Search Results

There are 9967 results for: content related to: A novel path-based approach for single-packet IP traceback

  1. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  2. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Detecting and mitigating interest flooding attacks in content-centric network

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 685–699, Kai Wang, Huachun Zhou, Hongbin Luo, Jianfeng Guan, Yajuan Qin and Hongke Zhang

    Article first published online : 10 APR 2013, DOI: 10.1002/sec.770

  4. Efficient identity-based hierarchical access authentication protocol for mobile network

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1509–1521, He Liu and Mangui Liang

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.412

  5. A secure mobility support scheme for 6LoWPAN wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 641–652, Xiaonan Wang and Yi Mu

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.765

  6. Secured and fast handoff in wireless mesh networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 644–657, Faouzi Zarai, Ikbel Daly, Mohammad S. Obaidat, Fellow of IEEE, Fellow of SCS and Lotfi Kamoun

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.596

  7. CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 532–543, Novarun Deb, Manali Chakraborty and Nabendu Chaki

    Article first published online : 12 MAR 2013, DOI: 10.1002/sec.750

  8. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.730

  9. Tor traffic analysis using Hidden Markov Models

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1075–1086, Sami Zhioua

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.669

  10. On decentralized group key management mechanism for vehicular ad hoc networks

    Security and Communication Networks

    Ming-Huang Guo, Horng-Twu Liaw, Meng-Yu Chiu and Der-Jiunn Deng

    Article first published online : 4 JUN 2012, DOI: 10.1002/sec.541

  11. QoS2: a framework for integrating quality of security with quality of service

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1462–1470, Tarik Taleb and Yassine Hadjadj-Aoul

    Article first published online : 29 FEB 2012, DOI: 10.1002/sec.523

  12. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.591

  13. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.937

  14. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  15. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  16. Detecting SYN flooding attacks based on traffic prediction

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1131–1140, Shangguang Wang, Qibo Sun, Hua Zou and Fangchun Yang

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.428

  17. The design of conditional access mechanism for ubiquitous video on demand services

    Security and Communication Networks

    Yu-Yi Chen, Der-Chen Huang and Meng-Lin Tsai

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.381

  18. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Padmini Jaikumar and Avinash C. Kak

    Article first published online : 28 FEB 2012, DOI: 10.1002/sec.500

  19. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  20. SYN flooding attack detection by TCP handshake anomalies

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 709–724, Martine Bellaïche and Jean-Charles Grégoire

    Article first published online : 16 AUG 2011, DOI: 10.1002/sec.365