International Journal of Security and Networks
2013 Vol.8 No.2
Pages | Title and author(s) |
61-71 | A rough set-based effective rule generation method for classification with an application in intrusion detectionPrasanta Gogoi; Dhruba K. Bhattacharyya; Jugal K. Kalita DOI: 10.1504/IJSN.2013.055939 |
72-81 | Simplified features for email authorship identificationEmad E. Abdallah; Alaa E. Abdallah; Mohammad Bsoul; Ahmed F. Otoom; Essam Al-Daoud DOI: 10.1504/IJSN.2013.055941 |
82-93 | Steganographic information hiding that exploits a novel file system vulnerabilityAvinash Srinivasan; Satish Kolli; Jie Wu DOI: 10.1504/IJSN.2013.055942 |
94-105 | Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcareAnnanda Thavymony Rath; Jean-Noël Colin DOI: 10.1504/IJSN.2013.055943 |
106-116 | Reversing the effects of tokenisation attacks against content-based spam filtersIgor Santos; Carlos Laorden; Borja Sanz; Pablo G. Bringas DOI: 10.1504/IJSN.2013.055944 |