Search Results

There are 1653 results for: content related to: TrustVis: visualizing trust toward attack identification in distributed computing environments

  1. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  2. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  3. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  4. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  5. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  6. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  7. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  8. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  9. Role-based and time-bound access and management of EHR data

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 994–1015, Rui Zhang, Ling Liu and Rui Xue

    Article first published online : 21 JUN 2013, DOI: 10.1002/sec.817

  10. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  11. A game inspired defense mechanism against distributed denial of service attacks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2389–2404, Harkeerat Bedi, Sajjan Shiva and Sankardas Roy

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.949

  12. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  13. A secure cluster-based architecture for certificates management in vehicular networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 665–683, Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi

    Article first published online : 25 APR 2013, DOI: 10.1002/sec.772

  14. A survey on reversible watermarking techniques for relational databases

    Security and Communication Networks

    Saman Iftikhar, M. Kamran and Zahid Anwar

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1196

  15. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  16. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  17. SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2412–2431, Marcos A. Simplicio Jr., Mateus A.S. Santos, Rodrigo R. Leal, Marco A.L. Gomes and Walter A. Goya

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.952

  18. Trust computation for multiple routes recommendation in social network sites

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2258–2276, Bo Zhang, Zhenhua Huang, Jian Yu and Yang Xiang

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.935

  19. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 845–863, Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1041

  20. On false data injection attacks against Kalman filtering in power system dynamic state estimation

    Security and Communication Networks

    Qingyu Yang, Liguo Chang and Wei Yu

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.835