To search, Click below search items.
All Published Papers Search Service
Title
Worm Poisoning Technology and Application
Author
Bing Wu, Xiaochun Yun, Xiang Cui
Vol. 6 No. 6 pp. 236-244
Keywords
Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P
Analyzing Network Security using Malefactor Action Graphs
Igor Kotenko, Mikhail Stepashkin
Vol. 6 No. 6 pp. 226-235
Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security
Sharing secret images by using base-transform and small-size host images
Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin
Vol. 6 No. 6 pp. 219-225
base-transform, sharing, hiding, stego images
SWAN: A Secured Watchdog for Ad hoc Networks
Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman
Vol. 6 No. 6 pp. 209-218
Ad hoc networks, watchdog, broadcast message authentication, reputation system