Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS
Topic C.2.0 - General

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
/jucs_22_7/a_semantically_enhanced_service
page 896 - 920
Vol.22 / Issue 12
A.A. Al-Saggaf:
Secure Method for Combining Cryptography with Iris Biometrics
/jucs_24_4/secure_method_for_combining
page 341 - 356
Vol.24 / Issue 4
T. Andrysiak, Ł. Saganowski:
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis
/jucs_26_4/anomaly_detection_for_smart
page 508 - 527
Vol.26 / Issue 4
F.A. Azzedin:
Classifying and Tracking Free Riders in Multimedia-Based Systems
/jucs_16_10/classifying_and_tracking_free
page 1368 - 1387
Vol.16 / Issue 10
J. Bieniasz, K. Szczypiorski:
Methods for Information Hiding in Open Social Networks
/jucs_25_2/methods_for_information_hiding
page 74 - 97
Vol.25 / Issue 2
J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
/jucs_25_9/mobile_agents_for_detecting
page 1109 - 1130
Vol.25 / Issue 9
B. Bobowska, M. Choraś, M. Woźniak:
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity
/jucs_24_5/advanced_analysis_of_data
page 622 - 633
Vol.24 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
/jucs_13_1/duplicate_address_detection_and
page 4 - 31
Vol.13 / Issue 1
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties
/jucs_25_6/impact_of_resource_control
page 591 - 610
Vol.25 / Issue 6
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski:
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
/jucs_26_4/analysis_of_the_possibility
page 528 - 546
Vol.26 / Issue 4
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
/jucs_19_16/security_issues_and_attacks
page 2437 - 2452
Vol.19 / Issue 16
C.-L. Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
/jucs_15_2/a_new_detection_method
page 488 - 504
Vol.15 / Issue 2
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
/jucs_19_16/observations_of_skipjack_like
page 2453 - 2471
Vol.19 / Issue 16
B. Flinn, H. Maurer:
Levels of Anonymity
/jucs_1_1/levels_of_anonymity
page 35 - 47
Vol.1 / Issue 1
W. Frączek, W. Mazurczyk, K. Szczypiorski:
Multilevel Steganography: Improving Hidden Communication in Networks
/jucs_18_14/multilevel_steganography_improving_hidden
page 1967 - 1986
Vol.18 / Issue 14
S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal:
Adaptive Group Key Management Protocol for Wireless Communications
/jucs_18_6/adaptive_group_key_management
page 874 - 898
Vol.18 / Issue 6
J.M. Gimenez-Guzman, M.J. Domenech-Benlloch, V. Pla, V. Casares-Giner, J. Martinez-Bauset:
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
/jucs_14_10/guaranteeing_seamless_mobility_with
page 1597 - 1624
Vol.14 / Issue 10
W. Graniszewski, J. Krupski, K. Szczypiorski:
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
/jucs_24_7/somsteg_framework_for_covert
page 864 - 891
Vol.24 / Issue 7
H. Hlavacs, W. Gansterer, H. Schabauer, J. Zottl, M. Petraschek, T. Hoeher, O. Jung:
Enhancing ZRTP by using Computational Puzzles
/jucs_14_5/enhancing_zrtp_by_using
page 693 - 716
Vol.14 / Issue 5
D. Won-Kyu Hong, C. Seon Hong, Y. Jae Hyoung, D.-S. Yun, W.-S. Kim:
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
/jucs_8_7/bounded_flooding_routing_algorithm
page 698 - 721
Vol.8 / Issue 7
M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme
/jucs_25_3/cca_secure_deterministic_identity
page 245 - 269
Vol.25 / Issue 3
I.R. Jeong, D.H. Lee:
Parallel Key Exchange
/jucs_14_3/parallel_key_exchange
page 377 - 396
Vol.14 / Issue 3
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
/jucs_11_1/protomon_embedded_monitors_for
page 83 - 103
Vol.11 / Issue 1
I. Joe Khor, J. Thomas, I. Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
/jucs_11_1/sliding_window_protocol_for
page 37 - 55
Vol.11 / Issue 1
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
/jucs_15_2/stability_in_heterogeneous_multimedia
page 444 - 464
Vol.15 / Issue 2
L. Krammer, W. Kastner, T. Sauter:
A Comprehensive Dependability Approach for Building Automation Networks
/jucs_22_9/a_comprehensive_dependability_approach
page 1225 - 1248
Vol.22 / Issue 9
G.R. Kumar, N. Mangathayaru, G. Narsimha:
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
/jucs_22_4/an_approach_for_intrusion
page 589 - 604
Vol.22 / Issue 4
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
/jucs_15_5/light_weight_key_exchange
page 1042 - 1064
Vol.15 / Issue 5
Y. Lakhdhar, S. Rekhis, N. Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
/jucs_25_9/a_context_based_defense
page 1066 - 1088
Vol.25 / Issue 9
J. Luo, X. Wang, M. Yang:
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme
/jucs_15_9/a_resilient_p2p_anonymous
page 1797 - 1811
Vol.15 / Issue 9
S. Ahmad Madani, D. Weber, S. Mahlknecht:
Position-based Routing Protocol for Low Power Wireless Sensor Networks
/jucs_16_9/position_bbased_routing_protocol
page 1215 - 1233
Vol.16 / Issue 9
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
/jucs_18_6/countermeasures_to_prevent_misbehaviour
page 857 - 873
Vol.18 / Issue 6
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
/jucs_13_1/quality_of_service_routing
page 56 - 86
Vol.13 / Issue 1
S. Pal:
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
/jucs_21_12/extending_mobile_cloud_platforms
page 1594 - 1634
Vol.21 / Issue 12
Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs
/jucs_19_16/a_privacy_preserving_message
page 2385 - 2403
Vol.19 / Issue 16
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek:
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
/jucs_15_5/agent_platform_for_wireless
page 992 - 1006
Vol.15 / Issue 5
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
/jucs_22_9/secure_control_applications_in
page 1249 - 1273
Vol.22 / Issue 9
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
/jucs_16_21/impact_of_cpu_bound
page 3299 - 3313
Vol.16 / Issue 21
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
B. Santoso, C. Su:
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
/jucs_25_3/a_new_identification_scheme
page 294 - 308
Vol.25 / Issue 3
A.U. Schmidt:
On the Superdistribution of Digital Goods
/jucs_15_2/on_the_superdistribution_of
page 401 - 425
Vol.15 / Issue 2
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
/jucs_16_10/cross_layer_optimization_for
page 1343 - 1367
Vol.16 / Issue 10
S. Soursos, C. Courcoubetis, R. Weber:
Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games
/jucs_14_5/dynamic_bandwidth_pricing_provision
page 766 - 785
Vol.14 / Issue 5
H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
/jucs_25_9/steganalysis_of_adaptive_multi
page 1131 - 1150
Vol.25 / Issue 9
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20
X. Wang, L. Xu, S. Zhou, J.K. Liu:
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks
/jucs_21_3/a_resolving_set_based
page 384 - 405
Vol.21 / Issue 3
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
/jucs_22_4/feature_selection_for_black
page 521 - 536
Vol.22 / Issue 4
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille:
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
/jucs_12_1/a_new_system_dedicated
page 30 - 44
Vol.12 / Issue 1