Journal: Telecommunication Systems

Volume 45, Issue 2-3

95 -- 109Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal. A new worm propagation threat in BitTorrent: modeling and analysis
111 -- 125Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model
127 -- 137Ali Ahmed, Ning Zhang. Towards the realisation of context-risk-aware access control in pervasive computing
139 -- 152Elaine Hulitt, Rayford B. Vaughn. Information system security compliance to FISMA standard: a quantitative measure
153 -- 163Wojciech Mazurczyk, Józef Lubacz. LACK - a VoIP steganographic method
165 -- 176Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski. Developing wireless sensor network applications in a virtual environment
177 -- 190Aneta Poniszewska-Maranda. Conception approach of access control in heterogeneous information systems using UML
191 -- 204Tomasz Mrugalski, Józef Wozniak. Analysis of IPv6 handovers in IEEE 802.16 environment
205 -- 214Konrad Wrona, Geir Hallingstad. Real-time automated risk assessment in protected core networking
215 -- 226Xun Dong, John A. Clark, Jeremy L. Jacob. Defending the weakest link: phishing websites detection by analysing user behaviours
227 -- 247Josip Zoric. Analysis of service platforms by a portfolio approach
249 -- 258Gang Uk Hwang, Fumio Ishizaki. Packet level performance analysis of a packet scheduler exploiting multiuser diversity