Search Results

There are 1606 results for: content related to: Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks

  1. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  2. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  5. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  6. Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1292–1309, Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee and Ki-Hyung Kim

    Article first published online : 13 MAY 2014, DOI: 10.1002/sec.1023

  7. Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators

    Security and Communication Networks

    Hiroshi Fujinoki

    Article first published online : 25 MAR 2015, DOI: 10.1002/sec.1231

  8. On steganography in lost audio packets

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2602–2615, Wojciech Mazurczyk, Józef Lubacz and Krzysztof Szczypiorski

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.388

  9. Minimizing insider misuse through secure Identity Management

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 847–862, Ludwig Fuchs and Günther Pernul

    Article first published online : 25 FEB 2011, DOI: 10.1002/sec.314

  10. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  11. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025

  12. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 929–943, Arpan Roy, Dong Seong Kim and Kishor S. Trivedi

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.299

  13. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.937

  14. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.764

  15. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.603

  16. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  17. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.625

  18. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  19. Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Article first published online : 26 JAN 2012, DOI: 10.1002/sec.401

  20. Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks

    Security and Communication Networks

    Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams and Jaime Lloret

    Article first published online : 4 FEB 2015, DOI: 10.1002/sec.1204