International Journal of Security and Networks
2012 Vol.7 No.4
Special Issue on Network Forensics, Security and Privacy
Guest Editor: Dr. Shui Yu
Editorial |
Pages | Title and author(s) |
196-210 | Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environmentsDawei Sun; Guiran Chang; Changsheng Miao; Xingwei Wang DOI: 10.1504/IJSN.2012.053458 |
211-219 | A collaborative botnets suppression system based on overlay networkFuye Han; Zhen Chen; HongFeng Xu; Haopei Wang; Yong Liang DOI: 10.1504/IJSN.2012.053459 |
220-227 | A novel middleware-based approach for redundant reader elimination using PSOShilei Lv; Shunzheng Yu DOI: 10.1504/IJSN.2012.053460 |
228-241 | Internet of things' authentication and access controlJing Liu; Yang Xiao; C.L. Philip Chen DOI: 10.1504/IJSN.2012.053461 |
242-251 | BDD-based two-party trust sensitivity analysis for social networksLiudong Xing; Honggang Wang; Chaonan Wang; Yujie Wang DOI: 10.1504/IJSN.2012.053462 |
252-261 | Semi-supervised and compound classification of network trafficJun Zhang; Chao Chen; Yang Xiang; Wanlei Zhou DOI: 10.1504/IJSN.2012.053463 |