Search Results

There are 10835 results for: content related to: Structurized grammar-based fuzz testing for programs with highly structured inputs

  1. IKE vulnerability discovery based on fuzzing

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 889–901, Huan Yang, Yuqing Zhang, Yu-pu Hu and Qi-xu Liu

    Version of Record online : 7 NOV 2012, DOI: 10.1002/sec.628

  2. A smart fuzzing method for detecting heap-based vulnerabilities in executable codes

    Security and Communication Networks

    Maryam Mouzarani, Babak Sadeghiyan and Mohammad Zolfaghari

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1681

  3. An approach of security testing for third-party component based on state mutation

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2827–2842, Jinfu Chen, Jiamei Chen, Rubing Huang, Yuchi Guo and Yongzhao Zhan

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1189

  4. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  5. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  6. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  7. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  8. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  9. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  10. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  11. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  12. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  13. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.937

  14. A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks

    Security and Communication Networks

    Maryam Asadzadeh Kaljahi and Mohsen Jahanshahi

    Version of Record online : 22 NOV 2016, DOI: 10.1002/sec.1691

  15. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.782

  16. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  17. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  18. Computer operating system logging and security issues: a survey

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4804–4821, Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1677

  19. A survey on cloud forensics challenges and solutions

    Security and Communication Networks

    Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis and Haralambos Mouratidis

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1688

  20. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2750–2767, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.603