
International Journal of Security and Networks
2022 Vol.17 No.2
Pages | Title and author(s) |
63-76 | VoIP security auditing model based on COBIT 4.1Oscar Danilo Gavilánez Alvarez; Glen Dario Rodriguez Rafael DOI: 10.1504/IJSN.2022.10047901 |
77-91 | Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger FabricWilson S. Melo Jr.; Lucas S. Dos Santos; Lucila M.S. Bento; Paulo R. Nascimento; Carlos A.R. Oliveira; Ramon R. Rezende DOI: 10.1504/IJSN.2022.10047903 |
92-106 | Security-enhanced Android for an enterpriseSyed Rameez Rehman; Mudassar Waheed; Ammar Masood DOI: 10.1504/IJSN.2022.10047910 |
107-123 | A new wrapper feature selection model for anomaly-based intrusion detection systemsMeriem Kherbache; Kamal Amroun; David Espes DOI: 10.1504/IJSN.2022.10045635 |
124-134 | Implementation of quasi-Newton algorithm on FPGA for IoT endpoint devicesShizhen Huang; Anhua Guo; Kaikai Su; Siyu Chen; Ruiqi Chen DOI: 10.1504/IJSN.2022.10047915 |