Journal: IJICS

Volume 3, Issue 3/4

228 -- 244Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun. REputation based Clustering Algorithm for security management in ad hoc networks with liars
245 -- 264Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul. A new protocol for security and QoS in IP networks
265 -- 279Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-based intrusion detection in web applications by monitoring Java information flows
280 -- 305Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Hervé Debar. An ontology-based approach to react to network attacks
306 -- 320Clara Bertolissi, Maribel Fernández. Distributed event-based access control
321 -- 336Monia Loulou, Mohamed Jmaiel, Mohamed Mosbah. Dynamic security framework for mobile agent systems: specification, verification and enforcement
337 -- 354Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Andreas Sewe. A holistic approach for access control policies: from formal specification to aspect-based enforcement

Volume 3, Issue 2

114 -- 131David M. Nicol, Charles M. Davis, Thomas J. Overbye. A testbed for power system security evaluation
132 -- 149Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su, Chung-Han Chen. Weighted trust evaluation-based malicious node detection for wireless sensor networks
150 -- 172Prashant Dewan, Partha Dasgupta, Amiya Bhattacharya. Mitigating routing vulnerabilities in ad hoc networks using reputations
173 -- 194Men Long, Chwan-Hwa John Wu. Design and simulation on data-forwarding security in sensor networks
195 -- 223Chwan-Hwa John Wu, Tong Liu, Chun-Ching Andy Huang, J. David Irwin. Modelling and simulations for Identity-Based Privacy-Protected Access Control Filter (IPACF) capability to resist massive denial of service attacks

Volume 3, Issue 1

1 -- 46Shankar Bhausaheb Nikam, Suneeta Agarwal. Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection
47 -- 59Min Yang, Qingshu Meng, Huanguo Zhang. The evolutionary design of trace form bent functions in cryptography
60 -- 85Karen Renaud. Guidelines for designing graphical authentication mechanism interfaces
86 -- 110Sanjay Rawat 0001, Ashutosh Saxena. Application security code analysis: a step towards software assurance