Search Results

There are 11337 results for: content related to: Network specific vulnerability based alert reduction approach

  1. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.331

  2. A Bayesian network-based approach for learning attack strategies from intrusion alerts

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 833–853, Fatemeh Kavousi and Behzad Akbari

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.786

  3. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  4. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  5. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Article first published online : 23 DEC 2014, DOI: 10.1002/sec.1151

  6. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  7. An optimization process to identify outliers generated by intrusion detection systems

    Security and Communication Networks

    Fatma Hachmi, Khadouja Boujenfa and Mohamed Limam

    Article first published online : 1 MAY 2015, DOI: 10.1002/sec.1271

  8. Security and privacy issues for the network of the future

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 987–1005, Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhoener, Antonio Grillo, Alessandro Lentini, Luisa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela and Tiago T. V. Vinhoza

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.384

  9. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Article first published online : 16 JUN 2011, DOI: 10.1002/sec.348

  10. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1087–1116, Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.673

  11. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.581

  12. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  13. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  14. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.911

  15. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  16. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Article first published online : 30 APR 2013, DOI: 10.1002/sec.782

  17. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  18. Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Article first published online : 26 JAN 2012, DOI: 10.1002/sec.401

  19. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  20. Security and trust management in opportunistic networks: a survey

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1812–1827, Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang and Ping Yi

    Article first published online : 18 SEP 2014, DOI: 10.1002/sec.1116