


default search action
Journal of Internet Services and Information Security, Volume 5
Volume 5, Number 1, February 2015
- Mario Bravetti, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi:

Guest Editorial: Special Issue on Service-Oriented Architectures and Programming. 1-2 - Nuno Oliveira, Alexandra Silva, Luís Soares Barbosa:

IMCReo: interactive Markov chains for Stochastic Reo. 3-28 - Carlos Parra, Diego Joya:

SPLIT: An Automated Approach for Enterprise Product Line Adoption Through SOA. 29-52 - Sushama Karumanchi, Anna Cinzia Squicciarini:

A Large Scale Study of Web Service Vulnerabilities. 53-69 - Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese:

Investigating the leakage of sensitive personal and organisational information in email headers. 70-84
Volume 5, Number 2, May 2015
- Carol J. Fung, Weverton Cordeiro:

Guest Editorial: Special issue on Next Generation Networks and Systems Security. 1-3 - David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu

:
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing. 4-23 - Mehrdad Nojoumian, Douglas R. Stinson:

Sequential Secret Sharing as a New Hierarchical Access Structure. 24-32 - Bahman Rashidi, Carol J. Fung:

Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model. 33-46 - Jiwan Ninglekhu, Ram Krishnan, Eugene John, Manoj Panday:

Securing Implantable Cardioverter Defibrillators Using Smartphones. 47-64
Volume 5, Number 3, August 2015
- M. Devipriya, Nithya Balasubramanian, C. Mala:

Hashing Based Distributed Backoff (HBDB) Mechanism for IEEE 802.11 Wireless Networks. 1-18 - Parisa Kaghazgaran, Hassan Takabi:

Toward an Insider Threat Detection Framework Using Honey Permissions. 19-36 - Sooyeon Shin, Taekyoung Kwon:

A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage. 37-47 - Yong-Hwan Lee, Hyochang Ahn, Han-Jin Cho, June-Hwan Lee:

Object Recognition and Tracking based on Object Feature Extracting. 48-57 - Todd Booth, Karl Andersson:

Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks. 58-79
Volume 5, Number 4, November 2015
- Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng:

Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA. 1-19 - Kazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:

Construction of a Mega Disaster Crisis Management System. 20-40 - Cihan Tunc, Salim Hariri:

CLaaS: Cybersecurity Lab as a Service. 41-59 - Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko:

Methodological Primitives for Phased Construction of Data Visualization Models. 60-84 - Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:

Anomaly Behavior Analysis of DNS Protocol. 85-97

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














