Journal: IJSN

Volume 10, Issue 4

207 -- 213Zuhua Guo, Lixin Xu. Research of security structure model for web application systems based on the relational database
214 -- 221Yucai Zhou, Tong Wang, Xinlin Zhao. A hybrid recommendation algorithm based on time factor
222 -- 227Tong Wang, Xinlin Zhao, Yucai Zhou. Community detection in social network using shuffled frog-leaping optimisation
228 -- 238Zhiming Zhang, Fuying Wu, Changgen Jiang, Jiangang Deng. An efficient detection scheme of node replication attacks for wireless sensor networks
239 -- 254Fnu Shalini, Yang Xiao, Bo Sun. ProtoGENI experiments
255 -- 260Jian Huang. Research on optimisation and application of improved fuzzy neural network control algorithm
261 -- 270Myungseok Song, Jun Dong Cho, Jongpil Jeong. Random-walk mobility management scheme for sensor-based mobile networks

Volume 10, Issue 3

137 -- 150Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
151 -- 169Jingcheng Gao, Yang Xiao, Sneha Rao, Fnu Shalini. Security tests and attack experimentations of ProtoGENI
170 -- 182Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath. Accurate geolocation using network coordinates
183 -- 190Mohammed Amin Benamara, Huixian Li. Secure of personal health records shared in cloud computing using cipher-text attribute based encryption
191 -- 206Mohamed Sarrab. Bytecode instrumentation mechanism for monitoring mobile application information flow

Volume 10, Issue 2

65 -- 75N. M. Saravana Kumar, S. Lavanya. A novel scheme for secure group communication in multicast network
76 -- 83Jai-Pil Oh, Dong-Ho Kim. System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service
84 -- 90Inkyoo Park, Jongjin Park, Gyooseok Choi. Using Bayesian posterior probability in confidence of attributes for feature selection
91 -- 106Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao. Network forensics analysis using Wireshark
107 -- 123Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari. Chain reduction of authorisation certificates
124 -- 136Jared Lee, Thomas H. Austin, Mark Stamp. Compression-based analysis of metamorphic malware

Volume 10, Issue 1

1 -- 8Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer. A blind 3D watermarking technique using spherical coordinates and skewness measure
9 -- 19Bhawana Rudra, O. P. Vyas. Understanding and mitigating security and authentication issues in service oriented network architecture
20 -- 31Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad. A system-wide anonymity metric with message multiplicities
32 -- 41Arshi Agrawal, Mark Stamp. Masquerade detection on GUI-based Windows systems
42 -- 47Alex Ming Hui Wong, Dae-Ki Kang. Game layout and artificial intelligence implementation in mobile 3D tower defence game
48 -- 55Jongdeug Kim, Taehyun Jeon. Efficient resource allocation for mobile instant messaging service in wireless network
56 -- 63Ki-Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo Seok Choi, Sang-bong Park, Yun Sik Lim, Jeong Jin Kang. Spatio-temporal XACML: the expansion of XACML for access control