To search, Click below search items.
All Published Papers Search Service
Title
SWAN: A Secured Watchdog for Ad hoc Networks
Author
Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman
Vol. 6 No. 6 pp. 209-218
Keywords
Ad hoc networks, watchdog, broadcast message authentication, reputation system
PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate
Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song
Vol. 6 No. 6 pp. 204-208
PKI, X.509, Certificate, CA, User authentication, Privacy
Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps
Yun Xiao, Chongzhao Han
Vol. 6 No. 6 pp. 199-203
Intrusion alert, correlation, attack scenarios, improved evolving self-organizing map
The simple information security audit process: SISAP
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment