International Journal of Internet Technology and Secured Transactions
2016 Vol.6 No.4
Pages | Title and author(s) |
259-290 | A quantum-inspired evolutionary clustering algorithm for the lifetime problem of wireless sensor networkChun-Wei Tsai; Chun-Ting Kang; Kai-Cheng Hu; Ming-Chao Chiang DOI: 10.1504/IJITST.2016.083000 |
291-302 | Geo-based content naming and forwarding mechanism for vehicular networking over CCNSimiao Wang; Zhiwei Yan; Guanggang Geng; Yuedong Zhang DOI: 10.1504/IJITST.2016.083007 |
303-323 | A four-phase methodology for protecting web applications using an effective real-time techniqueNabeel Salih Ali DOI: 10.1504/IJITST.2016.083008 |
324-348 | A software approach for stack memory protection based on duplication and randomisationSahel Alouneh; Mazen Kharbutli; Rana AlQurem DOI: 10.1504/IJITST.2016.082982 |