International Journal of Network Security | ||
1. | A Feature Classification Scheme For Network Intrusion Detection
|
|
Iosif-Viorel Onut, and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 1-15 Article Full Text PDF |
||
2. | Another Look at PMAC
|
|
Dayin Wang, Dongdai Lin, Wenling Wu, Vol. 5, No. 1, 2007, pp. 16-20 Article Full Text PDF |
||
3. | Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
|
|
Adam J. Rocke, Ronald F. DeMara and Simon Foo, Vol. 5, No. 1, 2007, pp. 21-31 Article Full Text PDF |
||
4. | Markov Chain Modelling of the Probabilistic Packet Marking Algorithm
|
|
Tsz-Yeung Wong, John Chi-Shing Lui, and Man-Hon Wong, Vol. 5, No. 1, 2007, pp. 32-40 Article Full Text PDF |
||
5. | Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
|
|
Ashish Patel, M. Shah, Rajarathnam Chandramouli, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 41-50 Article Full Text PDF |
||
6. | Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks
|
|
Bartlomiej Sieka and Ajay D. Kshemkalyani, Vol. 5, No. 1, 2007, pp. 51-61 Article Full Text PDF |
||
7. | On the Security of Huang-Chang Multi-signature Schemes
|
|
Jianhong Zhang and Wei Zou, Vol. 5, No. 1, 2007, pp. 62-65 Article Full Text PDF |
||
8. | A Rule-based Temporal Alert Correlation System
|
|
Peyman Kabiri and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 66-72 Article Full Text PDF |
||
9. | Balancing Trust and Incentive in Peer-to-Peer Collaborative System
|
|
Yu Zhang, Li Lin, and Jinpeng Huai, Vol. 5, No. 1, 2007, pp. 73-81 Article Full Text PDF |
||
10. | SeReRoM: Secured Reliable Routing Scheme for Multicasting
|
|
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan, L. Ramesh Babu, and C. Karunagaran, Vol. 5, No. 1, 2007, pp. 82-88 Article Full Text PDF |
||
11. | An Efficient Identity-based Signature Scheme and Its Applications
|
|
Shi Cui, Pu Duan, Choong Wah Chan, and Xiangguo Cheng, Vol. 5, No. 1, 2007, pp. 89-98 Article Full Text PDF |
||
12. | A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
|
|
Christos K. Dimitriadis and Siraj A. Shaikh, Vol. 5, No. 1, 2007, pp. 99-111 Article Full Text PDF |
||
13. | Statistical Attack Resilient Data Hiding
|
|
Palak K. Amin, Ning Liu, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 112-120 Article Full Text PDF |
||
14. | Subject index to volume 5 (2007)
|
|
Article Full Text PDF | ||
15. | Author index to volume 5 (2007)
|
|
Article Full Text PDF | ||
16. | Reviewer index to volume 5 (2007)
|
|
Article Full Text PDF | ||