Search Results

There are 6775 results for: content related to: Classifying malicious activities in Honeynets using entropy and volume-based thresholds

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  3. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.937

  4. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  5. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  6. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  7. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  8. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric

    Security and Communication Networks

    Monowar H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1530

  9. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.591

  10. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 248–261, Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.544

  11. Trust modeling for message relay control and local action decision making in VANETs

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 1–14, Jie Zhang, Chen Chen and Robin Cohen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.519

  12. An adaptable and scalable membership management for the iTrust information search and retrieval system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3492–3510, Yung-Ting Chuang

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1273

  13. JSOD: JavaScript obfuscation detector

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1092–1107, Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho and Shyi-Ming Chen

    Version of Record online : 1 JUL 2014, DOI: 10.1002/sec.1064

  14. Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.862

  15. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process

    Security and Communication Networks

    Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham and Chamseddine Talhi

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1555

  16. SDRP: a secure distributed revocation protocol for vehicular environments

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 279–289, Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi and Abderrahmane Lakas

    Version of Record online : 30 MAY 2012, DOI: 10.1002/sec.561

  17. A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1958–1970, Kostas Giotis, George Androulidakis and Vasilis Maglaris

    Version of Record online : 2 OCT 2015, DOI: 10.1002/sec.1368

  18. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  19. An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.957

  20. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597