
International Journal of Security and Networks
2022 Vol.17 No.2
| Pages | Title and author(s) |
| 63-76 | VoIP security auditing model based on COBIT 4.1Oscar Danilo Gavilánez Alvarez; Glen Dario Rodriguez Rafael DOI: 10.1504/IJSN.2022.123293 |
| 77-91 | Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger FabricWilson S. Melo Jr.; Lucas S. Dos Santos; Lucila M.S. Bento; Paulo R. Nascimento; Carlos A.R. Oliveira; Ramon R. Rezende DOI: 10.1504/IJSN.2022.123294 |
| 92-106 | Security-enhanced Android for an enterpriseSyed Rameez Rehman; Mudassar Waheed; Ammar Masood DOI: 10.1504/IJSN.2022.123296 |
| 107-123 | A new wrapper feature selection model for anomaly-based intrusion detection systemsMeriem Kherbache; Kamal Amroun; David Espes DOI: 10.1504/IJSN.2022.123298 |
| 124-134 | Implementation of quasi-Newton algorithm on FPGA for IoT endpoint devicesShizhen Huang; Anhua Guo; Kaikai Su; Siyu Chen; Ruiqi Chen DOI: 10.1504/IJSN.2022.123300 |