Search Results

There are 150926 results for: content related to: Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing

  1. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1553–1576, Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1448

  2. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2802–2815, Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1193

  3. Analysis of existing remote attestation techniques

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 1062–1082, Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan and Khaled Alghathbar

    Version of Record online : 7 OCT 2011, DOI: 10.1002/sec.393

  4. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  5. A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2171–2188, Hailun Tan, Wen Hu and Sanjay Jha

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1162

  6. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  7. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  8. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  9. A smart fuzzing method for detecting heap-based vulnerabilities in executable codes

    Security and Communication Networks

    Maryam Mouzarani, Babak Sadeghiyan and Mohammad Zolfaghari

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1681

  10. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  11. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  12. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  13. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  14. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  15. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  16. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.937

  17. A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks

    Security and Communication Networks

    Maryam Asadzadeh Kaljahi and Mohsen Jahanshahi

    Version of Record online : 22 NOV 2016, DOI: 10.1002/sec.1691

  18. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  19. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  20. Computer operating system logging and security issues: a survey

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4804–4821, Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1677