Abstract is missing.
- Sensor Network Applications Implemented by Industry and Their Security ChallengesErdal Cayirci. 1 [doi]
- Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-MatchingJianhua Yang, Byong Lee. 2-12 [doi]
- Preventing DDoS Attacks Based on Credit Model for P2P Streaming SystemJun Yang, Ying Li, Benxiong Huang, Jiuqiang Ming. 13-20 [doi]
- Design, Prototype, and Evaluation of a Network Monitoring LibraryKarl-André Skevik, Vera Goebel, Thomas Plagemann. 21-35 [doi]
- Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LANGaeil An, Kiyoung Kim. 36-46 [doi]
- A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing EnvironmentsMohsen Taherian, Rasool Jalili, Morteza Amini. 47-59 [doi]
- Using Automated Planning for Trusted Self-organising Organic Computing SystemsBenjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer. 60-72 [doi]
- A Trusted Group Signature Architecture in Virtual Computing EnvironmentDeqing Zou, Yunfa Li, Song Wu, Weizhong Qiang. 73-85 [doi]
- SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer NetworksXiaowei Chen, Kaiyong Zhao, Xiaowen Chu. 86-99 [doi]
- Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search SchemesWei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi. 100-105 [doi]
- An Integrated Solution for Policy Filtering and Traffic Anomaly DetectionZhijun Wang, Hao Che, Jiannong Cao. 106-120 [doi]
- Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore InstallationsMartin Gilje Jaatun, Tor Olav Grøtan, Maria B. Line. 121-133 [doi]
- SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc NetworksZhengxin Lu, Chen Huang, Furong Wang, Chunming Rong. 134-148 [doi]
- Scheduling for Reliable Execution in Autonomic SystemsTerry Tidwell, Robert Glaubius, Christopher D. Gill, William D. Smart. 149-161 [doi]
- Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service AdaptationChristoph Dorn, Hong Linh Truong, Schahram Dustdar. 162-176 [doi]
- Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant RobotsBojan Jakimovski, Erik Maehle. 177-190 [doi]
- Maximising Personal Utility Using Intelligent Strategy in Minority GameYingni She, Ho-Fung Leung. 191-205 [doi]
- Simulation-Based Optimization Approach for Software Cost Model with RejuvenationHiroyuki Eto, Tadashi Dohi, Jianhua Ma. 206-218 [doi]
- Organic Control of Traffic LightsHolger Prothmann, Fabian Rochner, Sven Tomforde, Jürgen Branke, Christian Müller-Schloer, Hartmut Schmeck. 219-233 [doi]
- Concepts for Autonomous Control Flow Checking for Embedded CPUsDaniel Ziener, Jürgen Teich. 234-248 [doi]
- Autonomous Querying for Knowledge NetworksKieran Greer, Matthias Baumgarten, Chris D. Nugent, Maurice D. Mulvenna, Kevin Curran. 249-263 [doi]
- Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected DatabaseJuryon Paik, Junghyun Nam, Hee Yong Youn, Ung-Mo Kim. 264-278 [doi]
- Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh NetworkFurong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang. 279-288 [doi]
- Self-reconfiguration in Highly Available Pervasive Computing SystemsHadi Hemmati, Rasool Jalili. 289-301 [doi]
- Modeling Modern Social-Network-Based Epidemics: A Case Study of RoseSirui Yang, Hai Jin, Xiaofei Liao, Sanmin Liu. 302-315 [doi]
- An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSLMike Hinchey, Emil Vassev. 316-330 [doi]
- Distributed Performance Control in Organic Embedded SystemsSteffen Stein, Rolf Ernst. 331-342 [doi]
- An Operating System Architecture for Organic Computing in Embedded Real-Time SystemsFlorian Kluge, Jörg Mische, Sascha Uhrig, Theo Ungerer. 343-357 [doi]
- Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor NetworksReinhard Mörgenthaler, Markus Zeller, Josef Jiru. 358-372 [doi]
- Embedding Dynamic Behaviour into a Self-configuring Software SystemPaul Ward, Mariusz Pelc, James Hawthorne, Richard Anthony. 373-387 [doi]
- Service Discovery of IP Cameras Using SIP and Zeroconf ProtocolsYi-Chih Tung, Chien-Min Ou, Wen-Jyi Hwang, Wei-De Wu. 388-402 [doi]
- Adaptability of the TRSIM Model to Some Changes in Agents BehaviourAlberto Caballero, Juan A. Botía, Antonio F. Gómez-Skarmeta. 403-417 [doi]
- Trusting Groups in Coalition Formation Using Social DistancePeter Shaw, Paul Sage, Peter Milligan. 418-428 [doi]
- Adjustable Trust Model for Access ControlMaryna Komarova, Michel Riguidel. 429-443 [doi]
- Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback FilteringChunmei Gui, Quanyuan Wu, Huaimin Wang, Jian Qiang. 444-454 [doi]
- A User Behavior Based Trust Model for Mobile ApplicationsZheng Yan, Valtteri Niemi, Yan Dong, Guoliang Yu. 455-469 [doi]
- Managing Contracts in Pleiades Using Trust ManagementChristoffer Norvik, John P. Morrison, Dan C. Marinescu, Chen Yu, Gabriela M. Marinescu, Howard Jay Siegel. 470-480 [doi]
- A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamilyStefano Bistarelli, Fabio Martinelli, Francesco Santini. 481-495 [doi]
- Annotation Markers for Runtime Replication Protocol SelectionHein Meling. 496-506 [doi]
- Enhanced Three-Round Smart Card-Based Key Exchange ProtocolEun-Jun Yoon, Kee-Young Yoo. 507-515 [doi]
- Assertions Signcryption Scheme in Decentralized Autonomous Trust EnvironmentsMingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang. 516-526 [doi]
- A Study of Information Security Practice in a Critical Infrastructure ApplicationMartin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Stig Ole Johnsen, Irene Wærø, Odd Helge Longva, Inger Anne Tøndel. 527-539 [doi]
- Web Search Results Clustering Based on a Novel Suffix Tree StructureJunze Wang, Yijun Mo, Benxiong Huang, Jie Wen, Li He. 540-554 [doi]
- Di-GAFR: Directed Greedy Adaptive Face-Based RoutingTao Yang, Ye Huang, Jianxin Chen, Geng Yang, Chunming Rong. 555-566 [doi]
- Cooperative Management Framework for Inter-domain Routing SystemNing Hu, Peng Zou, Peidong Zhu, Xin Liu. 567-576 [doi]
- Performance Problem Determination Using Combined Dependency Analysis for Reliable SystemShunshan Piao, Jeongmin Park, Eunseok Lee. 577-587 [doi]
- A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops BackwardsXiaogang Wang, Darren Xu, Junzhou Luo. 588-602 [doi]
- Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot BoxesArmando Astarloa, Unai Bidarte, Jaime Jimenez, Jesús Lázaro, Iñigo Martínez de Alegría. 603-614 [doi]
- Wireless Sensor Network Assisted Dynamic Path Planning for Transportation SystemsYue-Shan Chang, Tong-Ying Juang, Chen-Yi Su. 615-628 [doi]
- A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median FilterShang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang. 629-640 [doi]
- Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP ServerLin-Huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun-jian Liaw. 641-654 [doi]
- A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc NetworksHung-Chi Chu, Yi-Ting Hsu, Yong-Hsun Lai. 655-663 [doi]