Journal: Telecommunication Systems

Volume 45, Issue 4

259 -- 260Lin Guan, Xin Gang Wang, Irfan Awan. Performance modelling and evaluation of telecommunication systems
261 -- 274Anna Izabel J. Tostes Ribeiro, Carlos R. Storck, Fatima de L. P. Duarte-Figueiredo. CAC-RD: an UMTS call admission control
275 -- 287R. A. Baloch, I. Awan, G. Min. A mathematical model for wireless channel allocation and handoff schemes
289 -- 301Hongxing Li, Edward Chan, Guihai Chen. AEETC - adaptive energy-efficient timing control in wireless networks with network coding
303 -- 312Aruna Thangaraj, Qing-An Zeng, Xiaolong Li. Performance analysis of the IEEE 802.11e wireless networks with TCP ACK prioritization
313 -- 322Xin Guan, Lin Guan, Xin Gang Wang, Tomoaki Ohtsuki. A new load balancing and data collection algorithm for energy saving in wireless sensor networks
323 -- 328Shuangmei Cheng, Jianhua Li, Lei Zhu, Chuanxiong Guo. Time-domain sending rate and response function of eXplicit Control Protocol
329 -- 337Cheolgi Kim, Kyungtae Kang, Dong Kun Noh, Junhee Ryu, Joongsoo Ma. Timing evaluation of MAC-layer error control on ARM9-based mobile embedded systems

Volume 45, Issue 2-3

95 -- 109Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal. A new worm propagation threat in BitTorrent: modeling and analysis
111 -- 125Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model
127 -- 137Ali Ahmed, Ning Zhang. Towards the realisation of context-risk-aware access control in pervasive computing
139 -- 152Elaine Hulitt, Rayford B. Vaughn. Information system security compliance to FISMA standard: a quantitative measure
153 -- 163Wojciech Mazurczyk, Józef Lubacz. LACK - a VoIP steganographic method
165 -- 176Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski. Developing wireless sensor network applications in a virtual environment
177 -- 190Aneta Poniszewska-Maranda. Conception approach of access control in heterogeneous information systems using UML
191 -- 204Tomasz Mrugalski, Józef Wozniak. Analysis of IPv6 handovers in IEEE 802.16 environment
205 -- 214Konrad Wrona, Geir Hallingstad. Real-time automated risk assessment in protected core networking
215 -- 226Xun Dong, John A. Clark, Jeremy L. Jacob. Defending the weakest link: phishing websites detection by analysing user behaviours
227 -- 247Josip Zoric. Analysis of service platforms by a portfolio approach
249 -- 258Gang Uk Hwang, Fumio Ishizaki. Packet level performance analysis of a packet scheduler exploiting multiuser diversity

Volume 45, Issue 1

1 -- 2Shiguo Lian, Peter P. Stavroulakis. Introduction to special issue on secure multimedia services
3 -- 20Malek Barhoush, J. William Atwood. Requirements for enforcing digital rights management in multicast content distribution
37 -- 45Jong Hyuk Park. Subscriber authentication technology of AAA mechanism for mobile IPTV service offer
47 -- 60Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano. Traitor tracing over YouTube video service - proof of concept
61 -- 76Ge Zhang, Simone Fischer-Hübner, Sven Ehlert. Blocking attacks on SIP VoIP proxies caused by external processing
77 -- 91Manel Guerrero Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli. The future of security in Wireless Multimedia Sensor Networks - A position paper