Volume 2,
Number 1,
January / February 2009
- Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Mathematical model for constructing passwords from biometrical data.
1-9
Electronic Edition (link) BibTeX
- Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Yoshiaki Nemoto:
Combating against internet worms in large-scale networks: an autonomic signature-based solution.
11-28
Electronic Edition (link) BibTeX
- Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: a simple and stateless phishing filter.
29-43
Electronic Edition (link) BibTeX
- Xu Su, Rajendra V. Boppana:
Crosscheck mechanism to identify malicious nodes in ad hoc networks.
45-54
Electronic Edition (link) BibTeX
- Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles.
55-69
Electronic Edition (link) BibTeX
- Fei Hu, Kyle Wilhelm, Michael Schab, Marcin Lukowiak, Stanislaw Radziszowski, Yang Xiao:
NTRU-based sensor network security: a low-power hardware implementation perspective.
71-81
Electronic Edition (link) BibTeX
- Ram Dantu, Prakash Kolan, João W. Cangussu:
Network risk management using attacker profiling.
83-96
Electronic Edition (link) BibTeX
Volume 2,
Number 2,
March / April 2009
Guest Editorial
Research Articles
Special Issue Papers
Research Articles
Special Issue Papers
Research Articles
Special Issue Papers
Research Articles
Copyright © Sun May 17 00:18:35 2009
by Michael Ley (ley@uni-trier.de)