International Journal of Security and Networks
2008 Vol.3 No.2
Special Issue on Network Forensics
Guest Editors: Professor Nasir Memon and Professor Rajni Goel
Editorial |
Pages | Title and author(s) |
80-94 | Using mobile ad hoc networks to acquire digital evidence from remote autonomous agentsIndrajit Ray, Nayot Poolsappasit DOI: 10.1504/IJSN.2008.017221 |
95-102 | Forensic analysis of SCADA systems and networksT. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, S. Shenoi DOI: 10.1504/IJSN.2008.017222 |
103-113 | On the (un)reliability of eavesdroppingEric Cronin, Micah Sherr, Matt Blaze DOI: 10.1504/IJSN.2008.017223 |
114-121 | Using PLSI-U to detect insider threats by datamining e-mailJ.S. Okolica, G.L. Peterson, R.F. Mills DOI: 10.1504/IJSN.2008.017224 |
Additional Papers | |
122-132 | A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh NetworksXiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho, Xuemin Sherman Shen DOI: 10.1504/IJSN.2008.017225 |
133-146 | Adaptive clustering for scalable key management in dynamic group communicationsYacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar DOI: 10.1504/IJSN.2008.017226 |