-
1
-
-
84897913321
-
A survey of emerging threats in cybersecurity
-
Jang-Jaccard, J., Nepal, S., A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80:5 (2014), 973–993.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.5
, pp. 973-993
-
-
Jang-Jaccard, J.1
Nepal, S.2
-
2
-
-
84928269589
-
Improving network intrusion detection system performance through quality of service configuration and parallel technology
-
Bul'ajoul, W., James, A., Pannu, M., Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81:6 (2015), 981–999.
-
(2015)
J. Comput. Syst. Sci.
, vol.81
, Issue.6
, pp. 981-999
-
-
Bul'ajoul, W.1
James, A.2
Pannu, M.3
-
3
-
-
84899065536
-
Scalable RFID security framework and protocol supporting Internet of things
-
Ray, B.R., Abawajy, J., Chowdhury, M., Scalable RFID security framework and protocol supporting Internet of things. Comput. Netw. 67 (2014), 89–103.
-
(2014)
Comput. Netw.
, vol.67
, pp. 89-103
-
-
Ray, B.R.1
Abawajy, J.2
Chowdhury, M.3
-
4
-
-
84901426903
-
An approach for profiling phishing activities
-
Hamid, I.R.A., Abawajy, J.H., An approach for profiling phishing activities. Comput. Secur. 45 (2014), 27–41.
-
(2014)
Comput. Secur.
, vol.45
, pp. 27-41
-
-
Hamid, I.R.A.1
Abawajy, J.H.2
-
5
-
-
84908659382
-
Cyber security readiness in the South Australian Government
-
Borgman, B., Mubarak, S., Choo, K.K.R., Cyber security readiness in the South Australian Government. Comput. Stand. Interfaces 37 (2015), 1–8.
-
(2015)
Comput. Stand. Interfaces
, vol.37
, pp. 1-8
-
-
Borgman, B.1
Mubarak, S.2
Choo, K.K.R.3
-
6
-
-
84924180739
-
An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting
-
Junghyun, N.A.M., Choo, K.K.R., Juryon, P., Dongho, W., An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98:1 (2015), 424–427.
-
(2015)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.98
, Issue.1
, pp. 424-427
-
-
Junghyun, N.A.M.1
Choo, K.K.R.2
Juryon, P.3
Dongho, W.4
-
7
-
-
85013182473
-
Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs
-
2016
-
Hu, Y., Liu, A., Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs. Comput. Syst. Sci. Eng. 31:1 (2016), 5–17 2016.
-
(2016)
Comput. Syst. Sci. Eng.
, vol.31
, Issue.1
, pp. 5-17
-
-
Hu, Y.1
Liu, A.2
-
8
-
-
84978943536
-
ActiveTrust: secure and trustable routing in wireless sensor networks
-
2016
-
Liu, Y., Dong, M., Ota, K., Liu, A., ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11:9 (2016), 2013–2027, 10.1109/TIFS.2016.2570740 2016.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.9
, pp. 2013-2027
-
-
Liu, Y.1
Dong, M.2
Ota, K.3
Liu, A.4
-
9
-
-
84894416535
-
A practical approach for provenance transmission in wireless sensor networks
-
Alam, S.M., Fahmy, S., A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw. 16 (2014), 28–45.
-
(2014)
Ad Hoc Netw.
, vol.16
, pp. 28-45
-
-
Alam, S.M.1
Fahmy, S.2
-
10
-
-
57049151883
-
A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
-
Cheng, B.C., Chen, H., Li, Y.J., et al. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 31:18 (2008), 4352–4359.
-
(2008)
Comput. Commun.
, vol.31
, Issue.18
, pp. 4352-4359
-
-
Cheng, B.C.1
Chen, H.2
Li, Y.J.3
-
11
-
-
84857360648
-
Hop-by-hop traceback in wireless sensor networks
-
Siddiqui, M.S., Obaid Amin, S., Hong, C.S., Hop-by-hop traceback in wireless sensor networks. IEEE Commun. Lett. 16:2 (2012), 242–245.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.2
, pp. 242-245
-
-
Siddiqui, M.S.1
Obaid Amin, S.2
Hong, C.S.3
-
12
-
-
79961173989
-
Traceback in wireless sensor networks with packet marking and logging
-
Xu, J., Zhou, X., Yang, F., Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China 5:3 (2011), 308–315.
-
(2011)
Front. Comput. Sci. China
, vol.5
, Issue.3
, pp. 308-315
-
-
Xu, J.1
Zhou, X.2
Yang, F.3
-
13
-
-
84902949347
-
Mobile target detection in wireless sensor networks with adjustable sensing frequency
-
Hu, Y., Mian, X., Ota, K., Liu, A., Guo, M., Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE Syst. J., 2014, 10.1109/JSYST.2014.2308391.
-
(2014)
IEEE Syst. J.
-
-
Hu, Y.1
Mian, X.2
Ota, K.3
Liu, A.4
Guo, M.5
-
14
-
-
33745684710
-
An efficient distributed algorithm to identify and traceback DDos traffic
-
Wong, T.Y., Law, K.T., Lui, J.C.S., et al. An efficient distributed algorithm to identify and traceback DDos traffic. Comput. J. 49:4 (2006), 418–442.
-
(2006)
Comput. J.
, vol.49
, Issue.4
, pp. 418-442
-
-
Wong, T.Y.1
Law, K.T.2
Lui, J.C.S.3
-
15
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
-
Osanaiye, O., Choo, K.K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165, 10.1016/j.jnca.2016.01.001.
-
(2016)
J. Netw. Comput. Appl.
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.K.R.2
Dlodlo, M.3
-
16
-
-
84928914432
-
Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
-
Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS ONE, 2015, 10.1371/journal.pone.011670910.
-
(2015)
PLoS ONE
-
-
Nam, J.1
Choo, K.K.R.2
Han, S.3
Kim, M.4
Paik, J.5
Won, D.6
-
17
-
-
84893008558
-
An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks
-
Jeong, E.H., Lee, B.K., An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks. Future Gener. Comput. Syst. 33 (2014), 42–52.
-
(2014)
Future Gener. Comput. Syst.
, vol.33
, pp. 42-52
-
-
Jeong, E.H.1
Lee, B.K.2
-
18
-
-
84900613991
-
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
-
Saurabh, S., Sairam, A.S., ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. Comput. Commun. 42 (2014), 60–69.
-
(2014)
Comput. Commun.
, vol.42
, pp. 60-69
-
-
Saurabh, S.1
Sairam, A.S.2
-
19
-
-
84893112536
-
A novel path-based approach for single-packet IP traceback
-
Lu, N., Wang, Y., Su, S., et al. A novel path-based approach for single-packet IP traceback. Secur. Commun. Netw. 7:2 (2014), 309–321.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.2
, pp. 309-321
-
-
Lu, N.1
Wang, Y.2
Su, S.3
-
21
-
-
84958025843
-
Survey on key revocation mechanisms in wireless sensor networks
-
Ge, M., Choo, K.K.R., Wu, H., Yu, Y., Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63 (2016), 24–38.
-
(2016)
J. Netw. Comput. Appl.
, vol.63
, pp. 24-38
-
-
Ge, M.1
Choo, K.K.R.2
Wu, H.3
Yu, Y.4
-
22
-
-
3142749817
-
Probabilistic packet marking with non-preemptive compensation
-
Tseng, Y., Chen, H., Hsieh, W., Probabilistic packet marking with non-preemptive compensation. IEEE Commun. Lett. 8:6 (2004), 359–361.
-
(2004)
IEEE Commun. Lett.
, vol.8
, Issue.6
, pp. 359-361
-
-
Tseng, Y.1
Chen, H.2
Hsieh, W.3
-
23
-
-
84952311701
-
Accurate and efficient object tracking based on passive RFID
-
Yang, L., Cao, J., Zhu, W., et al. Accurate and efficient object tracking based on passive RFID. IEEE Trans. Mob. Comput. 14:11 (2015), 2188–2200.
-
(2015)
IEEE Trans. Mob. Comput.
, vol.14
, Issue.11
, pp. 2188-2200
-
-
Yang, L.1
Cao, J.2
Zhu, W.3
-
24
-
-
84925063940
-
An incentive game based evolutionary model for crowd sensing networks
-
Liu, X., Ota, K., Liu, A., Chen, Z., An incentive game based evolutionary model for crowd sensing networks. Peer-to-Peer Netw. Appl. 9:4 (2016), 692–711, 10.1007/s12083-015-0342-2.
-
(2016)
Peer-to-Peer Netw. Appl.
, vol.9
, Issue.4
, pp. 692-711
-
-
Liu, X.1
Ota, K.2
Liu, A.3
Chen, Z.4
-
25
-
-
84963804113
-
Service pricing decision in cyber-physical systems: insights from game theory
-
Liu, X., Dong, M., Ota, K., Hung, P., Liu, A., Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans. Serv. Comput. 9:2 (2016), 186–198, 10.1109/TSC.2015.2449314.
-
(2016)
IEEE Trans. Serv. Comput.
, vol.9
, Issue.2
, pp. 186-198
-
-
Liu, X.1
Dong, M.2
Ota, K.3
Hung, P.4
Liu, A.5
-
26
-
-
84921327888
-
Quality of energy provisioning for wireless power transfer
-
Dai, H., Chen, G., Wang, C., et al. Quality of energy provisioning for wireless power transfer. IEEE Trans. Parallel Distrib. Syst. 26:2 (2015), 527–537.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.2
, pp. 527-537
-
-
Dai, H.1
Chen, G.2
Wang, C.3
-
27
-
-
84964414645
-
LSCD: a low storage clone detecting protocol for cyber-physical systems
-
Dong, M., Ota, K., Yang, L.T., et al. LSCD: a low storage clone detecting protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 35:5 (2016), 712–723, 10.1109/TCAD.2016.2539327.
-
(2016)
IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
, vol.35
, Issue.5
, pp. 712-723
-
-
Dong, M.1
Ota, K.2
Yang, L.T.3
-
28
-
-
84958037736
-
A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering
-
Aburumman, A., Seo, W.j., Islam, R., Khan, M.k., Choo, K.K.R., A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering. Proceedings of 11th International Conference on Security and Privacy in Communication Networks, 2015, 649–664.
-
(2015)
Proceedings of 11th International Conference on Security and Privacy in Communication Networks
, pp. 649-664
-
-
Aburumman, A.1
Seo, W.J.2
Islam, R.3
Khan, M.K.4
Choo, K.K.R.5
-
30
-
-
0000135667
-
Logarithmic normal distribution for description of sieved forage materials
-
Waldo, D.R., Smith, L.W., Cox, E.L., et al. Logarithmic normal distribution for description of sieved forage materials. J. Dairy Sci. 54:10 (1971), 1465–1469.
-
(1971)
J. Dairy Sci.
, vol.54
, Issue.10
, pp. 1465-1469
-
-
Waldo, D.R.1
Smith, L.W.2
Cox, E.L.3
-
31
-
-
84891933258
-
Management and applications of trust in wireless sensor networks: a survey
-
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C., Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80:3 (2014), 602–617.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.3
, pp. 602-617
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Niu, J.4
Chao, H.C.5
-
32
-
-
84978056011
-
A comprehensive analysis for fair probability marking based traceback approach in WSNs
-
Liu, A., Liu, X., Liu, Y., A comprehensive analysis for fair probability marking based traceback approach in WSNs. Secur. Commun. Netw., 2016, 10.1002/sec.1515.
-
(2016)
Secur. Commun. Netw.
-
-
Liu, A.1
Liu, X.2
Liu, Y.3
|