Search Results

There are 10452 results for: content related to: A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks

  1. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 336–356, O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Version of Record online : 9 OCT 2012, DOI: 10.1002/sec.640

  2. Detecting SYN flooding attacks based on traffic prediction

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1131–1140, Shangguang Wang, Qibo Sun, Hua Zou and Fangchun Yang

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.428

  3. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  4. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  5. Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2037–2059, Muhammad Aamir and Syed Mustafa Ali Zaidi

    Version of Record online : 29 OCT 2014, DOI: 10.1002/sec.1149

  6. An intelligent three-phase spam filtering method based on decision tree data mining

    Security and Communication Networks

    Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang and Wei-Pang Yang

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1584

  7. A novel approach for spam email detection based on shifted binary patterns

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1216–1225, Yılmaz Kaya and Ömer Faruk Ertuğrul

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1412

  8. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Version of Record online : 27 JAN 2012, DOI: 10.1002/sec.411

  9. An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 13–24, Lei Jiang, Jianlong Tan and Qiu Tang

    Version of Record online : 10 MAY 2013, DOI: 10.1002/sec.780

  10. A link graph-based approach to identify forum spam

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 176–188, Youngsang Shin, Steven Myers, Minaxi Gupta and Predrag Radivojac

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.970

  11. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  12. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  13. SYN flooding attack detection by TCP handshake anomalies

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 709–724, Martine Bellaïche and Jean-Charles Grégoire

    Version of Record online : 16 AUG 2011, DOI: 10.1002/sec.365

  14. A validated HPLC method for the simultaneous determination of naftidrofuryl oxalate and its degradation product (metabolite), naftidrofuryl acid: applications to pharmaceutical tablets and biological samples

    Drug Testing and Analysis

    Volume 5, Issue 6, June 2013, Pages: 500–508, Suzy M. Sabry, Tarek S. Belal, Magda H. Barary and Mohammed E. A. Ibrahim

    Version of Record online : 28 FEB 2012, DOI: 10.1002/dta.421

  15. Feature engineering for detection of Denial of Service attacks in session initiation protocol

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1587–1601, Hassan Asgharian, Ahmad Akbari and Bijan Raahemi

    Version of Record online : 1 SEP 2014, DOI: 10.1002/sec.1106

  16. HDPE-Fly Ash/Nano Fly Ash Composites

    Journal of Applied Polymer Science

    Volume 130, Issue 6, December 15, 2013, Pages: 4558–4567, Sukanya Satapathy, Golok Bihari Nando, Ahin Nag and K. V. S. N. Raju

    Version of Record online : 27 JUL 2013, DOI: 10.1002/app.39733

  17. Translating Social Motivation Into Action: Contributions of Need for Approval to Children's Social Engagement

    Social Development

    Volume 23, Issue 2, May 2014, Pages: 376–394, Karen D. Rudolph and Lauren E. Bohn

    Version of Record online : 5 AUG 2013, DOI: 10.1111/sode.12050

  18. You have free access to this content
    Dual effect of blocking agents on Ca2+-activated Cl currents in rabbit pulmonary artery smooth muscle cells

    The Journal of Physiology

    Volume 539, Issue 1, February 2002, Pages: 119–131, A. S. Piper, I. A. Greenwood and W. A. Large

    Version of Record online : 22 JUL 2004, DOI: 10.1113/jphysiol.2001.013270

  19. You have free access to this content
    Phosphorylation alters the pharmacology of Ca2+-activated Cl- channels in rabbit pulmonary arterial smooth muscle cells

    British Journal of Pharmacology

    Volume 158, Issue 5, November 2009, Pages: 1356–1365, M Wiwchar, R Ayon, IA Greenwood and N Leblanc

    Version of Record online : 28 SEP 2009, DOI: 10.1111/j.1476-5381.2009.00405.x

  20. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500