Journal: IJSN

Volume 12, Issue 4

207 -- 214Zhenhua Wei, Zhifeng Liu, Jie Miao, Lihua Li, Wei Xu. Configurable workflow platform based on SaaS model
215 -- 229Yingjie Chen, Baijian Yang, Weijie Wang. NetFlowMatrix: a visual approach for analysing large NetFlow data
230 -- 240Jamal Ghasemi, Jamal Esmaily. Intrusion detection systems using a hybrid SVD-based feature extraction method
241 -- 254Sumanta Chatterjee, Shashidhar G. Koolagudi. Hierarchical secret sharing scheme using parts of speech of English grammar
255 -- 272Danny Velasco, Glen D. Rodriguez Rafael. A review of the current state of Honeynet architectures and tools

Volume 12, Issue 3

135 -- 140Cheng Peng, Canqing Zhang, Cheng Peng, Junfeng Man. A reinforcement learning approach to map reduce auto-configuration under networked environment
141 -- 151Yuxia Shen. Distributed storage system model design in internet of things based on hash distribution
152 -- 167Guangcheng Zheng. Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system
168 -- 187Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing. Insider threat detection and its future directions
188 -- 197Gurdip Kaur, Renu Dhir, Maninder Singh. Anatomy of ransomware malware: detection, analysis and reporting
198 -- 205Baohong Li, Baojun Li, Yinliang Zhao. Generic construction of role-based encryption in the standard model

Volume 12, Issue 2

65 -- 69Junfeng Man, Cheng Peng, Yinghui Ma, Changyun Li. The network software multistep control algorithm based on NNVD research
70 -- 82Chuah Chai Wen, Ed Dawson, Leonie Simpson. Stream cipher based key derivation function
83 -- 102Shubair A. Abdulla. Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms
103 -- 111Zhiqiang Liu, Tong Wang, Xibo Wang. Destination unaware geometric routing for delay tolerant networks
112 -- 119Xiaojun Deng, Tao Zhang, Xunyu He. Finishing the tiny flows quickly for common data centre services
120 -- 133Yefeng Ruan, Xukai Zou. Receipt-freeness and coercion resistance in remote E-voting systems

Volume 12, Issue 1

1 -- 12Ismeet Kaur Makkar, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp. SocioBot: a Twitter-based botnet
13 -- 26Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz. Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach
27 -- 39Avinash Srinivasan, Jie Wu 0001, Justin Y. Shi. Secure android covert channel with robust survivability to service provider restrictions
40 -- 50Maria Charalampidou, George Pavlidis, Spyridon G. Mouroutsos. A novel modular wireless sensor networks approach for security applications
51 -- 55Wei Yuan Zhou, Li Jian Chen, Keji Mao, Ming Xia, Ruohong Huan. A RFID-based prisoner localisation system
56 -- 63Li Jian Chen, Wei Yuan Zhou, Keji Mao, Ming Xia, Ruohong Huan. A beacon-free localisation algorithm in wireless sensor networks