Abstract is missing.
- Safe box cloud authentication using TLS extesionMounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni. 1-6 [doi]
- Malicious URL prediction based on community detectionLi-Xiong Zheng, Xiao-Lin Xu, Jia Li, Lu Zhang, Xuan-Chen Pan, Zhi-Yuan Ma, Li-Hong Zhang. 1-7 [doi]
- A reputation system for detection of black hole attack in vehicular networkingRida Khatoun, P. Gut, R. Doulami, L. Khoukhi, Ahmed Serhrouchni. 1-5 [doi]
- Classified security protection evaluation for vehicle information systemHuangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen 0002. 1-6 [doi]
- A testbed for SCADA cyber security and intrusion detectionPrateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib. 1-6 [doi]
- Overview of cyber-security of industrial control systemXiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou. 1-7 [doi]
- Survey on packet marking fields and information for IP tracebackMarion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni. 1-8 [doi]
- On the use of security analytics for attack detection in vehicular ad hoc networksDhavy Gantsou. 1-6 [doi]
- Data protection: Combining fragmentation, encryption, and dispersionGérard Memmi, Katarzyna Kapusta, Han Qiu 0001. 1-9 [doi]
- A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networksYue Wu 0010, Fanchao Meng, Guanghao Wang, Ping Yi. 1-7 [doi]
- A new genetic-based rumor diffusion model for social networksYanan Wang, Xiuzhen Chen, Jianhua Li. 1-5 [doi]
- A random key management scheme for heterogeneous wireless sensor networkLina Zhu, Zuochang Zhan. 1-5 [doi]
- Secure access & authentication for collaborative intercloud exchange serviceFouad Amine Guenane, Ahmed Serhrouchni. 1-5 [doi]
- A novel Fibonacci windows model for finding emerging patterns over online data streamTubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li. 1-8 [doi]
- A solution based analysis of attack vectors on smart home systemsAndreas Brauchli, Depeng Li. 1-6 [doi]
- Flooding attacks detection in MANETsMohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti. 1-6 [doi]
- Analysis of cyber security for industrial control systemsZakarya Drias, Ahmed Serhrouchni, Olivier Vogel. 1-8 [doi]
- Data security and threat modeling for smart city infrastructurePaul Wang, Amjad Ali, William Kelly. 1-6 [doi]
- Security in MIMO wireless hybrid channel with artificial noiseXiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue. 1-4 [doi]
- Malicious data identification in smart grid based on residual error methodZongshuai Hu, Yong Wang, Chunhua Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen. 1-5 [doi]
- Secure Public Key Regime (SPKR) in vehicular networksTan Heng Chuan, Jun Zhang, Maode Ma, Peter Han Joo Chong, Houda Labiod. 1-7 [doi]
- Bayesian-based model for a reputation system in vehicular networksYoucef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen. 1-6 [doi]