+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 5, Issue 3, August 2015 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Hashing Based Distributed Backoff (HBDB) Mechanism for
IEEE 802.11 Wireless Networks
M. Devipriya, B. Nithya, and C. Mala

Toward an Insider Threat Detection Framework Using Honey Permissions
Parisa Kaghazgaran and Hassan Takabi

A Survey of Public Provable Data Possession Schemes with
Batch Verification in Cloud Storage
Sooyeon Shin and Taekyoung Kwon

Object Recognition and Tracking based on Object Feature Extracting
Yong-Hwan Lee, Hyochang Ahn, Han-Jin Cho, and June-Hwan Lee
[abstract

 
pp. 58-79 (10.22670/JOWUA.2015.08.31.058)
Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks
Todd Booth and Karl Andersson
[abstract]


[Goto Archives]