default search action
IEEE Systems Journal, Volume 7
Volume 7, Number 1, March 2013
- Vincenzo Piuri, Amir G. Aghdam, Saeid Nahavandi:
Editorial. 2-3 - Sophia G. Petridou, Stylianos Basagiannis, Manos Roumeliotis:
Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks. 4-12 - Bo Sun, Xuemei Shan, Kui Wu, Yang Xiao:
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks. 13-25 - Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao-Hwa Chen, Dong Hoon Lee:
Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks. 26-35 - Andrew Tinka, Mohammad Rafiee, Alexandre M. Bayen:
Floating Sensor Networks for River Studies. 36-49 - Xinheng Wang, Shancang Li:
Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets. 50-58 - Bin Han, Wenbo Wang, Yong Li, Mugen Peng:
Investigation of Interference Margin for the Co-existence of Macrocell and Femtocell in Orthogonal Frequency Division Multiple Access Systems. 59-67 - Shiwei Huang, Hongbin Chen, Yan Zhang, Hsiao-Hwa Chen:
Sensing-Energy Tradeoff in Cognitive Radio Networks With Relays. 68-76 - Yuh-Shyan Chen, Jia-Shiang Hong:
A Relay-Assisted Protocol for Spectrum Mobility and Handover in Cognitive LTE Networks. 77-91 - Zhiwei Yan, Jong-Hyouk Lee:
State-Aware Pointer Forwarding Scheme With Fast Handover Support in a PMIPv6 Domain. 92-101 - Ming-Chin Chuang, Jeng Farn Lee, Meng Chang Chen:
SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. 102-113 - Kosmas Tsilipanos, Ioannis Neokosmidis, Dimitris Varoutas:
A System of Systems Framework for the Reliability Assessment of Telecommunications Networks. 114-124 - Alessandra Babuscia, Kar-Ming Cheung:
Statistical Risk Estimation for Communication System Design. 125-136 - Mehdi Khabazian, Mustafa K. Mehmet Ali, Sonia Aïssa:
Analysis of Continuous Communication Availability in Vehicular Ad Hoc Networks. 137-150 - Golnaz Vakili, Siavash Khorsandi:
Self-Organized Cooperation Policy Setting in P2P Systems Based on Reinforcement Learning. 151-160 - Mohammad Masud Hasan, Farid Farahmand, Jason P. Jue, Joel J. P. C. Rodrigues:
A Study of Energy-Aware Traffic Grooming in Optical Networks: Static and Dynamic Cases. 161-173
Volume 7, Number 2, June 2013
- Sushil Jajodia, Pierangela Samarati:
Guest Editorial. 178 - Hyoungshick Kim, Ross J. Anderson:
An Experimental Evaluation of Robustness of Networks. 179-188 - Ebenezer Paintsil:
Evaluation of Privacy and Security Risks Analysis Construct for Identity Management Systems. 189-198 - Rajiv Bagai, Bin Tang, Euna Kim:
Effectiveness of Probabilistic Attacks on Anonymity of Users Communicating via Multiple Messages. 199-210 - Klaus Rechert, Konrad Meier, Richard M. Zahoransky, Dennis Wehrle, Dirk von Suchodoletz, Benjamin Greschbach, Sven Wohlgemuth, Isao Echizen:
Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers. 211-222 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin:
Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties. 223-235 - Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. 236-248 - Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow:
Constant-Size Dynamic $k$ -Times Anonymous Authentication. 249-261 - Bassam Sayed, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat:
Biometric Authentication Using Mouse Gesture Dynamics. 262-274 - Wolter Pieters, Trajce Dimkov, Dusko Pavlovic:
Security Policy Alignment: A Formal Approach. 275-287 - Ravi Jhawar, Vincenzo Piuri, Marco D. Santambrogio:
Fault Tolerance Management in Cloud Computing: A System-Level Perspective. 288-297 - Ruben Rios, Javier López:
(Un)Suitability of Anonymous Communication Systems to WSN. 298-310 - Emiliano De Cristofaro, Roberto Di Pietro:
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems. 311-322 - Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram:
Secure Logging as a Service - Delegating Log Management to the Cloud. 323-334 - Ryan Shea, Jiangchuan Liu:
Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis. 335-345
Volume 7, Number 3, September 2013
- Sushil Jajodia, Pierangela Samarati:
Guest Editorial. 350 - Angelo Rossi, Samuel Pierre, Suresh Krishnan:
Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC. 351-362 - Teodor Sommestad, Mathias Ekstedt, Hannes Holm:
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures. 363-373 - Xiaofei Wang, Yang Xu, Junchen Jiang, Olga Ormond, Bin Liu, Xiaojun Wang:
StriFA: Stride Finite Automata for High-Speed Regular Expression Matching in Network Intrusion Detection Systems. 374-384 - Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases. 385-395 - Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky:
AS-CRED: Reputation and Alert Service for Interdomain Routing. 396-409 - Mingwu Zhang, Tsuyoshi Takagi:
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation. 410-419 - Fagen Li, Hui Zhang, Tsuyoshi Takagi:
Efficient Signcryption for Heterogeneous Systems. 420-429 - Suku Nair, Omar Al-Ibrahim, Subil Abraham:
State Machine-Based Security Fusion for Resource-Constrained Environments. 430-441 - Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa, Djamal Benslimane:
How to Enhance Privacy Within DaaS Service Composition? 442-454 - Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg:
Truly-Protect: An Efficient VM-Based Software Protection. 455-466 - Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers:
Malware Target Recognition of Unknown Threats. 467-477 - Dawei Li, Xiaoyan Hong, Darwin Witt:
ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study. 478-488 - Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto:
Security Applications of Formal Language Theory. 489-500 - Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, Robert B. France:
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model. 501-515
Volume 7, Number 4, December 2013
- Vincenzo Piuri:
Editorial. 519 - Hamid R. Darabi, Mo Mansouri:
The Role of Competition and Collaboration in Influencing the Level of Autonomy and Belonging in System of Systems. 520-527 - Kemp H. Kernstine:
Inadequacies of Traditional Exploration Methods in Systems-of-Systems Simulations. 528-536 - Asif Mahmood, Francesca Montagna:
Making Lean Smart by Using System-of-Systems' Approach. 537-548 - Charles E. Dickerson:
A Relational Oriented Approach to System of Systems Assessment of Alternatives for Data Link Interoperability. 549-560 - Claudio Roncoli, Chiara Bersani, Roberto Sacile:
A Risk-Based System of Systems Approach to Control the Transport Flows of Dangerous Goods by Road. 561-570 - Evangelos Grigoroudis, Yannis A. Phillis:
Modeling Healthcare System-of-Systems: A Mathematical Programming Approach. 571-580 - Charles E. Dickerson, Dimitri N. Mavris:
A Brief History of Models and Model Based Systems Engineering and the Case for Relational Orientation. 581-592 - Roy S. Kalawsky, John T. O'Brien, Seng Kwong Chong, Chi-Biu Wong, Haibo Jia, Hongtao Pan, Philip R. Moore:
Bridging the Gaps in a Model-Based System Engineering Workflow by Encompassing Hardware-in-the-Loop Simulation. 593-605 - Allan Hodgson, Ella-Mae Hubbard, Carys E. Siemieniuch:
Toward an Understanding of Culture and the Performance of Teams in Complex Systems. 606-615 - Pradeepkumar Ashok, Delbert Tesar:
The Need for a Performance Map Based Decision Process. 616-631 - Miriam C. Bergue Alves, Doron Drusinsky, James Bret Michael, Man-tak Shing:
End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software. 632-641 - Sunday C. Ekpo, Danielle George:
A System Engineering Analysis of Highly Adaptive Small Satellites. 642-648 - W. H. Ip, Dingwei Wang, Vincent Cho:
Aircraft Ground Service Scheduling Problems and Their Genetic Algorithm With Hybrid Assignment and Sequence Encoding Scheme. 649-657 - Jianling Hu, Ruhai Wang, Qinyu Zhang, ZhiGuo Wei, Jia Hou:
Aggregation of DTN Bundles for Space Internetworking Systems. 658-668 - Dino Giuli, Federica Paganelli, Stefano Cuomo, Paolo Cianchi:
Toward a Cooperative Approach for Continuous Innovation of Mobility Information Services. 669-680 - V. S. K. Murthy Balijepalli, Shrikrishna A. Khaparde:
Enablement of Consumer-Oriented Interoperable Systems With Integration of CIM and Green Button Standards. 681-691 - Michael N. Kalochristianakis, Kostas Grammatikakis, Manolis Saldaris, Ioannis Demesoukas, Grigoris Tzanodaskalakis:
The Concept and Design of an Open Integrated Print Charging System. 692-699 - Khaled Mohammad Alawasa, Yasser Abdel-Rady I. Mohamed, Wilsun Xu:
Modeling, Analysis, and Suppression of the Impact of Full-Scale Wind-Power Converters on Subsynchronous Damping. 700-712 - Geev Mokryani, Pierluigi Siano, Antonio Piccolo, Zhe Chen:
Improving Fault Ride-Through Capability of Variable Speed Wind Turbines in Distribution Networks. 713-722 - Mahda J. Jahromi, Ali I. Maswood, King-Jet Tseng:
Design and Evaluation of a Tidal In-Stream Generator Power Port. 723-731 - Zakaria Mohd. Amin, Ali I. Maswood, M. N. A. Hawlader, Essam A. Al-Ammar, Jamel Orfi, Hany A. Al-Ansary:
Desalination With a Solar-Assisted Heat Pump: An Economic Optimization. 732-741 - Taher Niknam, Mohammad Rasoul Narimani, Rasoul Azizipanah-Abarghooee, Bahman Bahmani Firouzi:
Multiobjective Optimal Reactive Power Dispatch and Voltage Control: A New Opposition-Based Self-Adaptive Modified Gravitational Search Algorithm. 742-753 - Taher Niknam, Faranak Golestaneh:
Enhanced Bee Swarm Optimization Algorithm for Dynamic Economic Dispatch. 754-762 - Taher Niknam, Rasoul Azizipanah-Abarghooee, Mohsen Zare, Bahman Bahmani Firouzi:
Reserve Constrained Dynamic Environmental/Economic Dispatch: A New Multiobjective Self-Adaptive Learning Bat Algorithm. 763-776 - Behnam Mohammadi-Ivatloo, Abbas Rabiee, Alireza Soroudi:
Nonconvex Dynamic Economic Power Dispatch Problems Solution Using Hybrid Immune-Genetic Algorithm. 777-785 - Noradin Ghadimi, Mohammad Afkousi-Paqaleh, Alireza Nouri:
PSO Based Fuzzy Stochastic Long-Term Model for Deployment of Distributed Energy Resources in Distribution Systems With Several Objectives. 786-796 - Nguyen Cong Hien, Nadarajah Mithulananthan, Ramesh C. Bansal:
Location and Sizing of Distributed Generation Units for Loadabilty Enhancement in Primary Feeder. 797-806 - Bibhu Prasad Padhy, S. C. Srivastava, Nishchal K. Verma:
A Coherency-Based Approach for Signal Selection for Wide Area Stabilizing Control in Power Systems. 807-816 - S. M. Muyeen, Ahmed Al-Durra:
Modeling and Control Strategies of Fuzzy Logic Controlled Inverter System for Grid Interconnected Variable Speed Wind Generator. 817-824 - Hany M. Hasanien:
Design Optimization of PID Controller in Automatic Voltage Regulator System Using Taguchi Combined Genetic Algorithm Method. 825-831 - Raul Martinez Oviedo, Filipe Ramos, Sedat Görmüs, Parag Kulkarni, Mahesh Sooriyabandara:
A Comparison of Centralized and Distributed Monitoring Architectures in the Smart Grid. 832-844 - Emanuele Ciapessoni, Diego Cirio, Samuele Grillo, Stefano Massucco, Andrea Pitto, Federico Silvestro:
An Integrated Platform for Power System Security Assessment Implementing Probabilistic and Deterministic Methodologies. 845-853 - Evangelos I. Bilis, Wolfgang Kröger, Nan Cen:
Performance of Electric Power Systems Under Physical Malicious Attacks. 854-865 - S. Anbazhagan, Narayanan Kumarappan:
Day-Ahead Deregulated Electricity Market Price Forecasting Using Recurrent Neural Network. 866-872 - Alireza Nouri, Mohammad Afkousi-Paqaleh, Seyed Hamid Hosseini:
Probabilistic Assessment and Sensitivity Analysis of Marginal Price of Different Services in Power Markets. 873-880 - Justin M. Foster, Gerardo Trevino, Michael Kuss, Michael C. Caramanis:
Plug-In Electric Vehicle and Voltage Support for Distributed Solar: Theory and Application. 881-888 - Syamantak Saha:
GARO Framework: A Genetic Algorithm Based Resource Optimization for Organizational Efficiency. 889-895
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.