International Journal of Internet Technology and Secured Transactions
2014 Vol.5 No.3
Pages | Title and author(s) |
191-222 | Secure the edge? Understanding the risk towards wireless grids Edgeware technologyTyson Brooks; Michelle Kaarst-Brown; Carlos Caicedo; Joon Park; Lee W. McKnight DOI: 10.1504/IJITST.2014.065190 |
223-239 | Secure communication protocol for real-time business process monitoring Abdelrahman AlMahmoud; Maurizio Colombo; Chan Yeob Yeun; Hassan Al-Muhairi DOI: 10.1504/IJITST.2014.065183 |
240-261 | Server-side code injection attack detection based on Kullback-Leibler distanceHossain Shahriar; Sarah M. North; YoonJi Lee; Roger Hu DOI: 10.1504/IJITST.2014.065184 |
262-274 | A lightweight chaos-based cryptosystem for dynamic security management in real-time overloaded applicationsMaryline Chetto; Safwan El Assad; Mousa Farajallah DOI: 10.1504/IJITST.2014.065187 |
275-290 | A SMT-based methodology for monitoring of security-aware workflowsClara Bertolissi; Silvio Ranise DOI: 10.1504/IJITST.2014.065188 |