Journal: J. Comput. Syst. Sci.

Volume 83, Issue 1

1 -- 2Kim-Kwang Raymond Choo, Jemal Abawajy, Md. Rafiqul Islam 0001. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions
3 -- 21Gustavo Gonzalez Granadillo, Joaquín García, Hervé Debar. A polytope-based approach to measure the impact of events against critical infrastructures
22 -- 42Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen. A dynamic prime number based efficient security mechanism for big sensing data streams
43 -- 57Martin Grill, Tomás Pevný, Martin Rehák. Reducing false positives of network anomaly detection by local adaptive multivariate smoothing
58 -- 72Adnan Anwar, Abdun Naser Mahmood, Mark Pickering. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
73 -- 83Chao Lin, Wei Wu, Xinyi Huang, Li Xu. A new universal designated verifier transitive signature scheme for big graph data
84 -- 100Vitaly Ford, Ambareen Siraj, Mohammad Ashiqur Rahman. Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis
101 -- 120Stefan Haar, Serge Haddad, Tarek Melliti, Stefan Schwoon. Optimal constructions for active diagnosis
121 -- 131Gregory Gutin, Magnus Wahlström, Anders Yeo. Rural postman parameterized by the number of components of required edges
132 -- 158Josep Díaz, Olli Pottonen, Maria J. Serna, Erik Jan van Leeuwen. Complexity of metric dimension on planar graphs
159 -- 179Le Hoang Son, Pham Huy Thong. Soft computing methods for WiMax Network Planning on 3D Geographical Information Systems
180 -- 206Tomasz Gogacz, Jerzy Marcinkowski. Converging to the chase - A tool for finite controllability
207 -- 214Shmuel Onn. Huge tables and multicommodity flows are fixed-parameter tractable via unimodular integer Carathéodory