Volume 33, Number 1, January 2010
, A. Kahtani
: Performance evaluation comparison of Snort NIDS under Linux and Windows Server.
Volume 33, Number 2, March 2010
, Wei-Shou Wang
: An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks.
: Discovery and prevention of attack episodes by frequent episodes mining and finite state machines.
Volume 33, Number 3, May 2010
Neyire Deniz Sarier
: Improving the accuracy and storage cost in biometric remote authentication schemes.
Volume 33, Number 4, July 2010
Volume 33, Number 5, September 2010
Volume 33, Number 6, November 2010
: Agent-based artificial immune system approach for adaptive damage detection in monitoring networks.
, ChongGun Kim
: A cost matrix agent for shortest path routing in ad hoc networks.
: A dynamic resource management in mobile agent by artificial neural network.