| International Journal of Network Security | ||
![]() |
||
| 1. | A Feature Classification Scheme For Network Intrusion Detection
|
|
| Iosif-Viorel Onut, and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 1-15 Article Full Text PDF |
||
| 2. | Another Look at PMAC
|
|
| Dayin Wang, Dongdai Lin, Wenling Wu, Vol. 5, No. 1, 2007, pp. 16-20 Article Full Text PDF |
||
| 3. | Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
|
|
| Adam J. Rocke, Ronald F. DeMara and Simon Foo, Vol. 5, No. 1, 2007, pp. 21-31 Article Full Text PDF |
||
| 4. | Markov Chain Modelling of the Probabilistic Packet Marking Algorithm
|
|
| Tsz-Yeung Wong, John Chi-Shing Lui, and Man-Hon Wong, Vol. 5, No. 1, 2007, pp. 32-40 Article Full Text PDF |
||
| 5. | Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
|
|
| Ashish Patel, M. Shah, Rajarathnam Chandramouli, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 41-50 Article Full Text PDF |
||
| 6. | Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks
|
|
| Bartlomiej Sieka and Ajay D. Kshemkalyani, Vol. 5, No. 1, 2007, pp. 51-61 Article Full Text PDF |
||
| 7. | On the Security of Huang-Chang Multi-signature Schemes
|
|
| Jianhong Zhang and Wei Zou, Vol. 5, No. 1, 2007, pp. 62-65 Article Full Text PDF |
||
| 8. | A Rule-based Temporal Alert Correlation System
|
|
| Peyman Kabiri and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 66-72 Article Full Text PDF |
||
| 9. | Balancing Trust and Incentive in Peer-to-Peer Collaborative System
|
|
| Yu Zhang, Li Lin, and Jinpeng Huai, Vol. 5, No. 1, 2007, pp. 73-81 Article Full Text PDF |
||
| 10. | SeReRoM: Secured Reliable Routing Scheme for Multicasting
|
|
| Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan, L. Ramesh Babu, and C. Karunagaran, Vol. 5, No. 1, 2007, pp. 82-88 Article Full Text PDF |
||
| 11. | An Efficient Identity-based Signature Scheme and Its Applications
|
|
| Shi Cui, Pu Duan, Choong Wah Chan, and Xiangguo Cheng, Vol. 5, No. 1, 2007, pp. 89-98 Article Full Text PDF |
||
| 12. | A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
|
|
| Christos K. Dimitriadis and Siraj A. Shaikh, Vol. 5, No. 1, 2007, pp. 99-111 Article Full Text PDF |
||
| 13. | Statistical Attack Resilient Data Hiding
|
|
| Palak K. Amin, Ning Liu, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 112-120 Article Full Text PDF |
||
| 14. | Subject index to volume 5 (2007)
|
|
| Article Full Text PDF | ||
| 15. | Author index to volume 5 (2007)
|
|
| Article Full Text PDF | ||
| 16. | Reviewer index to volume 5 (2007)
|
|
| Article Full Text PDF | ||