


default search action
Journal of Information Security, Volume 2
Volume 2, Number 1, January 2011
- Tao Xu, Chunxiao Yi:

SOAP-Based Security Interaction of Web Service in Heterogeneous Platforms. 1-7 - Shaojun Zhang, Shanshan Song:

A Novel Attack Graph Posterior Inference Model Based on Bayesian Network. 8-27 - Indraneel Mukhopadhyay, Mohuya Chakraborty, Satyajit Chakrabarti:

A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems. 28-38 - Tarek S. Sobh, Yasser Aly:

Effective and Extensive Virtual Private Network. 39-49 - Sanjeev Kumar, Raja Sekhar Reddy Gade:

Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks. 50-58
Volume 2, Number 2, April 2011
- Yasunari Yoshitomi, Taro Asada, Yohei Kinugawa, Masayoshi Tabuse:

An Authentication Method for Digital Audio Using a Discrete Wavelet Transform. 59-68 - Shahriar Mohammadi, Reza Ebrahimi Atani

, Hossein Jadidoleslamy:
A Comparison of Link Layer Attacks on Wireless Sensor Networks. 69-84 - Zakaria I. Saleh, Heba Refai, Ahmad Mashhour

:
Proposed Framework for Security Risk Assessment. 85-90 - Basant Kumar, Harsh Vikram Singh, Surya Pal Singh, Anand Mohan:

Secure Spread-Spectrum Watermarking for Telemedicine Applications. 91-98
Volume 2, Number 3, July 2011
- Shinichi Murata, Yasunari Yoshitomi, Hiroaki Ishii:

Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression. 99-112 - Sirisha Surisetty, Sanjeev Kumar:

McAfee SecurityCenter Evaluation under DDoS Attack Traffic. 113-121 - Saleem-Ullah Lar, Xiaofeng Liao, Aqeel-ur Rehman, Ma Qinglu:

Proactive Security Mechanism and Design for Firewall. 122-130 - Hari Krishna Vellalacheruvu, Sanjeev Kumar:

Effectiveness of Built-in Security Protection of Microsoft's Windows Server 2003 against TCP SYN Based DDoS Attacks. 131-138
Volume 2, Number 4, October 2011
- Kamlesh Gupta, Sanjay Silakari:

New Approach for Fast Color Image Encryption Using Chaotic Map. 139-150 - Charlie Obimbo, Benjamin Ferriman:

Vulnerabilities of LDAP As An Authentication Service. 151-157 - Zachary Miller, William Deitrick, Wei Hu:

Anomalous Network Packet Detection Using Data Stream Mining. 158-168 - Manjit Thapa, Sandeep K. Sood:

On Secure Digital Image Watermarking Techniques. 169-184 - Eliza Yingzi Du, Kai Yang, Zhi Zhou:

Key Incorporation Scheme for Cancelable Biometrics. 185-194 - Alok Sharma

, Sunil Pranit Lal:
Tanimoto Based Similarity Measure for Intrusion Detection System. 195-201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














