Journal: J. Internet Serv. Inf. Secur.

Volume 5, Issue 4

1 -- 19Fang-Yie Leu, Hsin-Liang Chen, Chih-Chung Cheng. Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA
20 -- 40Kazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. Construction of a Mega Disaster Crisis Management System
41 -- 59Cihan Tunc, Salim Hariri. CLaaS: Cybersecurity Lab as a Service
60 -- 84Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models
85 -- 97Pratik Satam, Hamid Alipour, Youssif B. Al-Nashif, Salim Hariri. Anomaly Behavior Analysis of DNS Protocol

Volume 5, Issue 3

1 -- 18M. Devipriya, B. Nithya, C. Mala. Hashing Based Distributed Backoff (HBDB) Mechanism for IEEE 802.11 Wireless Networks
19 -- 36Parisa Kaghazgaran, Hassan Takabi. Toward an Insider Threat Detection Framework Using Honey Permissions
37 -- 47Sooyeon Shin, Taekyoung Kwon 0002. A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage
48 -- 57Yong-Hwan Lee, Hyochang Ahn, Han-Jin Cho, June-Hwan Lee. Object Recognition and Tracking based on Object Feature Extracting
58 -- 79Todd Booth, Karl Andersson. Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks

Volume 5, Issue 2

1 -- 3Carol J. Fung, Weverton Cordeiro. Guest Editorial: Special issue on Next Generation Networks and Systems Security
4 -- 23David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu. Robust Detection of Rogue Signals in Cooperative Spectrum Sensing
24 -- 32Mehrdad Nojoumian, Douglas R. Stinson. Sequential Secret Sharing as a New Hierarchical Access Structure
33 -- 46Bahman Rashidi, Carol J. Fung. Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model
47 -- 64Jiwan Ninglekhu, Ram Krishnan, Eugene John, Manoj Panday. Securing Implantable Cardioverter Defibrillators Using Smartphones

Volume 5, Issue 1

1 -- 2Mario Bravetti, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio Montesi. Guest Editorial: Special Issue on Service-Oriented Architectures and Programming
3 -- 28Nuno Oliveira 0001, Alexandra Silva 0001, Luís Soares Barbosa. Reo: interactive Markov chains for Stochastic Reo
29 -- 52Carlos Parra, Diego Joya. SPLIT: An Automated Approach for Enterprise Product Line Adoption Through SOA
53 -- 69Sushama Karumanchi, Anna Cinzia Squicciarini. A Large Scale Study of Web Service Vulnerabilities
70 -- 84Jason R. C. Nurse, Arnau Erola, Michael Goldsmith, Sadie Creese. Investigating the leakage of sensitive personal and organisational information in email headers