Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 863709 results
Sort by: relevance publication year

Call for Papers for Special Issue on Next Generation Communication and Network Security

Journal Article published 28 Jan 2011 in Security and Communication Networks volume 4 issue 2 on pages e2 to e2

On the security of PPPoE network

Journal Article published 8 Feb 2012 in Security and Communication Networks volume 5 issue 10 on pages 1159 to 1168

Authors: Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng

Security analysis of network protocols through model checking: a case study on mobile IPv6

Journal Article published 16 Dec 2015 in Security and Communication Networks volume 9 issue 10 on pages 1072 to 1084

Authors: Zohreh Saffarian Eidgahi, Vahid Rafe

Investigation of security issues for service-oriented network architecture

Journal Article published 28 Dec 2015 in Security and Communication Networks volume 9 issue 10 on pages 1025 to 1039

Authors: Bhawana Rudra, Om Prakash Vyas

Intelligent network security assessment with modeling and analysis of attack patterns

Journal Article published 27 Jun 2012 in Security and Communication Networks volume 5 issue 12 on pages 1471 to 1486

Authors: Suleyman Kondakci

Special issue on recent advances in network and information security-security and communication networks journal

Journal Article published 15 Dec 2014 in Security and Communication Networks volume 8 issue 1 on pages 1 to 1

Authors: Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou

Call for papers: systematic network optimizations for security parameters (security and communication networks)

Journal Article published 10 Mar 2014 in Security and Communication Networks volume 7 issue 11 on pages 2180 to 2180

Authors: Hongmei Zhang, Yongzhuang Wei, Rongxing Lu, Rose Qingyang Hu

Special issue on next generation communication and network security

Journal Article published 28 Aug 2012 in Security and Communication Networks volume 5 issue 10 on pages 1083 to 1085

Authors: Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou

Advances in trusted network computing

Journal Article published 30 May 2014 in Security and Communication Networks volume 7 issue 9 on pages 1311 to 1312

Authors: Yulei Wu, Guojun Wang, Ahmed Al-Dubai

Improving intrusion detection for imbalanced network traffic

Journal Article published 10 Jul 2012 in Security and Communication Networks volume 6 issue 3 on pages 309 to 324

Authors: Ciza Thomas

Impact of secondary user communication on security communication of primary user

Journal Article published 27 Aug 2015 in Security and Communication Networks volume 8 issue 18 on pages 4177 to 4190

Research funded by University of Rwanda | Sweden Programme for Research | Swedish International Development Agency | Vietnam National Foundation for Science and Technology Development (102.01-2010.09)

Authors: Louis Sibomana, Hung Tran, Quang Anh Tran

Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions

Journal Article published 1 Jun 2011 in International Journal of Communication Systems volume 25 issue 5 on pages 672 to 688

Authors: Ruey-Maw Chen, Kuo-Ta Hsieh

A novel energy-efficient cross-application-layer platform with QoS-security support

Journal Article published 18 Feb 2015 in International Journal of Communication Systems volume 30 issue 2 on page e2940

Research funded by Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada

Authors: Sasan Adibi

Hybrid intelligent systems for detecting network intrusions

Journal Article published 11 Jul 2012 in Security and Communication Networks volume 8 issue 16 on pages 2741 to 2749

Authors: Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra

Virtual network stacks: from theory to practice

Journal Article published 19 Oct 2011 in Security and Communication Networks volume 5 issue 7 on pages 738 to 751

Authors: Alfredo Matos, Rui Ferreira, Susana Sargento, Rui L. Aguiar

Network specific vulnerability based alert reduction approach

Journal Article published 29 Mar 2012 in Security and Communication Networks volume 6 issue 1 on pages 15 to 27

Authors: Humphrey Waita Njogu, Luo Jiawei, Jane Nduta Kiere

Local outlier factor use for the network flow anomaly detection

Journal Article published 27 Aug 2015 in Security and Communication Networks volume 8 issue 18 on pages 4203 to 4212

Authors: Nerijus Paulauskas, Ąžuolas Faustas Bagdonas

Privacy enhancement in anonymous network channels using multimodality injection

Journal Article published 9 Feb 2015 in Security and Communication Networks volume 8 issue 16 on pages 2917 to 2932

Authors: Mehran Alidoost Nia, Reza Ebrahimi Atani, Antonio Ruiz-Martínez

A new secure and efficient scheme for network mobility management

Journal Article published 21 Aug 2014 in Security and Communication Networks volume 8 issue 7 on pages 1360 to 1377

Authors: Salima Smaoui, Mohammad S. Obaidat, Faouzi Zarai, K. F. Hsiao

A graph-theoretic framework for isolating botnets in a network

Journal Article published 28 Feb 2012 in Security and Communication Networks volume 8 issue 16 on pages 2605 to 2623

Authors: Padmini Jaikumar, Avinash C. Kak