1083 | -- | 1085 | Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou. Special issue on next generation communication and network security |
1086 | -- | 1093 | Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee. The effective method of database server forensics on the enterprise environment |
1094 | -- | 1101 | Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim. Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware |
1102 | -- | 1111 | Lingli Deng, Qing Yu, Jin Peng. Adaptive scheduling strategies for cloud-based resource infrastructures |
1112 | -- | 1120 | Shangguang Wang, Hua Zou, Qibo Sun, Fangchun Yang. Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications |
1121 | -- | 1130 | Y. H. Zhang, X. F. Chen, H. Li, J. Cao. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks |
1131 | -- | 1140 | Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang. Detecting SYN flooding attacks based on traffic prediction |
1141 | -- | 1146 | Jongsung Kim. Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED |
1147 | -- | 1158 | Cándido Caballero-Gil, Pino Caballero-Gil, Jezabel Molina-Gil. Self-organizing life cycle management of mobile ad hoc networks |
1159 | -- | 1168 | Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng. On the security of PPPoE network |
1169 | -- | 1180 | Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou, Qin Zhang. Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas |
1181 | -- | 1192 | Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha. A quantitative approach to estimate a website security risk using whitelist |
1193 | -- | 1198 | Hai-Cheng Chu, Szu-Wei Yang, Jong Hyuk Park. A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition |
1199 | -- | 1208 | Dong Seong Kim, Sang Min Lee, Tae-Hwan Kim, Jong Sou Park. Quantitative intrusion intensity assessment for intrusion detection systems |
1209 | -- | 1220 | M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah, Deokjai Choi. Simple SMS spam filtering on independent mobile phone |