Volume 1, Number 1, April 2009 |
Citation Count |
|
Using Rough Set and Support Vector Machine for Network Intrusion Detection
|
98 |
|
Tools and Techniques for Network Forensics
|
51 |
|
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
|
19 |
|
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard Algorithm
|
73 |
|
A New Cluster - Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Networks
|
84 |
|
Volume 1, Number 2, July 2009 |
Citation Count |
|
Iterative method for improvement of coding and decryption
|
04 |
|
Tools A new key establishment Scheme for wireless sensor networks
|
05 |
|
Dynamic IDP signature processing by fast elimination using DFA
|
03 |
|
Effect of inter packet delay in performance analysis of coexistence heterogeneous wireless packet networks
|
09 |
|
Clustered Hierarchy in Sensor Networks: Performance and Security
|
01 |
|
Quantum Three-Pass Protocol: Key Distribution using Quantum Superposition States
|
06 |
|
Intelligent Intrusion Detection System Framework Using Mobile Agents
|
19 |
|
On Generation of Firewall Log Status Reporter (SRr) Using Perl
|
09 |
|
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
|
27 |
|
Volume 1, Number 3, October 2009 |
Citation Count |
|
Integrating Identity-Based Cryptography in IMS Service Authentication
|
07 |
|
Agent Based Trust Management Model Based on Weight Value Model for Online Auctions
|
09 |
|
Cryptanalysis of a more efficient and secure Dynamic ID-Based Remote User Authentication Scheme
|
17 |
|
Psim: A Tool for Analysis of Device Pairing Methods
|
05 |
|
Data Security in Mobile Devices by GEO Locking
|
04 |
|
Performance Evaluation of a New Route Optimization Technique for Mobile IP
|
01 |
|
Security Properties in an Open Peer-to-Peer Network
|
03 |
|
A Security Framework for SOA Applications in Mobile Environment
|
16 |
|
Securing AODV for MANETs using Message Digest with Secret Key
|
08 |
|
Application Specific Usage control Implementation Verification
|
03 |
|
Volume 2, Number 1, January 2010 |
Citation Count |
|
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks
|
09 |
|
A Frame Work for Ontological Privacy Preserved Mining
|
08 |
|
Workload Characterization of Spam Email Filtering Systems
|
07 |
|
Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media
|
63 |
|
Weakness on Cryptographic Schemes Based on Regular LDPC Codes
|
- |
|
Advanced Security Management in Metro Ethernet Networks
|
0 |
|
Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application
|
07 |
|
Pledge: A Policy-Based Security Protocol for Protecting Content Addressable Storage Architectures
|
01 |
|
Volume 2, Number 2, April 2010 |
Citation Count |
|
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
|
05 |
|
Combining Naive Bayes and Decision Tree for Adaptive Intrusion Detection
|
96 |
|
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
|
24 |
|
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
|
07 |
|
Events Classification in Log Audit
|
07 |
|
Analysis of the Security of BB84 by Model Checking
|
14 |
|
Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor
|
15 |
|
Impersonation Attack on EKE Protocol
|
03 |
|
A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices
|
04 |
|
Trust Based Content Distribution for Peer-To-Peer Overlay Networks
|
06 |
|
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in MANET
|
26 |
|
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
|
24 |
|
Volume 2, Number 3, July 2010 |
Citation Count |
|
A Novel Web-based Approach for Balancing Usability and Security Requirements of Text Passwords
|
02 |
|
Cross-Layer Resource Allocation Scheme Under Heterogeneous Constranits For Next Generation High Rate WPAN
|
12 |
|
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
|
0 |
|
Design And Implementation Of a Trust-Aware Routing Protocol For Large WSNs
|
46 |
|
Investigating & Improving The Reliability And Repeatability Of Keystorke Dynamics Timers
|
05 |
|
Improving TLS Security By Quantum Cryptography
|
05 |
|
Hierarchical Design Based Intrusion Detection System For Wireless Ad Hoc Sensor Network
|
43 |
|
Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network
|
01 |
|
An Efficient IP Traceback Through Packet Marking Algorithm
|
08 |
|
Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment
|
08 |
|
Wireless Security Measurement Using Data Value Index
|
0 |
|
An Efficient M-ARY QIM Data Hiding Algorithm For The Application To Image Error Concealment
|
0 |
|
Pattern Analysis and Signature Extraction For Intrusion Attacks On Web Services
|
15 |
|
Volume 2, Number 4, October 2010 |
Citation Count |
|
A Multi-Criteria Evaluation of Information Security Controls Using Boolean Features
|
20 |
|
Securing Data Transfer in the Cloud Through Introducing Identification Packet and UDT-Authentication Option FIeld: A Characterization
|
06 |
|
Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique
|
33 |
|
Verification of Quantum Cryptography Protocols by Model Checking
|
02 |
|
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks
|
03 |
|
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN
|
26 |
|
Effect of Hash Function on Performance of Low Power Wake up Receiver for Wireless Sensor Network
|
- |
|
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
|
14 |
|
Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-Server Environment
|
05 |
|
A (2,N) Visual Cryptographic Technique for Banking Applications
|
13 |
|
Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents
|
24 |
|
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
|
07 |
|
Lightweight C&C based botnet detection using Aho-Corasick NFA
|
06 |
|
Emergency Response Communications and Associated Security Challenges
|
10 |
|
A Formal Verification Framework for Security Policy Management in Mobile IP Based WLAN
|
02 |
|
Additional Papers | ||
Effective Voice Calls Admission for Authorized User in Inter VOIP Network
|
0 |
|
ADRISYA: A Flow Based Anomaly Detection System for Slow and Fast Scan
|
04 |
|
Improving the Reliability of Detection of LSB Replacement Steganography
|
0 |
|
Zero Data Remnance Proof in Cloud Storage
|
03 |
|
Bayesian Based Comment Spam Defending Tool
|
02 |