Volume 8, Number 1, January 2016 |
Citation Count |
|
Limiting Self-Propagating Malware Based On Connection Failure Behavior Through Hyper-Compact Estimators
|
0 |
|
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
|
03 |
|
A Security Strategy against STEAL-AND-PASS Credential Attacks
|
- |
|
Big Data Security and Privacy Issues in the CLOUD
|
02 |
|
Volume 8, Number 2, March 2016 |
Citation Count |
|
Trends Toward Real-Time Network Data Steganography
|
01 |
|
Intrusion Detection System Using Discrete Fourier Transform with Window Function
|
- |
|
A Novel Charging and Accounting Scheme in Mobile Ad-Hoc Networks
|
- |
|
A Security Evaluation Framework for U.K. E-Government Services Agile Software Development
|
01 |
|
Cascade Block Cipher Using Braiding/Entanglement of Spin Matrices and Bit Rotation
|
0 |
|
The Internet of Things : New Interoperability, Management and Security Challenges
|
07 |
|
Design and Implementation of the Advanced Cloud Privacy Threat Modeling
|
04 |
|
Volume 8, Number 3, May 2016 |
Citation Count |
|
Using a Deep Understanding of Network Activities for Security Event Management
|
0 |
|
Wearable Technology Devices Security and Privacy Vulnerability Analysis
|
0 |
|
Y-Hamiltonian Layers Broadcast Algorithm
|
01 |
|
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning
|
0 |
|
Volume 8, Number 4, July 2016 |
Citation Count |
|
Proactive Detection of DDOS Attacks in Publish-Subscribe Networks
|
01 |
|
Email Spam Classification Using Hybrid Approach of RBF Neural Network and Particle Swarm Optimization
|
- |
|
Performance Analysis of the Neighbor Weight Trust Determination Algorithm in MANETs
|
0 |
|
A Benchmark for Designing Usable and Secure Text-Based Captchas
|
03 |
|
An Intelligent Classification Model for Phishing Email Detection
|
0 |
|
Volume 8, Number 5, September 2016 |
Citation Count |
|
A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks
|
0 |
|
Enhance RFID Security Against Brute Force Attack Based on Password Strength and Markov Model
|
0 |
|
Color Image Encryption Based on Multiple Chaotic Systems
|
0 |
|
Volume 8, Number 6, November 2016 |
Citation Count |
|
Steganalysis Algorithm for PNG Images Based on Fuzzy Logic Technique
|
0 |
|
A Mechanism for Early Detecting DDOS Attacks Based on M/G/R PS Queue
|
0 |
|
A Bastion Mobile ID-Based Authentication Technique (BMBAT)
|
0 |