Search Results

There are 909 results for: content related to: A security authentication scheme in machine-to-machine home network service

  1. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  2. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1087–1116, Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.673

  3. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  4. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  5. Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 797–811, Mansour Sheikhan and Maryam Sharifi Rad

    Article first published online : 13 AUG 2012, DOI: 10.1002/sec.609

  6. Policy override in practice: model, evaluation, and decision support

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 139–156, Steffen Bartsch

    Article first published online : 16 MAY 2012, DOI: 10.1002/sec.547

  7. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  8. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  9. Survey on network-based botnet detection methods

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 878–903, Sebastián García, Alejandro Zunino and Marcelo Campo

    Article first published online : 21 JUN 2013, DOI: 10.1002/sec.800

  10. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  11. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Article first published online : 17 JUL 2013, DOI: 10.1002/sec.809

  12. Elliptic-curve scalar multiplication algorithm using ZOT structure

    Security and Communication Networks

    Hani Almimi, Azman Samsudin and Shahram Jahani

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1047

  13. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.597

  14. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.603

  15. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  16. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  17. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Santanu Chatterjee and Ashok Kumar Das

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1140

  18. Filtering location optimization for the reactive packet filtering

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1150–1164, Ning Lu, Yulong Wang, Sen Su, Fangchun Yang and Rui Han

    Article first published online : 19 JUL 2013, DOI: 10.1002/sec.848

  19. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  20. Improving intrusion detection for imbalanced network traffic

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 309–324, Ciza Thomas

    Article first published online : 10 JUL 2012, DOI: 10.1002/sec.564