International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2013 Vol.8 No.2


Pages Title and author(s)
61-71A rough set-based effective rule generation method for classification with an application in intrusion detection
Prasanta Gogoi; Dhruba K. Bhattacharyya; Jugal K. Kalita
DOI: 10.1504/IJSN.2013.055939
72-81Simplified features for email authorship identification
Emad E. Abdallah; Alaa E. Abdallah; Mohammad Bsoul; Ahmed F. Otoom; Essam Al-Daoud
DOI: 10.1504/IJSN.2013.055941
82-93Steganographic information hiding that exploits a novel file system vulnerability
Avinash Srinivasan; Satish Kolli; Jie Wu
DOI: 10.1504/IJSN.2013.055942
94-105Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
Annanda Thavymony Rath; Jean-Noël Colin
DOI: 10.1504/IJSN.2013.055943
106-116Reversing the effects of tokenisation attacks against content-based spam filters
Igor Santos; Carlos Laorden; Borja Sanz; Pablo G. Bringas
DOI: 10.1504/IJSN.2013.055944