Search Results

There are 2428 results for: content related to: Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model

  1. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  3. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  4. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.730

  5. Context-aware usage control for web of things

    Security and Communication Networks

    Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  6. Modeling tools for detecting DoS attacks in WSNs

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 420–436, Paolo Ballarini, Lynda Mokdad and Quentin Monnet

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.630

  7. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  8. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  9. SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games

    Security and Communication Networks

    Marcos A. Simplicio Jr., Mateus A.S. Santos, Rodrigo R. Leal, Marco A.L. Gomes and Walter A. Goya

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.952

  10. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  11. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  12. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  13. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  14. A game inspired defense mechanism against distributed denial of service attacks

    Security and Communication Networks

    Harkeerat Bedi, Sajjan Shiva and Sankardas Roy

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.949

  15. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.597

  16. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 612–630, Jingqiang Lin, Peng Liu, Jiwu Jing and Qiongxiao Wang

    Article first published online : 13 NOV 2012, DOI: 10.1002/sec.593

  17. Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 797–811, Mansour Sheikhan and Maryam Sharifi Rad

    Article first published online : 13 AUG 2012, DOI: 10.1002/sec.609

  18. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  19. You have free access to this content
    Policy override in practice: model, evaluation, and decision support

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 139–156, Steffen Bartsch

    Article first published online : 16 MAY 2012, DOI: 10.1002/sec.547

  20. C2Detector: a covert channel detection framework in cloud computing

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 544–557, Jingzheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah, Samee U. Khan and Yongji Wang

    Article first published online : 8 MAY 2013, DOI: 10.1002/sec.754