Journal: IJSN

Volume 14, Issue 4

181 -- 190Guillaume Brogi, Elena Di Bernardino. Hidden Markov models for advanced persistent threats
191 -- 204Ben Smyth, Yoshikazu Hanatani. Non-malleable encryption with proofs of plaintext knowledge and applications to voting
205 -- 220Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Petros Nicopolitidis. OAP-WMN: optimised and secure authentication protocol for wireless mesh networks
221 -- 237Imen Bouabidi, Pr. Mahmoud Abdellaoui. A novel cryptographic solution to secure mobile wireless sensors networks
238 -- 249L. Mancy, S. Maria Celestin Vigila. Medical image protection using diffusion, substitution and reversible data hiding based on prediction

Volume 14, Issue 3

119 -- 132Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse. Efficient revocable CP-ABE for big data access control in cloud computing
133 -- 145Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti. Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems
146 -- 157Thiago S. Rocha, Eduardo Souto, Khalil El-Khatib. Techniques to detect data leakage in mobile applications
158 -- 166Naveen Bindra, Manu Sood. Why, what and how to measure and improve the security of networks (a snapshot of the current situation of security metrics and the way forward)
167 -- 179Anil Yadav, Nitin Rakesh, Sujata Pandey, Rajat Kumar Singh. Optimising the DTLS handshake design for TEE enabled sensor nodes

Volume 14, Issue 2

61 -- 77Tayeb Diab, Marc Gilg, Pascal Lorenz. A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks
78 -- 85Mikhail Styugin. Dynamic key password authentication
86 -- 94Chao Wang. A dynamic evolution model of balanced energy consumption scale-free fault-tolerant topology based on fitness function for wireless sensor networks
95 -- 102Along Yu, Jiajia Ji, ShiYu Sun. An improved multi-objective genetic algorithm and data fusion in structural damage identification
103 -- 118Victor G. T. da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpelão. Mobile botnets detection based on machine learning over system calls

Volume 14, Issue 1

1 -- 9Suresh Prasad Kannojia, Jasvant Kumar. XOR-based unexpanded meaningful visual secret sharing scheme
10 -- 22Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza. Group-IKEv2 for multicast IPsec in the internet of things
23 -- 33Ling Song 0003, Liqin Zhao, Jin Ye. A DV-Hop positioning algorithm based on the glowworm swarm optimisation of mixed chaotic strategy
34 -- 46Yani Cui, Jia Ren, Delong Fu, Chao Dong. A formation generation algorithm of multiple agents in naval battlefield environments
47 -- 60B. Thanudas, Sreelal Shridharan, Velankanni Cyril Raj, Anugolu Purnesh Sairam, Vinay Gajmoti, Palash Joshi. A novel architecture for an integrated enterprise network security system