Search Results

There are 59388 results for: content related to: TrustVis: visualizing trust toward attack identification in distributed computing environments

  1. What you see predicts what you get—lightweight agent-based malware detection

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 33–48, Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart and Gang Xu

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.528

  2. Network specific vulnerability based alert reduction approach

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 15–27, Humphrey Waita Njogu, Luo Jiawei and Jane Nduta Kiere

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.520

  3. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  4. A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3724–3751, Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  5. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  6. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  7. Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 49–57, Xixiang Lv, Hui Li and Baocang Wang

    Version of Record online : 9 MAY 2012, DOI: 10.1002/sec.529

  8. Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1050–1071, Tonko Kovačević, Toni Perković and Mario Čagalj

    Version of Record online : 18 DEC 2015, DOI: 10.1002/sec.1400

  9. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  10. An unknown malware detection scheme based on the features of graph

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 239–246, Zongqu Zhao, Junfeng Wang and Chonggang Wang

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.524

  11. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  12. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  13. A game inspired defense mechanism against distributed denial of service attacks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2389–2404, Harkeerat Bedi, Sajjan Shiva and Sankardas Roy

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.949

  14. Research Trends in Security and DDoS in SDN

    Security and Communication Networks

    Neelam Dayal, Prasenjit Maity, Shashank Srivastava and Rahamatullah Khondoker

    Version of Record online : 9 FEB 2017, DOI: 10.1002/sec.1759

  15. QoS2: a framework for integrating quality of security with quality of service

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1462–1470, Tarik Taleb and Yassine Hadjadj-Aoul

    Version of Record online : 29 FEB 2012, DOI: 10.1002/sec.523

  16. A survey of accountability in computer networks and distributed systems

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 290–315, Zhifeng Xiao, Nandhakumar Kathiresshan and Yang Xiao

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.574

  17. STaR: design and quantitative measurement of source-location privacy for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 220–228, Leron Lightfoot, Yun Li and Jian Ren

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.527

  18. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  19. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  20. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 23 OCT 2014, DOI: 10.1002/sec.1139