Search Results

There are 1481 results for: content related to: Physical layer security in wireless smart grid

  1. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  2. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  3. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Article first published online : 17 JUL 2013, DOI: 10.1002/sec.809

  4. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  5. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  6. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  7. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  8. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  9. Virtual flow-net for accountability and forensics of computer and network systems

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2509–2526, Daisuke Takahashi, Yang Xiao and Ke Meng

    Article first published online : 27 DEC 2011, DOI: 10.1002/sec.407

  10. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Article first published online : 16 JUN 2011, DOI: 10.1002/sec.348

  11. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  12. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  13. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  14. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  15. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.911

  16. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  17. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  18. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.937

  19. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  20. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Article first published online : 30 APR 2013, DOI: 10.1002/sec.782