Journal cover image

Browse issues


Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Technology and Secured Transactions

2014 Vol. 5 No. 3

 

PagesTitle and authors
191-222Secure the edge? Understanding the risk towards wireless grids Edgeware technology
Tyson Brooks; Michelle Kaarst-Brown; Carlos Caicedo; Joon Park; Lee W. McKnight
DOI: 10.1504/IJITST.2014.065190

223-239Secure communication protocol for real-time business process monitoring
Abdelrahman AlMahmoud; Maurizio Colombo; Chan Yeob Yeun; Hassan Al-Muhairi
DOI: 10.1504/IJITST.2014.065183

240-261Server-side code injection attack detection based on Kullback-Leibler distance
Hossain Shahriar; Sarah M. North; YoonJi Lee; Roger Hu
DOI: 10.1504/IJITST.2014.065184

262-274A lightweight chaos-based cryptosystem for dynamic security management in real-time overloaded applications
Maryline Chetto; Safwan El Assad; Mousa Farajallah
DOI: 10.1504/IJITST.2014.065187

275-290A SMT-based methodology for monitoring of security-aware workflows
Clara Bertolissi; Silvio Ranise
DOI: 10.1504/IJITST.2014.065188