International Journal of Security and Networks
2010 Vol.5 No.4
Pages | Title and author(s) |
207-219 | Enhancing Intrusion Detection System with proximity informationZhenyun Zhuang, Ying Li, Zesheng Chen DOI: 10.1504/IJSN.2010.037660 |
220-235 | Efficient decision tree for protocol analysis in intrusion detectionT. Abbes, A. Bouhoula, M. Rusinowitch DOI: 10.1504/IJSN.2010.037661 |
236-247 | An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocolsKarl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills DOI: 10.1504/IJSN.2010.037662 |
248-258 | On the scalability of Delay-Tolerant BotnetsZesheng Chen, Chao Chen, Qian Wang DOI: 10.1504/IJSN.2010.037664 |
259-269 | Detect DDoS flooding attacks in mobile ad hoc networksYinghua Guo, Sylvie Perreau DOI: 10.1504/IJSN.2010.037666 |