Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2.0 - General

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
page 896 - 920
Vol.22 / Issue 12
A.A. Al-Saggaf:
Secure Method for Combining Cryptography with Iris Biometrics
page 341 - 356
Vol.24 / Issue 4
T. Andrysiak, Ł. Saganowski:
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis
page 508 - 527
Vol.26 / Issue 4
F.A. Azzedin:
Classifying and Tracking Free Riders in Multimedia-Based Systems
page 1368 - 1387
Vol.16 / Issue 10
J. Bieniasz, K. Szczypiorski:
Methods for Information Hiding in Open Social Networks
page 74 - 97
Vol.25 / Issue 2
J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
page 1109 - 1130
Vol.25 / Issue 9
B. Bobowska, M. Choraś, M. Woźniak:
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity
page 622 - 633
Vol.24 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
page 4 - 31
Vol.13 / Issue 1
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties
page 591 - 610
Vol.25 / Issue 6
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
page 528 - 546
Vol.26 / Issue 4
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
page 2437 - 2452
Vol.19 / Issue 16
C.-L. Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
page 488 - 504
Vol.15 / Issue 2
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
page 2453 - 2471
Vol.19 / Issue 16
B. Flinn, H. Maurer:
Levels of Anonymity
page 35 - 47
Vol.1 / Issue 1
W. Frączek, W. Mazurczyk, K. Szczypiorski:
Multilevel Steganography: Improving Hidden Communication in Networks
page 1967 - 1986
Vol.18 / Issue 14
S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal:
Adaptive Group Key Management Protocol for Wireless Communications
page 874 - 898
Vol.18 / Issue 6
J.M. Gimenez-Guzman, M.J. Domenech-Benlloch, V. Pla, V. Casares-Giner, J. Martinez-Bauset:
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
page 1597 - 1624
Vol.14 / Issue 10
W. Graniszewski, J. Krupski, K. Szczypiorski:
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
page 864 - 891
Vol.24 / Issue 7
H. Hlavacs, W. Gansterer, H. Schabauer, J. Zottl, M. Petraschek, T. Hoeher, O. Jung:
Enhancing ZRTP by using Computational Puzzles
page 693 - 716
Vol.14 / Issue 5
D. Won-Kyu Hong, C. Seon Hong, Y. Jae Hyoung, D.-S. Yun, W.-S. Kim:
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
page 698 - 721
Vol.8 / Issue 7
M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme
page 245 - 269
Vol.25 / Issue 3
I.R. Jeong, D.H. Lee:
Parallel Key Exchange
page 377 - 396
Vol.14 / Issue 3
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
page 83 - 103
Vol.11 / Issue 1
I. Joe Khor, J. Thomas, I. Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
page 37 - 55
Vol.11 / Issue 1
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
page 444 - 464
Vol.15 / Issue 2
L. Krammer, W. Kastner, T. Sauter:
A Comprehensive Dependability Approach for Building Automation Networks
page 1225 - 1248
Vol.22 / Issue 9
G.R. Kumar, N. Mangathayaru, G. Narsimha:
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
page 589 - 604
Vol.22 / Issue 4
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
page 1042 - 1064
Vol.15 / Issue 5
Y. Lakhdhar, S. Rekhis, N. Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
page 1066 - 1088
Vol.25 / Issue 9
J. Luo, X. Wang, M. Yang:
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme
page 1797 - 1811
Vol.15 / Issue 9
S. Ahmad Madani, D. Weber, S. Mahlknecht:
Position-based Routing Protocol for Low Power Wireless Sensor Networks
page 1215 - 1233
Vol.16 / Issue 9
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
page 857 - 873
Vol.18 / Issue 6
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
page 56 - 86
Vol.13 / Issue 1
S. Pal:
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
page 1594 - 1634
Vol.21 / Issue 12
Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs
page 2385 - 2403
Vol.19 / Issue 16
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek:
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
page 992 - 1006
Vol.15 / Issue 5
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
page 1249 - 1273
Vol.22 / Issue 9
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
page 347 - 376
Vol.14 / Issue 3
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
page 3299 - 3313
Vol.16 / Issue 21
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
page 1605 - 1622
Vol.17 / Issue 11
B. Santoso, C. Su:
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
page 294 - 308
Vol.25 / Issue 3
A.U. Schmidt:
On the Superdistribution of Digital Goods
page 401 - 425
Vol.15 / Issue 2
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
page 1343 - 1367
Vol.16 / Issue 10
S. Soursos, C. Courcoubetis, R. Weber:
Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games
page 766 - 785
Vol.14 / Issue 5
H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
page 1131 - 1150
Vol.25 / Issue 9
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
page 2920 - 3006
Vol.18 / Issue 20
X. Wang, L. Xu, S. Zhou, J.K. Liu:
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks
page 384 - 405
Vol.21 / Issue 3
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
page 521 - 536
Vol.22 / Issue 4
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille:
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
page 30 - 44
Vol.12 / Issue 1