793 | -- | 806 | Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini. TOGBAD - an approach to detect routing attacks in tactical environments |
807 | -- | 814 | Wassim El-Hajj, Hazem M. Hajj, Zouheir Trabelsi, Fadi A. Aloul. Updating snort with a customized controller to thwart port scanning |
815 | -- | 824 | Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang. A robust user authentication scheme with self-certificates for wireless sensor networks |
825 | -- | 838 | D. A. Knox, C. Adams. Digital credentials with privacy-preserving delegation |
839 | -- | 869 | Adel Ali Ahmed, Norsheila Fisal. Secure real-time routing protocol with load distribution in wireless sensor networks |
860 | -- | 870 | Lei Wu, Jerome Harrington, Corey Kuwanoe, Cliff Changchun Zou. Harnessing the power of BitTorrent for distributed denial-of-service attacks |
871 | -- | 887 | Alexander J. O Ree, Mohammad S. Obaidat. Security enhancements for UDDI |
888 | -- | 901 | Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy, David Tipper. Source - destination obfuscation in wireless ::::ad hoc::::networks |
902 | -- | 909 | Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil. An embedded DSP hardware encryption module for secure e-commerce transactions |
910 | -- | 918 | Ming-Yang Su, Sheng-Cheng Yeh. A study on the prevention of sniffing nodes in mobile ::::ad hoc:::: networks |
919 | -- | 936 | Fazirulhisyam Hashim, Abbas Jamalipour. A generic sampling framework for improving anomaly detection in the next generation network |
937 | -- | 946 | Haitham Rashwan, Ernst M. Gabidulin, Bahram Honary. Security of the GPT cryptosystem and its applications to cryptography |
947 | -- | 965 | Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici. Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content |
966 | -- | 978 | Yanling Chen, A. J. Han Vinck. Secrecy coding for the binary symmetric wiretap channel |