Journal: IJSSC

Volume 5, Issue 4

187 -- 200Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari. Lightweight secure group communications for resource constrained devices
201 -- 208Tatsushi Tokuyasu, Wako Okamura, Toru Kusano, Masafumi Inomata, Norio Shiraishi, Seigo Kitano. Training system for endoscopic surgery with haptic guide function and augmented reality
209 -- 221Jiahong Wang, Eiichiro Kodama, Toyoo Takata. Identifying relations between frequent patterns mined at two collaborative websites
222 -- 229Kiyotaka Fujisaki, Mitsuo Tateiba. Investigation of airplanes effects on VSAT satellite communication systems
230 -- 241Jiaqing Lin, Hiroaki Nishino. A construction-from-parts-type 3D modeller for digital fabrication

Volume 5, Issue 3

129 -- 140Dhiya Al-Jumeily, Abir Jaafar Hussain, Paul Fergus. Using adaptive neural networks to provide self-healing autonomic software
141 -- 149Danai Chasaki, Christopher Mansour. Security challenges in the internet of things
150 -- 158Robert Hegarty, John Haggerty. Extrusion detection of illegal files in cloud-based systems
159 -- 167Rubem Pereira, Ella G. Pereira. Future internet: trends and challenges
168 -- 177Tetsuya Shigeyasu, Junko Nagamine. DCR-MAC: a data channel recommending MAC for multi-channel WLANs toward the higher throughput performance
178 -- 186Patricia Morreale, Allan Goncalves, Carlos Silva. Mobile ad hoc network communication for disaster recovery

Volume 5, Issue 2

65 -- 75Abul Bashar. Graphical modelling approach for monitoring and management of telecommunication networks
76 -- 88Xiaoping Che, Stephane Maag. Formally testing the protocol performances
89 -- 99Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli. An effective attack detection approach in wireless mesh networks
100 -- 114Slimane Hammoudi, Valérie Monfort, Olivier Camp. Model driven development of user-centred context aware services
115 -- 125Oscar Rodas, Marco Antonio To. A study on network security monitoring for the hybrid classification-based intrusion prevention systems

Volume 5, Issue 1

1 -- 8Jiro Iwashige, Leonard Barolli, Saki Kameyama, Motohiko Iwaida. Investigation of diffracted fields in buildings and wedges: a comparison study
9 -- 22Ganapathy Mani. Clone attack detection and data loss prevention in mobile ad hoc networks
23 -- 38Khedija Arour, Saloua Zammali, Amel Bouzeghoub. Test-bed building process for context-aware peer-to-peer information retrieval evaluation
39 -- 52Ta Yuan Hsu, Ajay D. Kshemkalyani. Variable social vector clocks for exploring user interactions in social communication networks
53 -- 62Hiroki Kuzuno, Satoshi Tonami. Detection of sensitive information leakage in Android applications using signature generation