Search Results

There are 2202 results for: content related to: A framework for intrusion detection system in advanced metering infrastructure

  1. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  2. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

    Security and Communication Networks

    Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Stefan Kraxberger and Clemens Orthacker

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.675

  3. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.603

  4. Spammers operations: a multifaceted strategic analysis

    Security and Communication Networks

    O. Thonnard, Pierre-Antoine Vervier and M. Dacier

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.640

  5. Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 797–811, Mansour Sheikhan and Maryam Sharifi Rad

    Article first published online : 13 AUG 2012, DOI: 10.1002/sec.609

  6. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.625

  7. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  8. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1087–1116, Nor Badrul Anuar, Maria Papadaki, Steven Furnell and Nathan Clarke

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.673

  9. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  10. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  11. BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 123–138, Alper Kanak and Ibrahim Sogukpinar

    Article first published online : 5 OCT 2012, DOI: 10.1002/sec.626

  12. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  13. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Article first published online : 16 JUN 2011, DOI: 10.1002/sec.348

  14. Virtual flow-net for accountability and forensics of computer and network systems

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2509–2526, Daisuke Takahashi, Yang Xiao and Ke Meng

    Article first published online : 27 DEC 2011, DOI: 10.1002/sec.407

  15. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  16. User-centric secure integration of personal RFID tags and sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1177–1197, Pablo Najera, Rodrigo Roman and Javier Lopez

    Article first published online : 19 FEB 2013, DOI: 10.1002/sec.684

  17. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  18. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  19. Defending return-oriented programming based on virtualization techniques

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1236–1249, Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang and Peng Liu

    Article first published online : 30 JAN 2013, DOI: 10.1002/sec.693

  20. Semantic aware attribution analysis of remote exploits

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 818–832, Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu and Dinghao Wu

    Article first published online : 19 SEP 2012, DOI: 10.1002/sec.613