Search Results

There are 18592 results for: content related to: Secure socket layer certificate verification: a learning automata approach

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. TSSL: improving SSL/TLS protocol by trust model

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1659–1671, Maryam Asadzadeh Kaljahi, Ali Payandeh and Mohammad Bagher Ghaznavi-Ghoushchi

    Version of Record online : 21 SEP 2014, DOI: 10.1002/sec.1113

  3. The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 113–124, Wassim El-Hajj

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.295

  4. MREA: a minimum resource expenditure node capture attack in wireless sensor networks

    Security and Communication Networks

    Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang Wu Yu, Lin Yao and Guowei Wu

    Version of Record online : 9 DEC 2016, DOI: 10.1002/sec.1713

  5. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  6. A robust cryptographic-based system for secure data sharing in cloud environments

    Security and Communication Networks

    Ibrahim M. Mahmoud, Sherif H. Nour El-Din, Rania Elgohary, Hossam Faheem and Mostafa G. M. Mostafa

    Version of Record online : 9 FEB 2017, DOI: 10.1002/sec.1770

  7. Novel secure VPN architectures for LTE backhaul networks

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1198–1215, Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila and Andrei Gurtov

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1411

  8. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  9. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  10. Research Trends in Security and DDoS in SDN

    Security and Communication Networks

    Neelam Dayal, Prasenjit Maity, Shashank Srivastava and Rahamatullah Khondoker

    Version of Record online : 9 FEB 2017, DOI: 10.1002/sec.1759

  11. Intrusion detection alert management for high-speed networks: current researches and applications

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4362–4372, Hassen Sallay and Sami Bourouis

    Version of Record online : 15 SEP 2015, DOI: 10.1002/sec.1366

  12. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  13. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  14. A new secure and efficient scheme for network mobility management

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1360–1377, Salima Smaoui, Mohammad S. Obaidat, Faouzi Zarai and K. F. Hsiao

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1090

  15. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  16. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  17. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  18. Trust coercion in the name of usable public key infrastructure

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1734–1745, Dimitrios Zissis and Dimitrios Lekkas

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.870

  19. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  20. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.937