Search Results

There are 2761 results for: content related to: A potential low-rate DoS attack against network firewalls

  1. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Article first published online : 24 JAN 2011, DOI: 10.1002/sec.307

  2. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  3. A game inspired defense mechanism against distributed denial of service attacks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2389–2404, Harkeerat Bedi, Sajjan Shiva and Sankardas Roy

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.949

  4. TCP SYN-based DDoS attack on EKG signals monitored via a wireless sensor network

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1448–1460, Einar Petana and Sanjeev Kumar

    Article first published online : 10 JAN 2011, DOI: 10.1002/sec.275

  5. Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1044–1062, Hai-Cheng Chu, Der-Jiunn Deng and Han-Chieh Chao

    Article first published online : 15 JUL 2010, DOI: 10.1002/sec.233

  6. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  7. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  8. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  9. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  10. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  11. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  12. Impact of denial of service solutions on network quality of service

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1089–1103, Scott Fowler, Sherali Zeadally and Naveen Chilamkurti

    Article first published online : 26 JUL 2010, DOI: 10.1002/sec.219

  13. Using an autonomous robot to maintain privacy in assistive environments

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1275–1293, Christopher Armbrust, Syed Atif Mehdi, Max Reichardt, Jan Koch and Karsten Berns

    Article first published online : 8 FEB 2011, DOI: 10.1002/sec.253

  14. A proactive approach to intrusion detection and malware collection

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 844–853, Chia-Mei Chen, Sheng-Tzong Cheng and Ruei-Yu Zeng

    Article first published online : 8 OCT 2012, DOI: 10.1002/sec.619

  15. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  16. Classifying malicious activities in Honeynets using entropy and volume-based thresholds

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 567–583, Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah and Marwan Abu-Amara

    Article first published online : 3 JUL 2012, DOI: 10.1002/sec.575

  17. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Article first published online : 12 MAR 2014, DOI: 10.1002/sec.978

  18. Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1169–1180, Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou and Qin Zhang

    Article first published online : 29 MAR 2012, DOI: 10.1002/sec.423

  19. The defense in-depth approach to the protection for browsing users against drive-by cache attacks

    Security and Communication Networks

    Yeu-Pong Lai and Wei-Feng Wu

    Article first published online : 10 OCT 2014, DOI: 10.1002/sec.1091

  20. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411