Abstract is missing.
- Hardware Trojan Horse Device Based on Unintended USB ChannelsJohn Clark, Sylvain Leblanc, Scott Knight. 1-8 [doi]
- Distinguishing DDoS Attacks from Flash Crowds Using Probability MetricsKe Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu. 9-17 [doi]
- Enhancing RFID Tag Resistance against Cloning AttackJemal Abawajy. 18-23 [doi]
- A Data Mining Approach for Detection of Self-Propagating WormsMohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth. 24-29 [doi]
- An Information Filtering ApproachNasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri. 30-35 [doi]
- Architecture Design of High Efficient and Non-memory AES Crypto Core for WPANRong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng. 36-43 [doi]
- A Cryptographically t-Private Auction SystemMarkus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert. 44-51 [doi]
- Design of a Secure Router System for Next-Generation NetworksTilman Wolf, Russell Tessier. 52-59 [doi]
- Changing Network BehaviorRobert Koch. 60-66 [doi]
- Grid of Security: A New Approach of the Network SecurityOlivier Flauzac, Florent Nolot, Cyril Rabat, Luiz Angelo Steffenel. 67-72 [doi]
- DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc NetworksThaier Hayajneh, Prashant Krishnamurthy, David Tipper. 73-80 [doi]
- Effective Attacks in the Tor Authentication ProtocolYang Zhang. 81-86 [doi]
- Secure Authenticated Key Establishment Protocol for Ad Hoc NetworksA. John Prakash, V. Rhymend Uthariaraj. 87-94 [doi]
- An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIPAndre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne. 95-101 [doi]
- Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange ProtocolsRaphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi. 102-106 [doi]
- Harnessing the Power of P2P Systems for Fast Attack Signature ValidationSpyros Antonatos, Quang Hieu Vu. 107-114 [doi]
- Authentication in Peer-to-Peer Network: Survey and Research DirectionsZhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang. 115-122 [doi]
- A Hierarchical Model for Cross-Domain Communication of Health Care UnitsDimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis. 123-129 [doi]
- Extended K-Anonymity Models Against Attribute DisclosureXiaoxun Sun, Hua Wang, Lili Sun. 130-136 [doi]
- Implementation and Analysis of Sensor Security Protocols in a Home Health Care SystemKalvinder Singh, Vallipuram Muthukkumarasamy. 137-142 [doi]
- Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc NetworkPiyi Yang, Zhenfu Cao, Xiaolei Dong. 143-150 [doi]
- Error Correction of Noisy Block Cipher Using Cipher and Plaintext CharacteristicsNabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed. 151-157 [doi]
- Policy-Driven Patch Management for Distributed EnvironmentsJan Muhammad, Richard O. Sinnott. 158-163 [doi]
- Enhancing Trust on e-Government: A Decision Fusion ModuleBruno Lage Srur, Vallipuram Muthukkumarasamy. 164-169 [doi]
- Trusted Network Access Control in the Eduroam FederationFernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López, Antonio F. Gómez-Skarmeta, Óscar Cánovas Reverte. 170-175 [doi]
- ACSIS: Agents for Cooperative Secured Information SystemsL. Huin, Danielle Boulanger, Eric Disson. 176-183 [doi]
- A Multi-agent Security ArchitectureRossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran. 184-191 [doi]
- A Novel Fuzzy Identity-Based Signature with Dynamic ThresholdWei Chen, Li Zhu, Xiaomei Cao, Yang Geng. 192-198 [doi]
- Self-Protection Model Based on Intelligent AgentBing Sun, Ya-Ping Zhang, Ning Zhang. 199-202 [doi]
- A Novel Grid Trust Model Based on Fuzzy TheoryShaomin Zhang, Yue Zou, Baoyi Wang. 203-207 [doi]
- A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc NetworksYang Zhang. 208-215 [doi]
- Scalable RFID Pseudonym ProtocolBoyeon Song, Chris J. Mitchell. 216-224 [doi]
- Securing Roaming and Vertical Handover in Fourth Generation NetworksNeila Krichene, Noureddine Boudriga. 225-231 [doi]
- A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network ProtocolsQin Li, Qingkai Zeng. 232-239 [doi]
- Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic LimitationsRobert Steele, Kyongho Min. 240-245 [doi]
- xDUCON: Coordinating Usage Control Policies in Distributed DomainsGiovanni Russello, Naranker Dulay. 246-253 [doi]
- A System for Distributed SELinux Policy ManagementPedro Chavez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores. 254-261 [doi]
- A Messaging-Based System for Remote Server AdministrationMarco Ramilli, Marco Prandini. 262-269 [doi]
- On Role Mappings for RBAC-Based Secure InteroperationJinwei Hu, Ruixuan Li, Zhengding Lu. 270-277 [doi]
- Property Based Attestation and Trusted Computing: Analysis and ChallengesAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery. 278-285 [doi]
- Secure Mobile Agents with Designated HostsQi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng. 286-293 [doi]
- A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc NetworksYining Liu, Keqiu Li, Yong Zhang, Wenyu Qu. 294-301 [doi]
- An Efficient Certificateless Encryption Scheme in the Standard ModelHua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li. 302-309 [doi]
- A Self-Reflection Model for Autonomic Computing Systems Based on p-CalculusHuiqiang Wang, Hongwu Lv, Guangsheng Feng. 310-315 [doi]
- FSS2-Id/A Fast Safe Identity-Based Multi Signature SchemeSami Harari. 316-320 [doi]
- Distributed Agent Architecture for Intrusion Detection Based on New MetricsFarah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira. 321-327 [doi]
- F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear DiscriminantHyunhee Park, Meejoung Kim, Chul-Hee Kang. 328-335 [doi]
- Automatic Network Protocol Automaton ExtractionMing-ming Xiao, Shun-Zheng Yu, Yu Wang. 336-343 [doi]
- Characterising the Evolution in Scanning Activity of Suspicious HostsAlif Wahid, Christopher Leckie, Chenfeng Vincent Zhou. 344-350 [doi]
- Discriminating DDoS Flows from Flash Crowds Using Information DistanceShui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou. 351-356 [doi]
- Building a SCADA Security TestbedCarlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu. 357-364 [doi]
- Honeypot Traces Forensics: The Observation Viewpoint MattersVan-Hau Pham, Marc Dacier. 365-372 [doi]
- State-Based Usage Control Enforcement with Data Flow Tracking using System Call InterpositionMatús Harvan, Alexander Pretschner. 373-380 [doi]
- HoneyLab: Large-Scale Honeypot Deployment and Resource SharingW. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis. 381-388 [doi]
- MagicNET: Security System for Development, Validation and Adoption of Mobile AgentsMuhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy. 389-396 [doi]
- Intrusion Detection System Using Self-Organizing MapsMansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis. 397-402 [doi]
- Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture ModelsSheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage. 403-408 [doi]
- Practical Implementations for Securing VoIP Enabled Mobile DevicesChan Yeob Yeun, Salman Mohammed Al-Marzouqi. 409-414 [doi]
- Framework for Identification of Power System Operating Security RegionsMohamed A. El-Kady, Essam A. Al-Ammar. 415-419 [doi]
- Enhancing the Security of a More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme Muhammad Khurram Khan. 420-424 [doi]
- A Context-Aware Access Control Model for Pervasive EnvironmentsSumayah Al-Rwais, Jalal Al-Muhtadi. 425-430 [doi]
- A New Similarity Measure for the Anomaly Intrusion DetectionAhmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir. 431-436 [doi]
- Integrating Palmprint and Fingerprint for Identity VerificationYong Jian Chin, Thian Song Ong, Michael K. O. Goh, Bee Yan Hiew. 437-442 [doi]
- An Extension of Differential Fault Analysis on AESWei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu. 443-446 [doi]
- Exploit Kashida Adding to Arabic e-Text for High Capacity SteganographyAhmed Al-Nazer, Adnan Abdul-Aziz Gutub. 447-451 [doi]
- A Comparison Between Rule Based and Association Rule Mining AlgorithmsMohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle. 452-455 [doi]
- Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen. 456-461 [doi]
- A Modified PSO Algorithm for Constrained Multi-objective OptimizationLily D. Li, Xinghuo Yu, Xiaodong Li, William Guo. 462-467 [doi]
- Significance of Computional Intelligence Method in Computer NetworksReginald Lal, Andrew Chiou. 468-473 [doi]
- An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve CryptographyTohari Ahmad, Jiankun Hu, Song Han. 474-479 [doi]
- Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-BotsWei Peng, Qingmai Wang, Bin Wang, Xinghuo Yu. 484-488 [doi]
- Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support SystemRoland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot. 489-494 [doi]
- Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation StageRoland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot. 495-500 [doi]
- If Cross-Functional Teams are the Answer, What is the Question?W. K. Daniel Pun, Ricardo Santa. 501-505 [doi]
- Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative StudyAnanda Jeeva, William Guo. 506-509 [doi]
- Speech Recognition Enhancement Using Beamforming and a Genetic AlgorithmKit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, S. H. Ling. 510-515 [doi]
- A New Particle Swarm Optimization Algorithm for Neural Network OptimizationS. H. Ling, Hung T. Nguyen, Kit Yan Chan. 516-521 [doi]
- Real-Time Data Mining Methodology and a Supporting FrameworkXiong Deng, Moustafa Ghanem, Yike Guo. 522-527 [doi]
- Generating Hierarchical Association Rules with the Use of Bayesian NetworkKhalid Iqbal, Sohail Asghar. 528-533 [doi]
- An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector MachineJohn Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn. 534-539 [doi]
- Discovery of Exceptions: A Step towards PerfectionSaroj Ratnoo, K. K. Bharadwaj. 540-545 [doi]
- Novel Approaches for Detecting Frauds in Energy ConsumptionFábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão. 546-551 [doi]
- Contextual Analysis Methods Capturing Knowledge Representation Related to the ReputationMiho Itoh. 552-559 [doi]
- Guided Navigation Using Query Log Mining through Query ExpansionBurcu Yurekli, Gokhan Capan, Baris Yilmazel, Ozgur Yilmazel. 560-564 [doi]
- Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc NetworksDakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin. 565-570 [doi]
- Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector QuantizationJames Cannady. 571-574 [doi]
- A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile HandsetBook-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim. 575-578 [doi]
- Weakness on Cryptographic Schemes Based on Chained CodesOmessaad Hamdi, Ammar Bouallegue, Sami Harari. 579-581 [doi]