
International Journal of Security and Networks
2022 Vol.17 No.2
Pages | Title and author(s) |
63-76 | VoIP security auditing model based on COBIT 4.1Oscar Danilo Gavilánez Alvarez; Glen Dario Rodriguez Rafael DOI: 10.1504/IJSN.2022.123293 |
77-91 | Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger FabricWilson S. Melo Jr.; Lucas S. Dos Santos; Lucila M.S. Bento; Paulo R. Nascimento; Carlos A.R. Oliveira; Ramon R. Rezende DOI: 10.1504/IJSN.2022.123294 |
92-106 | Security-enhanced Android for an enterpriseSyed Rameez Rehman; Mudassar Waheed; Ammar Masood DOI: 10.1504/IJSN.2022.123296 |
107-123 | A new wrapper feature selection model for anomaly-based intrusion detection systemsMeriem Kherbache; Kamal Amroun; David Espes DOI: 10.1504/IJSN.2022.123298 |
124-134 | Implementation of quasi-Newton algorithm on FPGA for IoT endpoint devicesShizhen Huang; Anhua Guo; Kaikai Su; Siyu Chen; Ruiqi Chen DOI: 10.1504/IJSN.2022.123300 |