
International Journal of Security and Networks
2010 Vol.5 No.4
| Pages | Title and author(s) |
| 207-219 | Enhancing Intrusion Detection System with proximity informationZhenyun Zhuang, Ying Li, Zesheng Chen DOI: 10.1504/IJSN.2010.037660 |
| 220-235 | Efficient decision tree for protocol analysis in intrusion detectionT. Abbes, A. Bouhoula, M. Rusinowitch DOI: 10.1504/IJSN.2010.037661 |
| 236-247 | An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocolsKarl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills DOI: 10.1504/IJSN.2010.037662 |
| 248-258 | On the scalability of Delay-Tolerant BotnetsZesheng Chen, Chao Chen, Qian Wang DOI: 10.1504/IJSN.2010.037664 |
| 259-269 | Detect DDoS flooding attacks in mobile ad hoc networksYinghua Guo, Sylvie Perreau DOI: 10.1504/IJSN.2010.037666 |