Defense against packet collusion attacks in opportunistic networks (English)
- New search for: Alajeely, Majeed
- Further information on Alajeely, Majeed:
- https://orcid.org/0000-0002-7158-9284
- New search for: Doss, Robin
- New search for: Ahmad, Asma'a
- New search for: Mak-Hau, Vicky
- New search for: Alajeely, Majeed
- Further information on Alajeely, Majeed:
- https://orcid.org/0000-0002-7158-9284
- New search for: Doss, Robin
- New search for: Ahmad, Asma'a
- New search for: Mak-Hau, Vicky
In:
Computers and Security
;
65
;
269-282
;
2016
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Defense against packet collusion attacks in opportunistic networks
-
Contributors:Alajeely, Majeed ( author ) / Doss, Robin ( author ) / Ahmad, Asma'a ( author ) / Mak-Hau, Vicky ( author )
-
Published in:Computers and Security ; 65 ; 269-282
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2016-12-02
-
Size:14 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 65
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Information systems continuity process: Conceptual foundations for the study of the “social”Niemimaa, Marko et al. | 2016
- 14
-
Mind your SMSes: Mitigating social engineering in second factor authenticationSiadati, Hossein / Nguyen, Toan / Gupta, Payas / Jakobsson, Markus / Memon, Nasir et al. | 2016
- 29
-
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trendsZafar, Faheem / Khan, Abid / Malik, Saif Ur Rehman / Ahmed, Mansoor / Anjum, Adeel / Khan, Majid Iqbal / Javed, Nadeem / Alam, Masoom / Jamil, Fuzel et al. | 2016
- 50
-
Modeling and analysis of identity threat behaviors through text mining of identity theft storiesNokhbeh Zaeem, Razieh / Manoharan, Monisha / Yang, Yongpeng / Barber, K. Suzanne et al. | 2016
- 64
-
The role of information security learning and individual factors in disclosing patients' health informationPark, Eun Hee / Kim, Jongwoo / Park, Young Soon et al. | 2016
- 77
-
Introducing cybernomics: A unifying economic framework for measuring cyber riskRuan, Keyun et al. | 2016
- 90
-
Android resource usage risk assessment using hidden Markov model and online learningRashidi, Bahman / Fung, Carol / Bertino, Elisa et al. | 2016
- 108
-
Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov ModelBang, June-ho / Cho, Young-Jong / Kang, Kyungran et al. | 2016
- 121
-
AndroDialysis: Analysis of Android Intent Effectiveness in Malware DetectionFeizollah, Ali / Anuar, Nor Badrul / Salleh, Rosli / Suarez-Tangil, Guillermo / Furnell, Steven et al. | 2016
- 135
-
A survey of intrusion detection systems based on ensemble and hybrid classifiersAburomman, Abdulla Amin / Reaz, Mamun Bin Ibne et al. | 2016
- 153
-
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment toolBashir, Masooda / Wee, Colin / Memon, Nasir / Guo, Boyi et al. | 2016
- 166
-
Context- and bias-free probabilistic mission impact assessmentMotzek, Alexander / Möller, Ralf et al. | 2016
- 187
-
NFD: Non-technical loss fraud detection in Smart GridHan, Wenlin / Xiao, Yang et al. | 2016
- 202
-
Efficient integrity verification of replicated data in cloud computing systemYi, Mingxu / Wei, Jinxia / Song, Lingwei et al. | 2016
- 213
-
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphonesMeng, Weizhi / Li, Wenjuan / Kwok, Lam-For / Choo, Kim-Kwang Raymond et al. | 2016
- 230
-
DroidNative: Automating and optimizing detection of Android native code malware variantsAlam, Shahid / Qu, Zhengyang / Riley, Ryan / Chen, Yan / Rastogi, Vaibhav et al. | 2016
- 247
-
Exploring the learning capabilities of convolutional neural networks for robust image watermarkingKandi, Haribabu / Mishra, Deepak / Gorthi, Subrahmanyam R.K. Sai et al. | 2016
- 269
-
Defense against packet collusion attacks in opportunistic networksAlajeely, Majeed / Doss, Robin / Ahmad, Asma'a / Mak-Hau, Vicky et al. | 2016
- 283
-
P2P routing table poisoning: A quorum-based sanitizing approachIsmail, Hatem / Germanus, Daniel / Suri, Neeraj et al. | 2016
- 300
-
Introducing OSSF: A framework for online service cybersecurity risk managementMeszaros, Jan / Buchalcevova, Alena et al. | 2016
- 314
-
Detection of network anomalies using Improved-MSPCA with sketchesChen, Zhaomin / Yeo, Chai Kiat / Lee, Bu Sung / Lau, Chiew Tong et al. | 2016
- 314
-
Detethon of network anomalies using Improved-MSPCA with sketchesZhaomin Chen et al. | 2017
- 329
-
vmOS: A virtualization-based, secure desktop systemLiang, Hongliang / Li, Mingyu / Xu, Jian / Hu, Wenying / Pei, Xiaoxiao / Jia, Xiaodong / Song, Yan et al. | 2016
- 344
-
Application layer HTTP-GET flood DDoS attacks: Research landscape and challengesSingh, Karanpreet / Singh, Paramvir / Kumar, Krishan et al. | 2016
- 373
-
A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mappingDwivedi, Rudresh / Dey, Somnath / Singh, Ramveer / Prasad, Aditya et al. | 2016
- 387
-
A closer look into DHCP starvation attack in wireless networksHubballi, Neminath / Tripathi, Nikhil et al. | 2016
- 405
-
Formal modelling and analysis of receipt-free auction protocols in applied piDong, Naipeng / Jonker, Hugo / Pang, Jun et al. | 2016
- CO2
-
IFC - Editorial Board| 2017
- iii
-
Contents| 2017