Journal: IEEE Systems Journal

Volume 7, Issue 4

519 -- 0Vincenzo Piuri. Editorial
520 -- 527Hamid R. Darabi, Mo Mansouri. The Role of Competition and Collaboration in Influencing the Level of Autonomy and Belonging in System of Systems
528 -- 536Kemp H. Kernstine. Inadequacies of Traditional Exploration Methods in Systems-of-Systems Simulations
537 -- 548Asif Mahmood, Francesca Montagna. Making Lean Smart by Using System-of-Systems' Approach
549 -- 560Charles E. Dickerson. A Relational Oriented Approach to System of Systems Assessment of Alternatives for Data Link Interoperability
561 -- 570Claudio Roncoli, Chiara Bersani, Roberto Sacile. A Risk-Based System of Systems Approach to Control the Transport Flows of Dangerous Goods by Road
571 -- 580Evangelos Grigoroudis, Yannis A. Phillis. Modeling Healthcare System-of-Systems: A Mathematical Programming Approach
581 -- 592Charles E. Dickerson, Dimitri N. Mavris. A Brief History of Models and Model Based Systems Engineering and the Case for Relational Orientation
593 -- 605Roy S. Kalawsky, John O'Brien, Seng Kwong Chong, Chi-Biu Wong, Haibo Jia, Hongtao Pan, Philip R. Moore. Bridging the Gaps in a Model-Based System Engineering Workflow by Encompassing Hardware-in-the-Loop Simulation
606 -- 615Allan Hodgson, Ella-Mae Hubbard, Carys E. Siemieniuch. Toward an Understanding of Culture and the Performance of Teams in Complex Systems
616 -- 631Pradeepkumar Ashok, Delbert Tesar. The Need for a Performance Map Based Decision Process
632 -- 641Miriam C. Bergue Alves, Doron Drusinsky, James Bret Michael, Man-tak Shing. End-to-End Formal Specification, Validation, and Verification Process: A Case Study of Space Flight Software
642 -- 648Sunday C. Ekpo, Danielle George. A System Engineering Analysis of Highly Adaptive Small Satellites
649 -- 657W. H. Ip, Dingwei Wang, Vincent Cho. Aircraft Ground Service Scheduling Problems and Their Genetic Algorithm With Hybrid Assignment and Sequence Encoding Scheme
658 -- 668Jianling Hu, Ruhai Wang, Qinyu Zhang, ZhiGuo Wei, Jia Hou. Aggregation of DTN Bundles for Space Internetworking Systems
669 -- 680Dino Giuli, Federica Paganelli, Stefano Cuomo, Paolo Cianchi. Toward a Cooperative Approach for Continuous Innovation of Mobility Information Services
681 -- 691V. S. K. Murthy Balijepalli, S. A. Khaparde. Enablement of Consumer-Oriented Interoperable Systems With Integration of CIM and Green Button Standards
692 -- 699Michael N. Kalochristianakis, Kostas Grammatikakis, Manolis Saldaris, Ioannis Demesoukas, Grigoris Tzanodaskalakis. The Concept and Design of an Open Integrated Print Charging System
700 -- 712Khaled Mohammad Alawasa, Yasser Abdel-Rady I. Mohamed, Wilsun Xu. Modeling, Analysis, and Suppression of the Impact of Full-Scale Wind-Power Converters on Subsynchronous Damping
713 -- 722Geev Mokryani, Pierluigi Siano, Antonio Piccolo, Zhe Chen. Improving Fault Ride-Through Capability of Variable Speed Wind Turbines in Distribution Networks
723 -- 731Mahda J. Jahromi, Ali I. Maswood, King-Jet Tseng. Design and Evaluation of a Tidal In-Stream Generator Power Port
732 -- 741Zakaria Mohd. Amin, Ali I. Maswood, M. N. A. Hawlader, Essam A. Al-Ammar, Jamel Orfi, Hany A. Al-Ansary. Desalination With a Solar-Assisted Heat Pump: An Economic Optimization
742 -- 753Taher Niknam, Mohammad Rasoul Narimani, Rasoul Azizipanah-Abarghooee, Bahman Bahmani Firouzi. Multiobjective Optimal Reactive Power Dispatch and Voltage Control: A New Opposition-Based Self-Adaptive Modified Gravitational Search Algorithm
754 -- 762Taher Niknam, Faranak Golestaneh. Enhanced Bee Swarm Optimization Algorithm for Dynamic Economic Dispatch
763 -- 776Taher Niknam, Rasoul Azizipanah-Abarghooee, Mohsen Zare, Bahman Bahmani Firouzi. Reserve Constrained Dynamic Environmental/Economic Dispatch: A New Multiobjective Self-Adaptive Learning Bat Algorithm
777 -- 785Behnam Mohammadi-Ivatloo, Abbas Rabiee, Alireza Soroudi. Nonconvex Dynamic Economic Power Dispatch Problems Solution Using Hybrid Immune-Genetic Algorithm
786 -- 796Noradin Ghadimi, Mohammad Afkousi-Paqaleh, Alireza Nouri. PSO Based Fuzzy Stochastic Long-Term Model for Deployment of Distributed Energy Resources in Distribution Systems With Several Objectives
797 -- 806Nguyen Cong Hien, Nadarajah Mithulananthan, Ramesh C. Bansal. Location and Sizing of Distributed Generation Units for Loadabilty Enhancement in Primary Feeder
807 -- 816Bibhu Prasad Padhy, S. C. Srivastava, Nishchal K. Verma. A Coherency-Based Approach for Signal Selection for Wide Area Stabilizing Control in Power Systems
817 -- 824S. M. Muyeen, Ahmed Al-Durra. Modeling and Control Strategies of Fuzzy Logic Controlled Inverter System for Grid Interconnected Variable Speed Wind Generator
825 -- 831Hany M. Hasanien. Design Optimization of PID Controller in Automatic Voltage Regulator System Using Taguchi Combined Genetic Algorithm Method
832 -- 844Raul Martinez Oviedo, Filipe Ramos, Sedat Gormus, Parag Kulkarni, Mahesh Sooriyabandara. A Comparison of Centralized and Distributed Monitoring Architectures in the Smart Grid
845 -- 853Emanuele Ciapessoni, Diego Cirio, Samuele Grillo, Stefano Massucco, Andrea Pitto, Federico Silvestro. An Integrated Platform for Power System Security Assessment Implementing Probabilistic and Deterministic Methodologies
854 -- 865Evangelos I. Bilis, Wolfgang Kröger, Nan Cen. Performance of Electric Power Systems Under Physical Malicious Attacks
866 -- 872S. Anbazhagan, N. Kumarappan. Day-Ahead Deregulated Electricity Market Price Forecasting Using Recurrent Neural Network
873 -- 880Alireza Nouri, Mohammad Afkousi-Paqaleh, Seyed Hamid Hosseini. Probabilistic Assessment and Sensitivity Analysis of Marginal Price of Different Services in Power Markets
881 -- 888Justin M. Foster, Gerardo Trevino, Michael Kuss, Michael C. Caramanis. Plug-In Electric Vehicle and Voltage Support for Distributed Solar: Theory and Application
889 -- 895Syamantak Saha. GARO Framework: A Genetic Algorithm Based Resource Optimization for Organizational Efficiency

Volume 7, Issue 3

350 -- 0Sushil Jajodia, Pierangela Samarati. Guest Editorial
351 -- 362Angelo Rossi, Samuel Pierre, Suresh Krishnan. Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC
363 -- 373Teodor Sommestad, Mathias Ekstedt, Hannes Holm. The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures
374 -- 384Xiaofei Wang, Yang Xu, Junchen Jiang, Olga Ormond, Bin Liu, Xiaojun Wang. StriFA: Stride Finite Automata for High-Speed Regular Expression Matching in Network Intrusion Detection Systems
385 -- 395Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang. Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases
396 -- 409Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky. AS-CRED: Reputation and Alert Service for Interdomain Routing
410 -- 419Mingwu Zhang, Tsuyoshi Takagi. Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation
420 -- 429Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient Signcryption for Heterogeneous Systems
430 -- 441Suku Nair, Omar Al-Ibrahim, Subil Abraham. State Machine-Based Security Fusion for Resource-Constrained Environments
442 -- 454Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa, Djamal Benslimane. How to Enhance Privacy Within DaaS Service Composition?
455 -- 466Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg. Truly-Protect: An Efficient VM-Based Software Protection
467 -- 477Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers. Malware Target Recognition of Unknown Threats
478 -- 488Dawei Li, Xiaoyan Hong, Darwin Witt. ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study
489 -- 500Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto. Security Applications of Formal Language Theory
501 -- 515Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, Robert B. France. Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model

Volume 7, Issue 2

178 -- 0Sushil Jajodia, Pierangela Samarati. Guest Editorial
179 -- 188Hyoungshick Kim, Ross Anderson. An Experimental Evaluation of Robustness of Networks
189 -- 198Ebenezer Paintsil. Evaluation of Privacy and Security Risks Analysis Construct for Identity Management Systems
199 -- 210Rajiv Bagai, Bin Tang, Euna Kim. Effectiveness of Probabilistic Attacks on Anonymity of Users Communicating via Multiple Messages
211 -- 222Klaus Rechert, Konrad Meier, Richard M. Zahoransky, Dennis Wehrle, Dirk von Suchodoletz, Benjamin Greschbach, Sven Wohlgemuth, Isao Echizen. Reclaiming Location Privacy in Mobile Telephony Networks - Effects and Consequences for Providers and Subscribers
223 -- 235Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin. Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties
236 -- 248Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat. Lightweight Sybil Attack Detection in MANETs
249 -- 261Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow. Constant-Size Dynamic $k$ -Times Anonymous Authentication
262 -- 274Bassam Sayed, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat. Biometric Authentication Using Mouse Gesture Dynamics
275 -- 287Wolter Pieters, Trajce Dimkov, Dusko Pavlovic. Security Policy Alignment: A Formal Approach
288 -- 297Ravi Jhawar, Vincenzo Piuri, Marco D. Santambrogio. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
298 -- 310Ruben Rios, Javier Lopez. (Un)Suitability of Anonymous Communication Systems to WSN
311 -- 322Emiliano De Cristofaro, Roberto Di Pietro. Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems
323 -- 334Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, Dieudonne Mulamba, Mariappan Rajaram. Secure Logging as a Service - Delegating Log Management to the Cloud
335 -- 345Ryan Shea, Jiangchuan Liu. Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis

Volume 7, Issue 1

2 -- 3Vincenzo Piuri, Amir G. Aghdam, Saeid Nahavandi. Editorial
4 -- 12Sophia G. Petridou, Stylianos Basagiannis, Manos Roumeliotis. Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks
13 -- 25Bo Sun, Xuemei Shan, Kui Wu, Yang Xiao. Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
26 -- 35Kwantae Cho, Minho Jo, Taekyoung Kwon, Hsiao-Hwa Chen, Dong-Hoon Lee. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks
36 -- 49Andrew Tinka, Mohammad Rafiee, Alexandre M. Bayen. Floating Sensor Networks for River Studies
50 -- 58Xinheng Wang, Shancang Li. Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets
59 -- 67Bin Han, Wenbo Wang 0007, Yong Li, Mugen Peng. Investigation of Interference Margin for the Co-existence of Macrocell and Femtocell in Orthogonal Frequency Division Multiple Access Systems
68 -- 76Shiwei Huang, Hongbin Chen, Yan Zhang, Hsiao-Hwa Chen. Sensing-Energy Tradeoff in Cognitive Radio Networks With Relays
77 -- 91Yuh-Shyan Chen, Jia-Shiang Hong. A Relay-Assisted Protocol for Spectrum Mobility and Handover in Cognitive LTE Networks
92 -- 101Zhiwei Yan, Jong-Hyouk Lee. State-Aware Pointer Forwarding Scheme With Fast Handover Support in a PMIPv6 Domain
102 -- 113Ming-Chin Chuang, Jeng Farn Lee, Meng Chang Chen. SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
114 -- 124Kosmas Tsilipanos, Ioannis Neokosmidis, Dimitris Varoutas. A System of Systems Framework for the Reliability Assessment of Telecommunications Networks
125 -- 136Alessandra Babuscia, Kar-Ming Cheung. Statistical Risk Estimation for Communication System Design
137 -- 150Mehdi Khabazian, Mustafa Mehmet-Ali, Sonia Aïssa. Analysis of Continuous Communication Availability in Vehicular Ad Hoc Networks
151 -- 160Golnaz Vakili, Siavash Khorsandi. Self-Organized Cooperation Policy Setting in P2P Systems Based on Reinforcement Learning
161 -- 173Mohammad Masud Hasan, Farid Farahmand, Jason P. Jue, Joel J. P. C. Rodrigues. A Study of Energy-Aware Traffic Grooming in Optical Networks: Static and Dynamic Cases