Abstract is missing.
- Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh NetworksDivya, Sanjeev Kumar. 1-10 [doi]
- A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar TransformationFei Peng, Re-Si Guo, Chang-Tsun Li, Min Long. 11-18 [doi]
- On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern NoiseChang-Tsun Li, Chih-Yuan Chang, Yue Li. 19-25 [doi]
- Virtualization Efficacy for Network Intrusion Detection Systems in High Speed EnvironmentMonis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani. 26-41 [doi]
- Face Recognition Using Balanced Pairwise Classifier TrainingZiheng Zhou, Samuel Chindaro, Farzin Deravi. 42-49 [doi]
- Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)Qin Zhou, Nigel R. Poole. 50-56 [doi]
- Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection SystemsAhsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani. 57-65 [doi]
- Parameter Based Access Control Model for Mobile HandsetsDasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic. 66-75 [doi]
- Ethical Dilemmas in Teaching Computer and Internet SecurityBrian Tompsett. 76-81 [doi]
- Overview of SIP Attacks and CountermeasuresFadi El-Moussa, Parmindher Mudhar, Andy Jones. 82-91 [doi]
- Security Challenges in Multihop Wireless Mesh Networks-A SurveyDivya, Sanjeev Kumar. 92-101 [doi]
- A Security Architecture to Protect Against Data LossClive Blackwell. 102-110 [doi]
- A Simple Method for Improving Intrusion Detections in Corporate NetworksJoshua Ojo Nehinbe. 111-122 [doi]
- Detecting Sybils in Peer-to-Peer File Replication SystemsK. Haribabu, Chittaranjan Hota, Saravana. 123-134 [doi]
- Adaptive Clustering Method for Reclassifying Network IntrusionsNehinbe Ojo Joshua. 135-146 [doi]
- Technology Perspective: Is Green IT a Threat to IT Security?Dimitrios Frangiskatos, Mona Ghassemian, Diane Gan. 147-154 [doi]
- An Adaptive Fusion Framework for Fault-Tolerant MultibiometricsSamuel Chindaro, Ziheng Zhou, Ming W. R. Ng, Farzin Deravi. 155-162 [doi]
- Cross-Enterprise Policy Model for e-Business Web Services SecurityTanko Ishaya, Jason R. C. Nurse. 163-171 [doi]
- Challenges of Identity Management - A Context in Rural IndiaRajanish Dass, Sujoy Pal. 172-183 [doi]