International Journal of Security and Networks
2013 Vol.8 No.3
Pages | Title and author(s) |
117-129 | Wi-Fi access denial of service attack to smartphonesErich Dondyk; Louis Rivera; Cliff C. Zou DOI: 10.1504/IJSN.2013.057698 |
130-138 | ECC-based anti-phishing protocol for cloud computing servicesSheetal Kalra; Sandeep Sood DOI: 10.1504/IJSN.2013.057695 |
139-153 | A model for quantitative security measurement and prioritisation of vulnerability mitigationAnshu Tripathi; Umesh Kumar Singh DOI: 10.1504/IJSN.2013.057696 |
154-168 | On effective sampling techniques in host-based intrusion detection in tactical MANETWei Yu; Linqiang Ge; Difan Zhang; Rommie L. Hardy; Robert J. Reschly DOI: 10.1504/IJSN.2013.057688 |
169-178 | Enabling decentralised microblogging through P2PVPNsPierre St Juste; Heungsik Eom; Benjamin Woodruff; Corey Baker; Renato Figueiredo DOI: 10.1504/IJSN.2013.057699 |