
International Journal of Security and Networks
2018 Vol.13 No.2
Pages | Title and author(s) |
71-83 | Toward signature extraction of Metasploit encoding algorithms using static analysisMohammadreza Ramezani-Chemazi; Maede Ashouri-Talouki DOI: 10.1504/IJSN.2018.092472 |
84-97 | An efficient remote anonymous authentication scheme with user revocationYun-Xia Deng; Run-Hua Shi DOI: 10.1504/IJSN.2018.092475 |
98-107 | A promising security protocol for protecting near field communication devices from networking attacksAbu Asaduzzaman; Shanta Mazumder; Sergio Salinas DOI: 10.1504/IJSN.2018.092448 |
108-128 | A novel approach for graph-based global outlier detection in social networksNabila Zrira; Soufiana Mekouar; El Houssine Bouyakhf DOI: 10.1504/IJSN.2018.092473 |
129-138 | A measurement study of the subresource integrity mechanism on real-world applicationsRonak Shah; Kailas Patil DOI: 10.1504/IJSN.2018.092474 |