researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJSSC
Home
Index
Info
Volume
Volume
5
, Issue
4
187
--
200
Wafa Ben Jaballah
,
Mohamed Mosbah
,
Habib Youssef
,
Akka Zemmari
.
Lightweight secure group communications for resource constrained devices
201
--
208
Tatsushi Tokuyasu
,
Wako Okamura
,
Toru Kusano
,
Masafumi Inomata
,
Norio Shiraishi
,
Seigo Kitano
.
Training system for endoscopic surgery with haptic guide function and augmented reality
209
--
221
Jiahong Wang
,
Eiichiro Kodama
,
Toyoo Takata
.
Identifying relations between frequent patterns mined at two collaborative websites
222
--
229
Kiyotaka Fujisaki
,
Mitsuo Tateiba
.
Investigation of airplanes effects on VSAT satellite communication systems
230
--
241
Jiaqing Lin
,
Hiroaki Nishino
.
A construction-from-parts-type 3D modeller for digital fabrication
Volume
5
, Issue
3
129
--
140
Dhiya Al-Jumeily
,
Abir Jaafar Hussain
,
Paul Fergus
.
Using adaptive neural networks to provide self-healing autonomic software
141
--
149
Danai Chasaki
,
Christopher Mansour
.
Security challenges in the internet of things
150
--
158
Robert Hegarty
,
John Haggerty
.
Extrusion detection of illegal files in cloud-based systems
159
--
167
Rubem Pereira
,
Ella G. Pereira
.
Future internet: trends and challenges
168
--
177
Tetsuya Shigeyasu
,
Junko Nagamine
.
DCR-MAC: a data channel recommending MAC for multi-channel WLANs toward the higher throughput performance
178
--
186
Patricia Morreale
,
Allan Goncalves
,
Carlos Silva
.
Mobile ad hoc network communication for disaster recovery
Volume
5
, Issue
2
65
--
75
Abul Bashar
.
Graphical modelling approach for monitoring and management of telecommunication networks
76
--
88
Xiaoping Che
,
Stephane Maag
.
Formally testing the protocol performances
89
--
99
Felipe Barbosa Abreu
,
Anderson Nunes Paiva Morais
,
Ana R. Cavalli
,
Bachar Wehbi
,
Edgardo Montes de Oca
,
Wissam Mallouli
.
An effective attack detection approach in wireless mesh networks
100
--
114
Slimane Hammoudi
,
Valérie Monfort
,
Olivier Camp
.
Model driven development of user-centred context aware services
115
--
125
Oscar Rodas
,
Marco Antonio To
.
A study on network security monitoring for the hybrid classification-based intrusion prevention systems
Volume
5
, Issue
1
1
--
8
Jiro Iwashige
,
Leonard Barolli
,
Saki Kameyama
,
Motohiko Iwaida
.
Investigation of diffracted fields in buildings and wedges: a comparison study
9
--
22
Ganapathy Mani
.
Clone attack detection and data loss prevention in mobile ad hoc networks
23
--
38
Khedija Arour
,
Saloua Zammali
,
Amel Bouzeghoub
.
Test-bed building process for context-aware peer-to-peer information retrieval evaluation
39
--
52
Ta Yuan Hsu
,
Ajay D. Kshemkalyani
.
Variable social vector clocks for exploring user interactions in social communication networks
53
--
62
Hiroki Kuzuno
,
Satoshi Tonami
.
Detection of sensitive information leakage in Android applications using signature generation