


default search action
International Journal of Security and Networks, Volume 10
Volume 10, Number 1, 2015
- Alaa Eddien Abdallah, Emad Eddien Abdallah

, Mohammad Bsoul, Ahmad Al-Khasawneh
, Lina Amer:
A blind 3D watermarking technique using spherical coordinates and skewness measure. 1-8 - Bhawana Rudra, O. P. Vyas:

Understanding and mitigating security and authentication issues in service oriented network architecture. 9-19 - Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad:

A system-wide anonymity metric with message multiplicities. 20-31 - Arshi Agrawal, Mark Stamp

:
Masquerade detection on GUI-based Windows systems. 32-41 - Alex Ming Hui Wong, Dae-Ki Kang:

Game layout and artificial intelligence implementation in mobile 3D tower defence game. 42-47 - Jongdeug Kim, Taehyun Jeon:

Efficient resource allocation for mobile instant messaging service in wireless network. 48-55 - Ki Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo-Seok Choi, Sang-Bong Park, Yun Sik Lim, Jeong Jin Kang:

Spatio-temporal XACML: the expansion of XACML for access control. 56-63
Volume 10, Number 2, 2015
- N. M. Saravana Kumar

, S. Lavanya
:
A novel scheme for secure group communication in multicast network. 65-75 - Jai-Pil Oh, Dong Ho Kim:

System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service. 76-83 - Inkyoo Park, Jongjin Park, Gyoo-Seok Choi:

Using Bayesian posterior probability in confidence of attributes for feature selection. 84-90 - Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao

:
Network forensics analysis using Wireshark. 91-106 - Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari

:
Chain reduction of authorisation certificates. 107-123 - Jared Lee, Thomas H. Austin

, Mark Stamp
:
Compression-based analysis of metamorphic malware. 124-136
Volume 10, Number 3, 2015
- Giuseppe Ateniese

, Luigi V. Mancini, Angelo Spognardi
, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. 137-150 - Jingcheng Gao, Yang Xiao

, Sneha Rao, Fnu Shalini:
Security tests and attack experimentations of ProtoGENI. 151-169 - Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath:

Accurate geolocation using network coordinates. 170-182 - Mohammed Amin Benamara, Huixian Li:

Secure of personal health records shared in cloud computing using cipher-text attribute based encryption. 183-190 - Mohamed Sarrab

:
Bytecode instrumentation mechanism for monitoring mobile application information flow. 191-206
Volume 10, Number 4, 2015
- Zuhua Guo, Lixin Xu:

Research of security structure model for web application systems based on the relational database. 207-213 - Yucai Zhou, Tong Wang, Xinlin Zhao:

A hybrid recommendation algorithm based on time factor. 214-221 - Tong Wang, Xinlin Zhao, Yucai Zhou:

Community detection in social network using shuffled frog-leaping optimisation. 222-227 - Zhiming Zhang, Fuying Wu, Changgen Jiang, Jiangang Deng:

An efficient detection scheme of node replication attacks for wireless sensor networks. 228-238 - Fnu Shalini, Yang Xiao

, Bo Sun:
ProtoGENI experiments. 239-254 - Jian Huang:

Research on optimisation and application of improved fuzzy neural network control algorithm. 255-260 - Myungseok Song, Jun-Dong Cho

, Jongpil Jeong
:
Random-walk mobility management scheme for sensor-based mobile networks. 261-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














