International Journal of Security and Networks
2012 Vol.7 No.1
Pages | Title and author(s) |
1-5 | E-mail protocols with perfect forward secrecyDuncan S. Wong; Xiaojian Tian DOI: 10.1504/IJSN.2012.048491 |
6-16 | Lightweight testbed for evaluating worm containment systemsLucas John Vespa; Ritam Chakrovorty; Ning Weng DOI: 10.1504/IJSN.2012.048478 |
17-29 | A misleading active routing attack in mobile ad-hoc networksF. Kandah; Y. Singh; W. Zhang; T. Wang DOI: 10.1504/IJSN.2012.048492 |
30-39 | Security configuration management in intrusion detection and prevention systemsK. Alsubhi; Y. Alhazmi; N. Bouabdallah; R. Boutaba DOI: 10.1504/IJSN.2012.048493 |
40-58 | PeerReview re-evaluation for accountability in distributed systems or networksZhifeng Xiao; Yang Xiao DOI: 10.1504/IJSN.2012.048494 |
59-70 | Defensive computer worms: an overviewZiyad S. Al-Salloum DOI: 10.1504/IJSN.2012.048479 |