


default search action
International Journal of Security and Networks, Volume 11
Volume 11, Numbers 1/2, 2016
- Sharmila Subudhi

, Suvasini Panigrahi:
Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks. 3-11 - Yanan Liu, Lein Harn, Lei Mao, Zhangliang Xiong:

Full-healing group-key distribution in online social networks. 12-24 - Rupesh Nomula, Mayssaa El Rifai, Pramode K. Verma:

Multi-photon tolerant protocols for quantum secure communication in wireless standards. 25-36 - Abhishek Parakh, Pramode K. Verma, Mahadevan Subramaniam:

Improving efficiency of quantum key distribution with probabilistic measurements. 37-47 - Priyanka Dadhich

, Kamlesh Dutta, Mahesh Chandra Govil:
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities. 48-65 - Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu

, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. 66-81 - Geethapriya Thamilarasu:

iDetect: an intelligent intrusion detection system for wireless body area networks. 82-93 - P. Annadurai, S. Yazhini:

Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network. 94-105
Volume 11, Number 3, 2016
- Mohamed Amine Ferrag

, Mehdi Nafa
, Salim Ghanemi:
EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. 107-125 - Zhengping Jin, Qing Wang, Zhongxian Li:

A formal construction of certificateless proxy multi-signature scheme. 126-139 - Kamel Karoui

, Fakher Ben Ftima, Henda Ben Ghézala
:
A framework for firewalls policy representativeness testing based on classification and reversible metrics. 140-159 - Hala Abukhalaf, Jianxin Wang, Shigeng Zhang:

Distance outlier detection with a mobile beacon in wireless sensor networks localisation. 160-166 - Sung-Hyun Baek, Jong-Wook Jang:

Design and implementation of the smart blackbox system. 167-174
Volume 11, Number 4, 2016
- Abubaker Wahaballa

, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. 175-187 - Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:

Keyword search protocol with privacy preservation using ID-based proxy reencryption. 188-195 - Ye Bi:

A hybrid PSO-SVM model for network intrusion detection. 196-203 - Gao Ren, Wang Hui, Zhang Yun:

A multi-channel MAC protocol with power control in the distributed cognitive radio networks. 204-212 - Pranav Subramaniam, Abhishek Parakh:

A quantum Diffie-Hellman protocol. 213-223 - Zesheng Chen, Chao Chen

:
Characterising heterogeneity in vulnerable hosts on worm propagation. 224-234 - Pengju He, Xiaomeng Chen, Huazhi Zeng:

Wireless sensor network for multi-target detection algorithm based on blind source separation. 235-241

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














