
International Journal of Security and Networks
2015 Vol.10 No.2
Pages | Title and author(s) |
65-75 | A novel scheme for secure group communication in multicast networkN.M. Saravana Kumar; S. Lavanya DOI: 10.1504/IJSN.2015.070409 |
76-83 | System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting serviceJai-Pil Oh; Dong Ho Kim DOI: 10.1504/IJSN.2015.070413 |
84-90 | Using Bayesian posterior probability in confidence of attributes for feature selectionInkyoo Park; Jongjin Park; Gyooseok Choi DOI: 10.1504/IJSN.2015.070418 |
91-106 | Network forensics analysis using WiresharkVivens Ndatinya; Zhifeng Xiao; Vasudeva Rao Manepalli; Ke Meng; Yang Xiao DOI: 10.1504/IJSN.2015.070421 |
107-123 | Chain reduction of authorisation certificatesYki Kortesniemi; Timo Kiravuo; Mikko Särelä; Hannu H. Kari DOI: 10.1504/IJSN.2015.070424 |
124-136 | Compression-based analysis of metamorphic malwareJared Lee; Thomas H. Austin; Mark Stamp DOI: 10.1504/IJSN.2015.070426 |