Rivera and
                  Cliff Changchun Zou},
  title        = {Wi-Fi access denial of service attack to smartphones},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {117--129},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057698},
  doi          = {10.1504/IJSN.2013.057698},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DondykRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GogoiBK13,
  author       = {Prasanta Gogoi and
                  Dhruba K. Bhattacharyya and
                  Jugal K. Kalita},
  title        = {A rough set-based effective rule generation method for classification
                  with an application in intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {61--71},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055939},
  doi          = {10.1504/IJSN.2013.055939},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GogoiBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JusteEWBF13,
  author       = {Pierre St. Juste and
                  Heungsik Eom and
                  Benjamin Woodruff and
                  Corey Baker and
                  Renato J. O. Figueiredo},
  title        = {Enabling decentralised microblogging through P2PVPNs},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {169--178},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057699},
  doi          = {10.1504/IJSN.2013.057699},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JusteEWBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KalraS13,
  author       = {Sheetal Kalra and
                  Sandeep K. Sood},
  title        = {ECC-based anti-phishing protocol for cloud computing services},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {130--138},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057695},
  doi          = {10.1504/IJSN.2013.057695},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KalraS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiXZ13,
  author       = {Qinyi Li and
                  Hu Xiong and
                  Fengli Zhang},
  title        = {Broadcast revocation scheme in composite-order bilinear group and
                  its application to attribute-based encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {1--12},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055036},
  doi          = {10.1504/IJSN.2013.055036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RasslanA13,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Heba Kamal Aslan},
  title        = {On the security of two improved authenticated encryption schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {194--199},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058112},
  doi          = {10.1504/IJSN.2013.058112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RathC13,
  author       = {Annanda Thavymony Rath and
                  Jean{-}No{\"{e}}l Colin},
  title        = {Towards purpose enforcement model for privacy-aware usage control
                  policy in distributed healthcare},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {94--105},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055943},
  doi          = {10.1504/IJSN.2013.055943},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RathC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SantosLSB13,
  author       = {Igor Santos and
                  Carlos Laorden and
                  Borja Sanz and
                  Pablo Garc{\'{\i}}a Bringas},
  title        = {Reversing the effects of tokenisation attacks against content-based
                  spam filters},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {106--116},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055944},
  doi          = {10.1504/IJSN.2013.055944},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SantosLSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Sarrab13,
  author       = {Mohamed Sarrab},
  title        = {Runtime verification using policy-based approach to control information
                  flow},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {212--230},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058153},
  doi          = {10.1504/IJSN.2013.058153},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Sarrab13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SaxenaC13,
  author       = {Neetesh Saxena and
                  Narendra S. Chaudhari},
  title        = {An enhanced {NPA} protocol for secure communications in {GSM} network},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {13--28},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055045},
  doi          = {10.1504/IJSN.2013.055045},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SaxenaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanK013,
  author       = {Avinash Srinivasan and
                  Satish Kolli and
                  Jie Wu},
  title        = {Steganographic information hiding that exploits a novel file system
                  vulnerability},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {82--93},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055942},
  doi          = {10.1504/IJSN.2013.055942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanK013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Tahat13,
  author       = {Nedal Tahat},
  title        = {A new proxy signature scheme with a semi-trusted third party based
                  on elliptic curve discrete logarithm problem},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {207--211},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058113},
  doi          = {10.1504/IJSN.2013.058113},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Tahat13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TripathiS13,
  author       = {Anshu Tripathi and
                  Umesh Kumar Singh},
  title        = {A model for quantitative security measurement and prioritisation of
                  vulnerability mitigation},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {139--153},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057696},
  doi          = {10.1504/IJSN.2013.057696},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TripathiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XiaoFXCL13,
  author       = {Zhifeng Xiao and
                  Bo Fu and
                  Yang Xiao and
                  C. L. Philip Chen and
                  Wei Liang},
  title        = {A review of {GENI} authentication and access control mechanisms},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {40--60},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055046},
  doi          = {10.1504/IJSN.2013.055046},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XiaoFXCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuGZHR13,
  author       = {Wei Yu and
                  Linqiang Ge and
                  Difan Zhang and
                  Rommie L. Hardy and
                  Robert J. Reschly},
  title        = {On effective sampling techniques in host-based intrusion detection
                  in tactical {MANET}},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {154--168},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057688},
  doi          = {10.1504/IJSN.2013.057688},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuGZHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuHC13,
  author       = {Jia Yu and
                  Rong Hao and
                  Xiangguo Cheng},
  title        = {Security analysis and improvement of two verifiable multi-secret sharing
                  schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {200--206},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058147},
  doi          = {10.1504/IJSN.2013.058147},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangGYZHR13,
  author       = {Difan Zhang and
                  Linqiang Ge and
                  Wei Yu and
                  Hanlin Zhang and
                  Rommie L. Hardy and
                  Robert J. Reschly},
  title        = {On effective data aggregation techniques in host-based intrusion detection
                  in {MANET}},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {179--193},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058152},
  doi          = {10.1504/IJSN.2013.058152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangGYZHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Al-Salloum12,
  author       = {Ziyad S. Al{-}Salloum},
  title        = {Defensive computer worms: an overview},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {59--70},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048479},
  doi          = {10.1504/IJSN.2012.048479},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Al-Salloum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlsubhiABB12,
  author       = {Khalid Alsubhi and
                  Yassir Alhazmi and
                  Nizar Bouabdallah and
                  Raouf Boutaba},
  title        = {Security configuration management in intrusion detection and prevention
                  systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {30--39},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048493},
  doi          = {10.1504/IJSN.2012.048493},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlsubhiABB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Baig12,
  author       = {Zubair A. Baig},
  title        = {Rapid anomaly detection for smart grid infrastructures through hierarchical
                  pattern matching},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {2},
  pages        = {83--94},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.050025},
  doi          = {10.1504/IJSN.2012.050025},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Baig12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BoyerROR12,
  author       = {Stephane Boyer and
                  Jean{-}Marc Robert and
                  Hadi Otrok and
                  Clement Rousseau},
  title        = {An adaptive tit-for-tat strategy for {IEEE} 802.11 {CSMA/CA} protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {2},
  pages        = {95--106},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.050026},
  doi          = {10.1504/IJSN.2012.050026},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BoyerROR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ButunWLS12,
  author       = {Ismail Butun and
                  Yufeng Wang and
                  Young{-}seok Lee and
                  Ravi Sankar},
  title        = {Intrusion prevention with two-level user authentication in heterogeneous
                  wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {2},
  pages        = {107--121},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.050027},
  doi          = {10.1504/IJSN.2012.050027},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ButunWLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Desoky12,
  author       = {Abdelrahman Desoky},
  title        = {Jokestega: automatic joke generation-based steganography methodology},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {148--160},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052529},
  doi          = {10.1504/IJSN.2012.052529},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Desoky12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FanianBG12,
  author       = {Ali Fanian and
                  Mehdi Berenjkoub and
                  T. Aaron Gulliver},
  title        = {A symmetric polynomial-based mutual authentication protocol for {GSM}
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {161--173},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052530},
  doi          = {10.1504/IJSN.2012.052530},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FanianBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HanCXWL12,
  author       = {Fuye Han and
                  Zhen Chen and
                  HongFeng Xu and
                  Haopei Wang and
                  Yong Liang},
  title        = {A collaborative botnets suppression system based on overlay network},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {211--219},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053459},
  doi          = {10.1504/IJSN.2012.053459},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HanCXWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KandahSZW12,
  author       = {Farah I. Kandah and
                  Yashaswi Singh and
                  Weiyi Zhang and
                  Tie Wang},
  title        = {A misleading active routing attack in mobile ad-hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {17--29},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048492},
  doi          = {10.1504/IJSN.2012.048492},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KandahSZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KolesnikovL12,
  author       = {Vladimir Kolesnikov and
                  Wonsuck Lee},
  title        = {{MAC} aggregation protocols resilient to DoS attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {2},
  pages        = {122--132},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.050028},
  doi          = {10.1504/IJSN.2012.050028},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KolesnikovL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuXC12,
  author       = {Jing Liu and
                  Yang Xiao and
                  C. L. Philip Chen},
  title        = {Internet of things' authentication and access control},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {228--241},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053461},
  doi          = {10.1504/IJSN.2012.053461},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuXC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LvY12,
  author       = {Shilei Lv and
                  Shunzheng Yu},
  title        = {A novel middleware-based approach for redundant reader elimination
                  using {PSO}},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {220--227},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053460},
  doi          = {10.1504/IJSN.2012.053460},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LvY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MoonsamyAB12,
  author       = {Veelasha Moonsamy and
                  Moutaz Alazab and
                  Lynn Margaret Batten},
  title        = {Towards an understanding of the impact of advertising on data leaks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {181--193},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052540},
  doi          = {10.1504/IJSN.2012.052540},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MoonsamyAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NejiB12,
  author       = {Nizar Ben Neji and
                  Adel Bouhoula},
  title        = {Managing hybrid packet filter's specifications},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {2},
  pages        = {73--82},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.050024},
  doi          = {10.1504/IJSN.2012.050024},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NejiB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Peng12,
  author       = {Kun Peng},
  title        = {How to communicate anonymously in a network: study and optimisation
                  of efficiency and security of anonymous communication networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {133--147},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052525},
  doi          = {10.1504/IJSN.2012.052525},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SunCMW12,
  author       = {Dawei Sun and
                  Guiran Chang and
                  Changsheng Miao and
                  Xingwei Wang},
  title        = {Modelling and evaluating a high serviceability fault tolerance strategy
                  in cloud computing environments},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {196--210},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053458},
  doi          = {10.1504/IJSN.2012.053458},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SunCMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/VespaCW12,
  author       = {Lucas Vespa and
                  Ritam Chakrovorty and
                  Ning Weng},
  title        = {Lightweight testbed for evaluating worm containment systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {6--16},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048478},
  doi          = {10.1504/IJSN.2012.048478},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/VespaCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WongT12,
  author       = {Duncan S. Wong and
                  Xiaojian Tian},
  title        = {E-mail protocols with perfect forward secrecy},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {1--5},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048491},
  doi          = {10.1504/IJSN.2012.048491},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WongT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XiaoX12,
  author       = {Zhifeng Xiao and
                  Yang Xiao},
  title        = {PeerReview re-evaluation for accountability in distributed systems
                  or networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {1},
  pages        = {40--58},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.048494},
  doi          = {10.1504/IJSN.2012.048494},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/XiaoX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XingWWW12,
  author       = {Liudong Xing and
                  Honggang Wang and
                  Chaonan Wang and
                  Yujie Wang},
  title        = {BDD-based two-party trust sensitivity analysis for social networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {242--251},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053462},
  doi          = {10.1504/IJSN.2012.053462},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XingWWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuNWL12,
  author       = {Zhaohu Xu and
                  Xuyun Nie and
                  Hui Wang and
                  Yongjian Liao},
  title        = {Cryptanalysis of an improved {MFE} public key cryptosystem},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {174--180},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052532},
  doi          = {10.1504/IJSN.2012.052532},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuNWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangCXZ12,
  author       = {Jun Zhang and
                  Chao Chen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Semi-supervised and compound classification of network traffic},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {4},
  pages        = {252--261},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.053463},
  doi          = {10.1504/IJSN.2012.053463},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangCXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AmpahASA11,
  author       = {Nana K. Ampah and
                  Cajetan M. Akujuobi and
                  Matthew N. O. Sadiku and
                  Shumon Alam},
  title        = {An intrusion detection technique based on continuous binary communication
                  channels},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {174--180},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043674},
  doi          = {10.1504/IJSN.2011.043674},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AmpahASA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BaruaLLS11,
  author       = {Mrinmoy Barua and
                  Xiaohui Liang and
                  Rongxing Lu and
                  Xuemin Shen},
  title        = {{ESPAC:} Enabling Security and Patient-centric Access Control for
                  eHealth in cloud computing},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {67--76},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043666},
  doi          = {10.1504/IJSN.2011.043666},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/BaruaLLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChaiG11,
  author       = {Qi Chai and
                  Guang Gong},
  title        = {On the (in)security of two Joint Encryption and Error Correction schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {191--200},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045227},
  doi          = {10.1504/IJSN.2011.045227},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChaiG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChangWT11,
  author       = {Wei Chang and
                  Jie Wu and
                  Chiu C. Tan},
  title        = {Friendship-based location privacy in Mobile Social Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {226--236},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045230},
  doi          = {10.1504/IJSN.2011.045230},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChangWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChengGM11,
  author       = {Ningning Cheng and
                  Kannan Govindan and
                  Prasant Mohapatra},
  title        = {Rendezvous based trust propagation to enhance distributed network
                  security},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {112--122},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043670},
  doi          = {10.1504/IJSN.2011.043670},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChengGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChoiAG11,
  author       = {Taehwan Choi and
                  Hrishikesh B. Acharya and
                  Mohamed G. Gouda},
  title        = {Is that you? Authentication in a network without identities},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {181--190},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045226},
  doi          = {10.1504/IJSN.2011.045226},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChoiAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChowY11,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu},
  title        = {Exclusion-intersection encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {136--146},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043672},
  doi          = {10.1504/IJSN.2011.043672},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChowY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Desoky11,
  author       = {Abdelrahman Desoky},
  title        = {Edustega: an Education-Centric Steganography methodology},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {153--173},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043653},
  doi          = {10.1504/IJSN.2011.043653},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Desoky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FathyEY11,
  author       = {Ahmed Osama Fathy Atya and
                  Tamer A. ElBatt and
                  Moustafa Youssef},
  title        = {A source authentication scheme using network coding},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {101--111},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043669},
  doi          = {10.1504/IJSN.2011.043669},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/FathyEY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JaggiRB11,
  author       = {Neeraj Jaggi and
                  Umesh Marappa Reddy and
                  Rajiv Bagai},
  title        = {A three dimensional sender anonymity metric},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {77--89},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043667},
  doi          = {10.1504/IJSN.2011.043667},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JaggiRB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KalogridisDLC11,
  author       = {Georgios Kalogridis and
                  Stojan Z. Denic and
                  Tim A. Lewis and
                  Rafael Cepeda},
  title        = {Privacy protection system and metrics for hiding electrical events},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {1},
  pages        = {14--27},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.039630},
  doi          = {10.1504/IJSN.2011.039630},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KalogridisDLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KundurFMLZB11,
  author       = {Deepa Kundur and
                  Xianyong Feng and
                  Salman Mashayekh and
                  Shan Liu and
                  Takis Zourntos and
                  Karen L. Butler{-}Purry},
  title        = {Towards modelling the impact of cyber attacks on a smart grid},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {1},
  pages        = {2--13},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.039629},
  doi          = {10.1504/IJSN.2011.039629},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KundurFMLZB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiLL11,
  author       = {Fengjun Li and
                  Bo Luo and
                  Peng Liu},
  title        = {Secure and privacy-preserving information aggregation for smart grids},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {1},
  pages        = {28--39},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.039631},
  doi          = {10.1504/IJSN.2011.039631},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuXZFW11,
  author       = {Li Liu and
                  Yang Xiao and
                  Jingyuan Zhang and
                  Andrew Faulkner and
                  Keith Weber},
  title        = {Hidden information in Microsoft Word},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {123--135},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043671},
  doi          = {10.1504/IJSN.2011.043671},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuXZFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LuoS11,
  author       = {Guoqi Luo and
                  K. P. Subbalakshmi},
  title        = {KL-sense secure image steganography},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {211--225},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045229},
  doi          = {10.1504/IJSN.2011.045229},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LuoS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RamseyMTA11,
  author       = {Benjamin W. P. Ramsey and
                  Barry E. Mullins and
                  Ryan W. Thomas and
                  Todd R. Andel},
  title        = {Subjective audio quality over a secure {IEEE} 802.11n network},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {1},
  pages        = {53--63},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.039633},
  doi          = {10.1504/IJSN.2011.039633},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RamseyMTA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SharmaL11,
  author       = {Madhu J. Sharma and
                  Victor C. M. Leung},
  title        = {Improved {IP} Multimedia Subsystem authentication mechanism for 3G-WLAN
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {90--100},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043668},
  doi          = {10.1504/IJSN.2011.043668},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SharmaL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TangL11,
  author       = {Shensheng Tang and
                  Wei Li},
  title        = {An epidemic model with adaptive virus spread control for Wireless
                  Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {201--210},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045228},
  doi          = {10.1504/IJSN.2011.045228},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WalkerL11,
  author       = {David J. Walker and
                  Shahram Latifi},
  title        = {Partial iris and recognition as a viable biometric scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {2/3},
  pages        = {147--152},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.043673},
  doi          = {10.1504/IJSN.2011.043673},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WalkerL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangG11,
  author       = {Jianqing Zhang and
                  Carl A. Gunter},
  title        = {Application-aware secure multicast for power grid communications},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {1},
  pages        = {40--52},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.039632},
  doi          = {10.1504/IJSN.2011.039632},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhaoLX11,
  author       = {Xinxin Zhao and
                  Lingjun Li and
                  Guoliang Xue},
  title        = {Authenticating strangers in Online Social Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {6},
  number       = {4},
  pages        = {237--248},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJSN.2011.045231},
  doi          = {10.1504/IJSN.2011.045231},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhaoLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbbesBR10,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Efficient decision tree for protocol analysis in intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {220--235},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037661},
  doi          = {10.1504/IJSN.2010.037661},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AzevedoF10,
  author       = {Susana Garrido Azevedo and
                  Jo{\~{a}}o J. Ferreira},
  title        = {Radio frequency identification: a case study of healthcare organisations},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {147--155},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032213},
  doi          = {10.1504/IJSN.2010.032213},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/AzevedoF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenCW10,
  author       = {Zesheng Chen and
                  Chao Chen and
                  Qian Wang},
  title        = {On the scalability of Delay-Tolerant Botnets},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {248--258},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037664},
  doi          = {10.1504/IJSN.2010.037664},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DaltonEMR10,
  author       = {George C. Dalton II and
                  Kenneth S. Edge and
                  Robert F. Mills and
                  Richard A. Raines},
  title        = {Analysing security risks in computer and Radio Frequency Identification
                  {(RFID)} networks using attack and protection trees},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {87--95},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032207},
  doi          = {10.1504/IJSN.2010.032207},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DaltonEMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DongHRW10,
  author       = {Yuhong Dong and
                  Sam Hsu and
                  Saeed Rajput and
                  Bing Wu},
  title        = {Experimental analysis of application-level intrusion detection algorithms},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {198--205},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032218},
  doi          = {10.1504/IJSN.2010.032218},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DongHRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoMZL10,
  author       = {Hua Guo and
                  Yi Mu and
                  Xiyong Zhang and
                  Zhoujun Li},
  title        = {Enhanced McCullagh-Barreto identity-based key exchange protocols with
                  master key forward security},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {173--187},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032216},
  doi          = {10.1504/IJSN.2010.032216},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoMZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoP10,
  author       = {Yinghua Guo and
                  Sylvie Perreau},
  title        = {Detect DDoS flooding attacks in mobile ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {259--269},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037666},
  doi          = {10.1504/IJSN.2010.037666},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsiaoH10,
  author       = {Yu{-}Kai Hsiao and
                  Ren{-}Junn Hwang},
  title        = {An efficient secure data dissemination scheme for grid structure Wireless
                  Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {26--34},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030720},
  doi          = {10.1504/IJSN.2010.030720},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsiaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangS10,
  author       = {Shih{-}I Huang and
                  Shiuhpyng Shieh},
  title        = {Authentication and secret search mechanisms for RFID-aware wireless
                  sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {15--25},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030719},
  doi          = {10.1504/IJSN.2010.030719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HutterPF10,
  author       = {Michael Hutter and
                  Thomas Plos and
                  Martin Feldhofer},
  title        = {On the security of {RFID} devices against implementation attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {106--118},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032209},
  doi          = {10.1504/IJSN.2010.032209},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ImasakiZJ10,
  author       = {Yasuhiro Imasaki and
                  Yongbing Zhang and
                  Yusheng Ji},
  title        = {Secure and efficient data transmission in {RFID} sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {119--127},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032210},
  doi          = {10.1504/IJSN.2010.032210},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ImasakiZJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LengLMM10,
  author       = {Xuefei Leng and
                  Yuanhung Lien and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {An {RFID} grouping proof protocol exploiting anti-collision algorithm
                  for subgroup dividing},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {79--86},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032206},
  doi          = {10.1504/IJSN.2010.032206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LengLMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MalligaT10,
  author       = {S. Malliga and
                  A. Tamilarasi},
  title        = {A backpressure technique for filtering spoofed traffic at upstream
                  routers},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {3--14},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030718},
  doi          = {10.1504/IJSN.2010.030718},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MalligaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Raad10,
  author       = {Muhammad Wassim Raad},
  title        = {A ubiquitous mobile telemedicine system for the elderly using {RFID}},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {156--164},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032214},
  doi          = {10.1504/IJSN.2010.032214},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Raad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RichardAK10,
  author       = {Richard O. Afolabi and
                  Aftab Ahmad and
                  Kiseon Kim},
  title        = {Security assessments of {IEEE} 802.15.4 standard based on {X.805}
                  framework},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {188--197},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032217},
  doi          = {10.1504/IJSN.2010.032217},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RichardAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RodriguesJ10,
  author       = {Mark J. Rodrigues and
                  Kieran James},
  title        = {Perceived barriers to the widespread commercial use of Radio Frequency
                  Identification technology},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {165--172},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032215},
  doi          = {10.1504/IJSN.2010.032215},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RodriguesJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SchraderMPM10,
  author       = {Karl R. Schrader and
                  Barry E. Mullins and
                  Gilbert L. Peterson and
                  Robert F. Mills},
  title        = {An FPGA-based system for tracking digital information transmitted
                  via Peer-to-Peer protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {236--247},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037662},
  doi          = {10.1504/IJSN.2010.037662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SchraderMPM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SinghL10,
  author       = {Manmeet Mahinderjit Singh and
                  Xue Li},
  title        = {Trust in RFID-enabled Supply-Chain Management},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {96--105},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032208},
  doi          = {10.1504/IJSN.2010.032208},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SinghL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Sun10,
  author       = {L. Sun},
  title        = {Security and privacy on low-cost Radio Frequency Identification systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {128--134},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032211},
  doi          = {10.1504/IJSN.2010.032211},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Sun10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TsaiHW10,
  author       = {Kuo{-}Yu Tsai and
                  Chien{-}Lung Hsu and
                  Tzong{-}Chen Wu},
  title        = {Mutual anonymity protocol with integrity protection for mobile peer-to-peer
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {45--52},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030722},
  doi          = {10.1504/IJSN.2010.030722},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TsaiHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangS10,
  author       = {Ju Wang and
                  G. L. Smith},
  title        = {A cross-layer authentication design for secure video transportation
                  in wireless sensor network},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {63--76},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030724},
  doi          = {10.1504/IJSN.2010.030724},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuCHM10,
  author       = {Li Xu and
                  Sisheng Chen and
                  Xinyi Huang and
                  Yi Mu},
  title        = {Bloom filter based secure and anonymous {DSR} protocol in wireless
                  ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030721},
  doi          = {10.1504/IJSN.2010.030721},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuCHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Yang10,
  author       = {Ming{-}Hour Yang},
  title        = {Lightweight authentication protocol for mobile {RFID} networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {53--62},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030723},
  doi          = {10.1504/IJSN.2010.030723},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Yang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangGS10,
  author       = {Xiaowen Zhang and
                  Qinghai Gao and
                  Mohamed K. Saad},
  title        = {Looking at a class of {RFID} APs through {GNY} logic},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {135--146},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032212},
  doi          = {10.1504/IJSN.2010.032212},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuangLC10,
  author       = {Zhenyun Zhuang and
                  Ying Li and
                  Zesheng Chen},
  title        = {Enhancing Intrusion Detection System with proximity information},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {207--219},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037660},
  doi          = {10.1504/IJSN.2010.037660},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuangLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BaiZ09,
  author       = {Li Bai and
                  Xukai Zou},
  title        = {A Proactive Secret Sharing Scheme in matrix projection method},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {201--209},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028667},
  doi          = {10.1504/IJSN.2009.028667},
  timestamp    = {Thu, 29 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BaiZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BerthierC09,
  author       = {Robin Berthier and
                  Michel Cukier},
  title        = {An evaluation of connection characteristics for separating network
                  attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {110--124},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023430},
  doi          = {10.1504/IJSN.2009.023430},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BerthierC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BettaharAB09,
  author       = {Hatem Bettahar and
                  Mothanna Alkubeily and
                  Abdelmadjid Bouabdallah},
  title        = {{TKS:} a transition key management scheme for secure application level
                  multicast},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {210--222},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028668},
  doi          = {10.1504/IJSN.2009.028668},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BettaharAB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BuhanBDHV09,
  author       = {Ileana Buhan and
                  Bas Boom and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Raymond N. J. Veldhuis},
  title        = {Secure pairing with biometrics},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {27--42},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023424},
  doi          = {10.1504/IJSN.2009.023424},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BuhanBDHV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChakrabartiCS09,
  author       = {Saikat Chakrabarti and
                  Santosh Chandrasekhar and
                  Mukesh Singhal},
  title        = {An escrow-less identity-based group-key agreement protocol for dynamic
                  peer groups},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {171--188},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027343},
  doi          = {10.1504/IJSN.2009.027343},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChakrabartiCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenCL09,
  author       = {Zesheng Chen and
                  Chao Chen and
                  Yubin Li},
  title        = {Deriving a closed-form expression for worm-scanning strategies},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {135--144},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027339},
  doi          = {10.1504/IJSN.2009.027339},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DjenouriBM09,
  author       = {Djamel Djenouri and
                  Mohamed Bouamama and
                  Othmane Mahmoudi},
  title        = {Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad
                  hoc Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {246--262},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028671},
  doi          = {10.1504/IJSN.2009.028671},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DjenouriBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DrakakisPC09,
  author       = {Konstantinos E. Drakakis and
                  Athanasios D. Panagopoulos and
                  Panayotis G. Cottis},
  title        = {Overview of satellite communication networks security: introduction
                  of {EAP}},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {164--170},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027342},
  doi          = {10.1504/IJSN.2009.027342},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DrakakisPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EhlertRM09,
  author       = {Sven Ehlert and
                  Yacine Rebahi and
                  Thomas Magedanz},
  title        = {Intrusion Detection System for Denial-of-Service flooding attacks
                  in {SIP} communication networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {189--200},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027344},
  doi          = {10.1504/IJSN.2009.027344},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EhlertRM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GoodrichSSSTU09,
  author       = {Michael T. Goodrich and
                  Michael Sirivianos and
                  John Solis and
                  Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Using audio in secure device pairing},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {57--68},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023426},
  doi          = {10.1504/IJSN.2009.023426},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuDX09,
  author       = {Fei Hu and
                  De{-}Cun Dong and
                  Yang Xiao},
  title        = {Attacks and countermeasures in multi-hop Cognitive Radio Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {263--271},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028672},
  doi          = {10.1504/IJSN.2009.028672},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuDX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangKLW09,
  author       = {Hejiao Huang and
                  H{\'{e}}l{\`{e}}ne Kirchner and
                  Songyun Liu and
                  Weili Wu},
  title        = {Handling inheritance violation for secure interoperation of heterogeneous
                  systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {223--233},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028669},
  doi          = {10.1504/IJSN.2009.028669},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangKLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KuoPW09,
  author       = {Cynthia Kuo and
                  Adrian Perrig and
                  Jesse Walker},
  title        = {Designing user studies for security applications: a case study with
                  wireless network configuration},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {101--109},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023429},
  doi          = {10.1504/IJSN.2009.023429},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KuoPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LaurP09,
  author       = {Sven Laur and
                  Sylvain Pasini},
  title        = {User-aided data authentication},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {69--86},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023427},
  doi          = {10.1504/IJSN.2009.023427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LaurP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LeeS09,
  author       = {Sookyoung Lee and
                  Krishna M. Sivalingam},
  title        = {An efficient One-Time Password authentication scheme using a smart
                  card},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {145--152},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027340},
  doi          = {10.1504/IJSN.2009.027340},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LeeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/McCunePR09,
  author       = {Jonathan M. McCune and
                  Adrian Perrig and
                  Michael K. Reiter},
  title        = {Seeing-Is-Believing: using camera phones for human-verifiable authentication},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {43--56},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023425},
  doi          = {10.1504/IJSN.2009.023425},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/McCunePR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RekhisB09,
  author       = {Slim Rekhis and
                  Noureddine Boudriga},
  title        = {Visibility: a novel concept for characterising provable network digital
                  evidences},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {4},
  pages        = {234--245},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.028670},
  doi          = {10.1504/IJSN.2009.028670},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RekhisB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ScannellVLL09,
  author       = {Adin Scannell and
                  Alex Varshavsky and
                  Anthony LaMarca and
                  Eyal de Lara},
  title        = {Proximity-based authentication of mobile devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {4--16},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023422},
  doi          = {10.1504/IJSN.2009.023422},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ScannellVLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SorienteTU09,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Secure pairing of interface constrained devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {17--26},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023423},
  doi          = {10.1504/IJSN.2009.023423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SuomalainenVA09,
  author       = {Jani Suomalainen and
                  Jukka Valkonen and
                  N. Asokan},
  title        = {Standards for security associations in personal networks: a comparative
                  analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {87--100},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023428},
  doi          = {10.1504/IJSN.2009.023428},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SuomalainenVA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WatkinsBC09,
  author       = {Lanier A. Watkins and
                  Raheem A. Beyah and
                  Cherita L. Corbett},
  title        = {Using link {RTT} to passively detect unapproved wireless nodes},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {3},
  pages        = {153--163},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.027341},
  doi          = {10.1504/IJSN.2009.027341},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WatkinsBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WuWD09,
  author       = {Bing Wu and
                  Jie Wu and
                  Yuhong Dong},
  title        = {An efficient group key management scheme for mobile ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {125--134},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023431},
  doi          = {10.1504/IJSN.2009.023431},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WuWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AsadpourSM08,
  author       = {Mahdi Asadpour and
                  Behnam Sattarzadeh and
                  Ali Movaghar},
  title        = {Anonymous authentication protocol for {GSM} networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {54--62},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016202},
  doi          = {10.1504/IJSN.2008.016202},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AsadpourSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BouhoulaTBB08,
  author       = {Adel Bouhoula and
                  Zouheir Trabelsi and
                  Ezedin Barka and
                  Mohammed Anis Benelbahri},
  title        = {Firewall filtering rules analysis for anomalies detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {161--172},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020090},
  doi          = {10.1504/IJSN.2008.020090},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BouhoulaTBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BurtDRTW08,
  author       = {Andrew Burt and
                  Michael Darschewski and
                  Indrajit Ray and
                  Ramakrishna Thurimella and
                  Hailin Wu},
  title        = {Origins: an approach to trace fast spreading worms to their roots},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {36--46},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016200},
  doi          = {10.1504/IJSN.2008.016200},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BurtDRTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChallalGBB08,
  author       = {Yacine Challal and
                  Said Gharout and
                  Abdelmadjid Bouabdallah and
                  Hatem Bettahar},
  title        = {Adaptive clustering for scalable key management in dynamic group communications},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {133--146},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017226},
  doi          = {10.1504/IJSN.2008.017226},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChallalGBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CroninSB08,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  title        = {On the (un)reliability of eavesdropping},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {103--113},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017223},
  doi          = {10.1504/IJSN.2008.017223},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsiehCLCLL08,
  author       = {Cheng{-}Kuan Hsieh and
                  Jyh{-}Cheng Chen and
                  Yi{-}Bing Lin and
                  Kuei{-}Hui Chen and
                  Hsin{-}Yu Liao and
                  Ching{-}Feng Liang},
  title        = {NTP-DownloadT: a conformance test tool for secured mobile download
                  services},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {240--249},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020731},
  doi          = {10.1504/IJSN.2008.020731},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsiehCLCLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuRC08,
  author       = {Fei Hu and
                  Amish Rughoonundon and
                  Laura Celentano},
  title        = {Towards a realistic testbed for wireless network reliability and security
                  performance studies},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {63--77},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016203},
  doi          = {10.1504/IJSN.2008.016203},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KandikattuJ08,
  author       = {Ramanarayana Kandikattu and
                  Lillykutty Jacob},
  title        = {Secure hybrid routing with micro/macro-mobility handoff mechanisms
                  for urban wireless mesh networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {258--274},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020733},
  doi          = {10.1504/IJSN.2008.020733},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KandikattuJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KilpatrickGCPS08,
  author       = {Tim Kilpatrick and
                  Jes{\'{u}}s Gonz{\'{a}}lez and
                  Rodrigo Chandia and
                  Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Forensic analysis of {SCADA} systems and networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {95--102},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017222},
  doi          = {10.1504/IJSN.2008.017222},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KilpatrickGCPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KotzanikolaouVSM08,
  author       = {Panayiotis Kotzanikolaou and
                  Dimitrios D. Vergados and
                  Giannis Stergiou and
                  Emmanouil Magkos},
  title        = {Multilayer key establishment for large-scale sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {1--9},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016197},
  doi          = {10.1504/IJSN.2008.016197},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KotzanikolaouVSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiSW08,
  author       = {Feng Li and
                  Avinash Srinivasan and
                  Jie Wu},
  title        = {{PVFS:} {A} Probabilistic Voting-based Filtering Scheme in Wireless
                  Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {173--182},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020091},
  doi          = {10.1504/IJSN.2008.020091},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiXH08,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {ID-based threshold proxy signcryption scheme from bilinear pairings},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {206--215},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020095},
  doi          = {10.1504/IJSN.2008.020095},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LinLZHS08,
  author       = {Xiaodong Lin and
                  Xinhua Ling and
                  Haojin Zhu and
                  Pin{-}Han Ho and
                  Xuemin Shen},
  title        = {A novel localised authentication scheme in {IEEE} 802.11 based Wireless
                  Mesh Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {122--132},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017225},
  doi          = {10.1504/IJSN.2008.017225},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LinLZHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MaC08,
  author       = {Xiaoqi Ma and
                  Xiaochun Cheng},
  title        = {Verifying security protocols by knowledge analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {183--192},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020092},
  doi          = {10.1504/IJSN.2008.020092},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MaTXD08,
  author       = {Liran Ma and
                  Amin Y. Teymorian and
                  Kai Xing and
                  Ding{-}Zhu Du},
  title        = {An one-way function based framework for pairwise key establishment
                  in sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {217--225},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020729},
  doi          = {10.1504/IJSN.2008.020729},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MaTXD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OkolicaPM08,
  author       = {James S. Okolica and
                  Gilbert L. Peterson and
                  Robert F. Mills},
  title        = {Using {PLSI-U} to detect insider threats by datamining e-mail},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {114--121},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017224},
  doi          = {10.1504/IJSN.2008.017224},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OkolicaPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RayP08,
  author       = {Indrajit Ray and
                  Nayot Poolsappasit},
  title        = {Using mobile ad hoc networks to acquire digital evidence from remote
                  autonomous agents},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {80--94},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017221},
  doi          = {10.1504/IJSN.2008.017221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RayP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SadowitzLW08,
  author       = {Michael Sadowitz and
                  Shahram Latifi and
                  David J. Walker},
  title        = {An iris and retina multimodal biometric system},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {250--257},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020732},
  doi          = {10.1504/IJSN.2008.020732},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SadowitzLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ScheirerC08,
  author       = {Walter J. Scheirer and
                  Mooi Choo Chuah},
  title        = {Syntax vs. semantics: competing approaches to dynamic network intrusion
                  detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {24--35},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016199},
  doi          = {10.1504/IJSN.2008.016199},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ScheirerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanLWL08,
  author       = {Avinash Srinivasan and
                  Feng Li and
                  Jie Wu and
                  Minglu Li},
  title        = {Clique-based group key assignment in Wireless Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {226--239},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020730},
  doi          = {10.1504/IJSN.2008.020730},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanLWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TripathyN08,
  author       = {Somanath Tripathy and
                  Sukumar Nandi},
  title        = {Secure user-identification and key distribution scheme preserving
                  anonymity},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {201--205},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020094},
  doi          = {10.1504/IJSN.2008.020094},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TripathyN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/UphoffW08,
  author       = {Benjamin Uphoff and
                  Johnny S. Wong},
  title        = {An agent-based framework for intrusion detection alert verification
                  and event correlation},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {193--200},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020093},
  doi          = {10.1504/IJSN.2008.020093},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/UphoffW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangKBG08,
  author       = {Weichao Wang and
                  Jiejun Kong and
                  Bharat K. Bhargava and
                  Mario Gerla},
  title        = {Visualisation of wormholes in underwater sensor networks: a distributed
                  approach},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {10--23},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016198},
  doi          = {10.1504/IJSN.2008.016198},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangKBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuAR08,
  author       = {Haiping Xu and
                  Mihir M. Ayachit and
                  Abhinay Reddyreddy},
  title        = {Formal modelling and analysis of {XML} firewall for service-oriented
                  systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {147--160},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020089},
  doi          = {10.1504/IJSN.2008.020089},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuAR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZouK08,
  author       = {Xukai Zou and
                  Yogesh Karandikar},
  title        = {A novel Conference Key Management solution for Secure Dynamic Conferencing},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {47--53},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016201},
  doi          = {10.1504/IJSN.2008.016201},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZouK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbdallaBCMP07,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  title        = {Strong password-based authentication in {TLS} using the three-party
                  group Diffie?Hellman protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {284--296},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013181},
  doi          = {10.1504/IJSN.2007.013181},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ArtanC07,
  author       = {N. Sertac Artan and
                  H. Jonathan Chao},
  title        = {Design and analysis of a multipacket signature detection system},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {122--136},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012830},
  doi          = {10.1504/IJSN.2007.012830},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ArtanC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BhaskarHL07,
  author       = {Raghav Bhaskar and
                  Javier Herranz and
                  Fabien Laguillaumie},
  title        = {Aggregate designated verifier signatures and application to secure
                  routing},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {192--201},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013173},
  doi          = {10.1504/IJSN.2007.013173},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BhaskarHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenJ07,
  author       = {Zesheng Chen and
                  Chuanyi Ji},
  title        = {Optimal worm-scanning method using vulnerable-host distributions},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {71--80},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012826},
  doi          = {10.1504/IJSN.2007.012826},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChengC07,
  author       = {Zhaohui Cheng and
                  Liqun Chen},
  title        = {On security proof of McCullagh?Barreto's key agreement protocol and
                  its variants},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {251--259},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013178},
  doi          = {10.1504/IJSN.2007.013178},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChengC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ErdoganC07,
  author       = {Ozgun Erdogan and
                  Pei Cao},
  title        = {Hash-AV: fast virus signature scanning by cache-resident filters},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {50--59},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012824},
  doi          = {10.1504/IJSN.2007.012824},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ErdoganC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FinniginMRP07,
  author       = {Kevin M. Finnigin and
                  Barry E. Mullins and
                  Richard A. Raines and
                  Henry B. Potoczny},
  title        = {Cryptanalysis of an elliptic curve cryptosystem for wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {260--271},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013179},
  doi          = {10.1504/IJSN.2007.013179},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FinniginMRP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuLCZ07,
  author       = {Qijun Gu and
                  Peng Liu and
                  Chao{-}Hsien Chu and
                  Sencun Zhu},
  title        = {Defence against packet injection in ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {154--169},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012832},
  doi          = {10.1504/IJSN.2007.012832},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HoeperG07,
  author       = {Katrin Hoeper and
                  Guang Gong},
  title        = {Preventing or utilising key escrow in identity-based schemes employed
                  in mobile ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {239--250},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013177},
  doi          = {10.1504/IJSN.2007.013177},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HoeperG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsuZH07,
  author       = {Hung{-}Yuan Hsu and
                  Sencun Zhu and
                  Ali R. Hurson},
  title        = {{LIP:} a lightweight interlayer protocol for preventing packet injection
                  attacks in mobile ad hoc network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {202--215},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013174},
  doi          = {10.1504/IJSN.2007.013174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Huang07,
  author       = {Dijiang Huang},
  title        = {Pseudonym-based cryptography for anonymous communications in mobile
                  ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {272--283},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013180},
  doi          = {10.1504/IJSN.2007.013180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Huang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KorkmazGSD07,
  author       = {Turgay Korkmaz and
                  Chao Gong and
                  Kamil Sara{\c{c}} and
                  Sandra G. Dykes},
  title        = {Single packet {IP} traceback in AS-level partial deployment scenario},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {95--108},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012828},
  doi          = {10.1504/IJSN.2007.012828},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KorkmazGSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiLC07,
  author       = {Ruidong Li and
                  Jie Li and
                  Hsiao{-}Hwa Chen},
  title        = {{DKMS:} distributed hierarchical access control for multimedia networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {3--10},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012821},
  doi          = {10.1504/IJSN.2007.012821},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LingZ07,
  author       = {Hui Ling and
                  Taieb Znati},
  title        = {End-to-end pairwise key establishment using node disjoint secure paths
                  in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {109--121},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012829},
  doi          = {10.1504/IJSN.2007.012829},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LingZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Malaney07,
  author       = {Robert A. Malaney},
  title        = {Securing Wi-Fi networks with position verification: extended version},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {27--36},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012822},
  doi          = {10.1504/IJSN.2007.012822},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Malaney07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MichailPTKG07,
  author       = {Harris E. Michail and
                  George A. Panagiotakopoulos and
                  Vasilis N. Thanasoulis and
                  Athanasios Kakarountas and
                  Costas E. Goutis},
  title        = {Server side hashing core exceeding 3 Gbps of throughput},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {228--238},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013176},
  doi          = {10.1504/IJSN.2007.013176},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MichailPTKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OliveiraWLD07,
  author       = {Leonardo B. Oliveira and
                  Hao Chi Wong and
                  Antonio Alfredo Ferreira Loureiro and
                  Ricardo Dahab},
  title        = {On the design of secure protocols for hierarchical sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {216--227},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013175},
  doi          = {10.1504/IJSN.2007.013175},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OliveiraWLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PanCS07,
  author       = {Jianping Pan and
                  Lin Cai and
                  Xuemin Shen},
  title        = {Vulnerabilities in distance-indexed {IP} traceback schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {81--94},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012827},
  doi          = {10.1504/IJSN.2007.012827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PanCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RabinovichS07,
  author       = {Paul Rabinovich and
                  Robert Simon},
  title        = {Secure message delivery in publish/subscribe networks using overlay
                  multicast},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {60--70},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012825},
  doi          = {10.1504/IJSN.2007.012825},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RabinovichS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SakarindrA07,
  author       = {Pitipatana Sakarindr and
                  Nirwan Ansari},
  title        = {Adaptive trust-based anonymous network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {11--26},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012820},
  doi          = {10.1504/IJSN.2007.012820},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SakarindrA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SunS07,
  author       = {Fangting Sun and
                  Mark A. Shayman},
  title        = {On pairwise connectivity of wireless multihop networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {37--49},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012823},
  doi          = {10.1504/IJSN.2007.012823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SunS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TartaryW07,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  title        = {Efficient multicast stream authentication for the fully adversarial
                  network model},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {175--191},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013172},
  doi          = {10.1504/IJSN.2007.013172},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuFBZ07,
  author       = {Ye Zhu and
                  Xinwen Fu and
                  Riccardo Bettati and
                  Wei Zhao},
  title        = {Analysis of flow-correlation attacks in anonymity network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {137--153},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012831},
  doi          = {10.1504/IJSN.2007.012831},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuFBZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Al-Karaki06,
  author       = {Jamal N. Al{-}Karaki},
  title        = {Analysis of routing security-energy trade-offs in wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {147--157},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011774},
  doi          = {10.1504/IJSN.2006.011774},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Al-Karaki06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AraziQ06,
  author       = {Ortal Arazi and
                  Hairong Qi},
  title        = {Load-balanced key establishment methodologies in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {158--166},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011775},
  doi          = {10.1504/IJSN.2006.011775},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AraziQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenSM06,
  author       = {Yiqun Chen and
                  Willy Susilo and
                  Yi Mu},
  title        = {Convertible identity-based anonymous designated ring signatures},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {218--225},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011781},
  doi          = {10.1504/IJSN.2006.011781},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DengHM06,
  author       = {Jing Deng and
                  Richard Han and
                  Shivakant Mishra},
  title        = {Limiting DoS attacks during multihop data delivery in wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {167--178},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011776},
  doi          = {10.1504/IJSN.2006.011776},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/DengHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EnglundJ06,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  title        = {Three ways to mount distinguishing attacks on irregularly clocked
                  stream ciphers},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {95--102},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010826},
  doi          = {10.1504/IJSN.2006.010826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EvansWE06,
  author       = {Joseph B. Evans and
                  Weichao Wang and
                  Benjamin J. Ewy},
  title        = {Wireless networking security: open issues in trust, management, interoperation
                  and measurement},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {84--94},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010825},
  doi          = {10.1504/IJSN.2006.010825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EvansWE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Franklin06,
  author       = {Matthew K. Franklin},
  title        = {A survey of key evolving cryptosystems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {46--53},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010822},
  doi          = {10.1504/IJSN.2006.010822},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Franklin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HamadehK06,
  author       = {Ihab Hamadeh and
                  George Kesidis},
  title        = {A taxonomy of internet traceback},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {54--61},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010823},
  doi          = {10.1504/IJSN.2006.010823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HwuHLC06,
  author       = {Jing{-}Shyang Hwu and
                  Shih{-}Feng Hsu and
                  Yi{-}Bing Lin and
                  Rong{-}Jaye Chen},
  title        = {End-to-end security mechanisms for {SMS}},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {177--183},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011777},
  doi          = {10.1504/IJSN.2006.011777},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HwuHLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JhumkaFFS06,
  author       = {Arshad Jhumka and
                  Felix C. Freiling and
                  Christof Fetzer and
                  Neeraj Suri},
  title        = {An approach to synthesise safe systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {62--74},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010824},
  doi          = {10.1504/IJSN.2006.010824},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JiangLSS06,
  author       = {Yixin Jiang and
                  Chuang Lin and
                  Minghui Shi and
                  Xuemin Shen},
  title        = {A self-encryption authentication protocol for teleconference services},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {198--205},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011779},
  doi          = {10.1504/IJSN.2006.011779},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/JiangLSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JungG06,
  author       = {Eunjin Jung and
                  Mohamed G. Gouda},
  title        = {Vulnerability analysis of certificate graphs},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {13--23},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010820},
  doi          = {10.1504/IJSN.2006.010820},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JungG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KaryotisPGM06,
  author       = {Vasileios Karyotis and
                  Symeon Papavassiliou and
                  Mary Grammatikou and
                  Vasilis Maglaris},
  title        = {A novel framework for mobile attack strategy modelling and vulnerability
                  analysis in wireless ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {255--265},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011785},
  doi          = {10.1504/IJSN.2006.011785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KaryotisPGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Secure scalable group signature with dynamic joins and separable authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {24--45},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010821},
  doi          = {10.1504/IJSN.2006.010821},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuCM06,
  author       = {Yu Liu and
                  Cristina Comaniciu and
                  Hong Man},
  title        = {Modelling misbehaviour in ad hoc networks: a game theoretic approach
                  for intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {243--254},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011784},
  doi          = {10.1504/IJSN.2006.011784},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OwensL06,
  author       = {Stephen F. Owens and
                  Reuven R. Levary},
  title        = {An adaptive expert system approach for intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {206--217},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011780},
  doi          = {10.1504/IJSN.2006.011780},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OwensL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RamkumarM06,
  author       = {Mahalingam Ramkumar and
                  Nasir D. Memon},
  title        = {Secure collaborations over message boards},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {113--124},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010828},
  doi          = {10.1504/IJSN.2006.010828},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/RamkumarM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShehabBG06,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Workflow authorisation in mediator-free environments},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {2--12},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010819},
  doi          = {10.1504/IJSN.2006.010819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Tan06,
  author       = {Chik How Tan},
  title        = {A new signature scheme without random oracles},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {237--242},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011783},
  doi          = {10.1504/IJSN.2006.011783},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Tan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TeoTN06,
  author       = {Joseph Chee Ming Teo and
                  Chik How Tan and
                  Jim Mee Ng},
  title        = {Low-power authenticated group key agreement for heterogeneous wireless
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {226--236},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011782},
  doi          = {10.1504/IJSN.2006.011782},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TeoTN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Wang06,
  author       = {Xinyuan Wang},
  title        = {The loop fallacy and deterministic serialisation in tracing intrusion
                  connections through stepping stones},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {184--197},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011778},
  doi          = {10.1504/IJSN.2006.011778},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Wang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangSL06,
  author       = {Haodong Wang and
                  Bo Sheng and
                  Qun Li},
  title        = {Elliptic curve cryptography-based access control in sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {127--137},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011772},
  doi          = {10.1504/IJSN.2006.011772},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhengLLA06,
  author       = {Jianliang Zheng and
                  Jie Li and
                  Myung J. Lee and
                  Michael Anshel},
  title        = {A lightweight encryption and authentication scheme for wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {138--146},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011773},
  doi          = {10.1504/IJSN.2006.011773},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhengLLA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuJK06,
  author       = {Bo Zhu and
                  Sushil Jajodia and
                  Mohan S. Kankanhalli},
  title        = {Building trust in peer-to-peer systems: a review},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {103--112},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010827},
  doi          = {10.1504/IJSN.2006.010827},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}