- Chia-Mei Chen, Gu Hsin Lai, Zheng-Xun Cai, Tzu-Ching Chang, Boyi Lee:
Detecting PE infection-based malware. Int. J. Secur. Networks 16(3): 191-199 (2021) - Guanlin Chen, Jiapeng Shen, Jiang He, Xu Dai, Wenyong Weng:
An overall analysis method of urban road parking lots based on data mining. Int. J. Secur. Networks 16(2): 105-111 (2021) - Guanlin Chen, Rutao Yao, Gang Chen, Jie Chen, Tian Li:
A smart urban management information public opinion analysis system. Int. J. Secur. Networks 16(2): 92-97 (2021) - El Yazid Dari, Ahmed Bendahmane, Mohamed Essaaidi:
Verification-based data integrity mechanism in smart grid network. Int. J. Secur. Networks 16(1): 1-11 (2021) - El Yazid Dari, Ahmed Bendahmane, Mohamed Essaaidi:
A novel approach for COVID-19 outbreak spread monitoring and control using smart grid technology. Int. J. Secur. Networks 16(2): 112-116 (2021) - Rulin Dou, Xuming Fang, Dandan Huang:
An efficient range-free multi-hop localisation algorithm for irregular wireless sensor networks. Int. J. Secur. Networks 16(1): 37-48 (2021) - Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keong Loo, Mohammad Shadi Al Hakeem:
Formal verification of secondary authentication protocol for 5G secondary authentication. Int. J. Secur. Networks 16(4): 223-234 (2021) - Jinnan Fan, Fabian Willems, Jafar Zahed, John Gray, Serge Mister, Mike Ounsworth, Carlisle Adams:
Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols. Int. J. Secur. Networks 16(3): 200-211 (2021) - Mansoor Farooq, Mubashir Hassan:
IoT smart homes security challenges and solution. Int. J. Secur. Networks 16(4): 235-243 (2021) - Saad Fehis, Omar Nouali, Mohand Tahar Kechadi:
Encryption key management as a trusted security as a service for cloud computing. Int. J. Secur. Networks 16(3): 150-162 (2021) - J. Blessy Annie Flora, Radha Sankararajan, Rajendran Hemalatha, Sukumaran Aasha Nandhini:
Plant disease detection for banana using long range wide area network. Int. J. Secur. Networks 16(2): 129-134 (2021) - Amal Ghorbel, Mahmoud Ghorbel, Mohamed Jmaiel:
A model-based approach for multi-level privacy policies derivation for cloud services. Int. J. Secur. Networks 16(1): 12-27 (2021) - Pynbianglut Hadem, Dilip Kumar Saikia, Soumen Moulik:
I-SMITE: an IP traceback mechanism for inter-AS SDN networks using BGP. Int. J. Secur. Networks 16(3): 163-173 (2021) - Aleksandar Jokic, Sabina Barakovic, Jasmina Barakovic Husic, Jasna Pleho:
Partial rule security information and event management concept in detecting cyber incidents. Int. J. Secur. Networks 16(2): 117-128 (2021) - Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng:
An authorisation certificate-based access control model. Int. J. Secur. Networks 16(4): 258-266 (2021) - Samuel Martínez-Magdaleno, Victor Morales-Rocha, Ramón Parra:
A review of security risks and countermeasures in containers. Int. J. Secur. Networks 16(3): 183-190 (2021) - Preeti Nagrath, Sandhya Aneja, G. N. Purohit:
Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks. Int. J. Secur. Networks 16(2): 77-91 (2021) - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
A secure and privacy-preserving scheme for secure metering and cooperative communication in advanced metering infrastructure of smart grid networks. Int. J. Secur. Networks 16(4): 267-280 (2021) - Rohini Sharma, Ajay Guleria, R. K. Singla:
Flow-based profile generation and network traffic detection for DNS anomalies using optimised entropy-based features selection and modified Holt Winter's method. Int. J. Secur. Networks 16(4): 244-257 (2021) - Matheus Monteiro Silveira, Rafael Lopes Gomes:
IMMI: an architecture integrated for management of modern internet service providers. Int. J. Secur. Networks 16(3): 141-149 (2021) - Sanhua Song:
An effective congestion control scheme based on early offload for space delay/disruption tolerant network. Int. J. Secur. Networks 16(1): 28-36 (2021) - Tala Tafazzoli, Abouzar Arabsorkhi, Amirahmad Chapnevis:
An automated method for detecting suspicious nodes in bitcoin address graph. Int. J. Secur. Networks 16(4): 213-222 (2021) - Xiong Yang, Guangqian Xie, Xiaofang Li:
Identifying influential spreaders in complex networks using neighbourhood coreness and path diversity. Int. J. Secur. Networks 16(3): 174-182 (2021) - Jingchun Zhou, Dehuan Zhang, Weishi Zhang:
Adaptive histogram fusion-based colour restoration and enhancement for underwater images. Int. J. Secur. Networks 16(1): 49-59 (2021) - Changhong Zhu, Ning Xiao:
An algorithm of NLOS error identification and mitigation in mobile location estimation. Int. J. Secur. Networks 16(2): 98-104 (2021) - 2020
- Wesam Almobaideen, Muhyidean Altarawneh:
Fog computing: survey on decoy information technology. Int. J. Secur. Networks 15(2): 111-121 (2020) - Cláudio Alves, Flávia Bernardini, Edwin B. Mitacc Meza, Leandro Sousa:
Evaluating the behaviour of stream learning algorithms for detecting invasion on wireless networks. Int. J. Secur. Networks 15(3): 133-140 (2020) - Mostafa H. Ammar, Ayman A. Abdel-Hamid, Mohamed R. M. Rizk, Magdy A. Ahmed:
A framework for security enhancement in multitenant SDN-based datacentres. Int. J. Secur. Networks 15(4): 183-196 (2020) - Ahmad Azab:
Packing resistant solution to group malware binaries. Int. J. Secur. Networks 15(3): 123-132 (2020) - Sunitha Basodi, Song Tan, WenZhan Song, Yi Pan:
Data integrity attack detection in smart grid: a deep learning approach. Int. J. Secur. Networks 15(1): 15-24 (2020)