Journal cover image

Browse issues

Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2013 Vol. 8 No. 2


PagesTitle and authors
61-71A rough set-based effective rule generation method for classification with an application in intrusion detection
Prasanta Gogoi; Dhruba K. Bhattacharyya; Jugal K. Kalita
DOI: 10.1504/IJSN.2013.055939

72-81Simplified features for email authorship identification
Emad E. Abdallah; Alaa E. Abdallah; Mohammad Bsoul; Ahmed F. Otoom; Essam Al-Daoud
DOI: 10.1504/IJSN.2013.055941

82-93Steganographic information hiding that exploits a novel file system vulnerability
Avinash Srinivasan; Satish Kolli; Jie Wu
DOI: 10.1504/IJSN.2013.055942

94-105Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
Annanda Thavymony Rath; Jean-Noël Colin
DOI: 10.1504/IJSN.2013.055943

106-116Reversing the effects of tokenisation attacks against content-based spam filters
Igor Santos; Carlos Laorden; Borja Sanz; Pablo G. Bringas
DOI: 10.1504/IJSN.2013.055944