+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 5, Issue 3, August 2015 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

pp. 1-18 
Hashing Based Distributed Backoff (HBDB) Mechanism for
IEEE 802.11 Wireless Networks
M. Devipriya, B. Nithya, and C. Mala

pp. 19-36
Toward an Insider Threat Detection Framework Using Honey Permissions
Parisa Kaghazgaran and Hassan Takabi

pp. 37-47 
A Survey of Public Provable Data Possession Schemes with
Batch Verification in Cloud Storage
Sooyeon Shin and Taekyoung Kwon

pp. 48-57
Object Recognition and Tracking based on Object Feature Extracting
Yong-Hwan Lee, Hyochang Ahn, Han-Jin Cho, and June-Hwan Lee
[abstract][pdf

 
pp. 58-79
Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks
Todd Booth and Karl Andersson
[abstract][pdf


[Goto Archives]    

free templates