International Journal of Internet Technology and Secured Transactions (IJITST)

International Journal of Internet Technology and Secured Transactions

2014 Vol.5 No.3


Pages Title and author(s)
191-222Secure the edge? Understanding the risk towards wireless grids Edgeware technology
Tyson Brooks; Michelle Kaarst-Brown; Carlos Caicedo; Joon Park; Lee W. McKnight
DOI: 10.1504/IJITST.2014.065190
223-239Secure communication protocol for real-time business process monitoring
Abdelrahman AlMahmoud; Maurizio Colombo; Chan Yeob Yeun; Hassan Al-Muhairi
DOI: 10.1504/IJITST.2014.065183
240-261Server-side code injection attack detection based on Kullback-Leibler distance
Hossain Shahriar; Sarah M. North; YoonJi Lee; Roger Hu
DOI: 10.1504/IJITST.2014.065184
262-274A lightweight chaos-based cryptosystem for dynamic security management in real-time overloaded applications
Maryline Chetto; Safwan El Assad; Mousa Farajallah
DOI: 10.1504/IJITST.2014.065187
275-290A SMT-based methodology for monitoring of security-aware workflows
Clara Bertolissi; Silvio Ranise
DOI: 10.1504/IJITST.2014.065188