default search action
International Journal of Security and Networks, Volume 12
Volume 12, Number 1, 2017
- Ismeet Kaur Makkar, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp:
SocioBot: a Twitter-based botnet. 1-12 - Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz:
Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach. 13-26 - Avinash Srinivasan, Jie Wu, Justin Y. Shi:
Secure android covert channel with robust survivability to service provider restrictions. 27-39 - Maria Charalampidou, George Pavlidis, Spyridon G. Mouroutsos:
A novel modular wireless sensor networks approach for security applications. 40-50 - Wei Yuan Zhou, Li Jian Chen, Keji Mao, Ming Xia, Ruohong Huan:
A RFID-based prisoner localisation system. 51-55 - Li Jian Chen, Wei Yuan Zhou, Keji Mao, Ming Xia, Ruohong Huan:
A beacon-free localisation algorithm in wireless sensor networks. 56-63
Volume 12, Number 2, 2017
- Junfeng Man, Cheng Peng, Yinghui Ma, Changyun Li:
The network software multistep control algorithm based on NNVD research. 65-69 - Chuah Chai Wen, Ed Dawson, Leonie Simpson:
Stream cipher based key derivation function. 70-82 - Shubair A. Abdulla:
Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms. 83-102 - ZhiQiang Liu, Tong Wang, Xibo Wang:
Destination unaware geometric routing for delay tolerant networks. 103-111 - Xiaojun Deng, Tao Zhang, Xunyu He:
Finishing the tiny flows quickly for common data centre services. 112-119 - Yefeng Ruan, Xukai Zou:
Receipt-freeness and coercion resistance in remote E-voting systems. 120-133
Volume 12, Number 3, 2017
- Cheng Peng, Canqing Zhang, Cheng Peng, Junfeng Man:
A reinforcement learning approach to map reduce auto-configuration under networked environment. 135-140 - Yuxia Shen:
Distributed storage system model design in internet of things based on hash distribution. 141-151 - Guangcheng Zheng:
Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system. 152-167 - Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing:
Insider threat detection and its future directions. 168-187 - Gurdip Kaur, Renu Dhir, Maninder Singh:
Anatomy of ransomware malware: detection, analysis and reporting. 188-197 - BaoHong Li, Baojun Li, Yinliang Zhao:
Generic construction of role-based encryption in the standard model. 198-205
Volume 12, Number 4, 2017
- Zhenhua Wei, Zhifeng Liu, Jie Miao, Lihua Li, Wei Xu:
Configurable workflow platform based on SaaS model. 207-214 - Yingjie Victor Chen, Baijian Yang, Weijie Wang:
NetFlowMatrix: a visual approach for analysing large NetFlow data. 215-229 - Jamal Ghasemi, Jamal Esmaily:
Intrusion detection systems using a hybrid SVD-based feature extraction method. 230-240 - Sumanta Chatterjee, Shashidhar G. Koolagudi:
Hierarchical secret sharing scheme using parts of speech of English grammar. 241-254 - Danny Velasco, Glen Dario Rodriguez Rafael:
A review of the current state of Honeynet architectures and tools. 255-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.