International Journal of Trust Management in Computing and Communications

Titel Veröffentlichungsdatum Sprache Zitate
Fuzzy logic-based detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network2013/01/01English1
An efficient bit plane X-OR algorithm for irreversible image steganography2013/01/01English1
Slow DoS attacks: definition and categorisation2013/01/01English1
Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection2013/01/01English1
Personalised reconfigurable trust management2018/01/01English
Socio-cultural distrust of internet information2018/01/01English
Caucus: an authentication protocol for cloud federation2018/01/01English
Personalised recommendation system for ranking in question-answering websites with splay tree by avoiding tumbleweed badge2018/01/01English
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures2016/01/01English
A complete literature review on financial fraud detection applying data mining techniques2016/01/01English
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems2016/01/01English
Secure delegation of services through proxy signature with revocation2016/01/01English
Secured MPR node selection in the presence of cheating nodes2016/01/01English
A secure and privacy-preserving approach to communications in smart grids2016/01/01English
Multi-algorithmic fingerprint model for cancellable template generation2016/01/01English
Refining dependencies for information flow analysis of database applications2016/01/01English
TFSR: trust factors evaluation-based secure routing protocol for wireless sensor network2015/01/01English
Mitigating malicious feedback attacks in trust management systems2015/01/01English
An audio encryption technique through compressive sensing and Arnold transform2015/01/01English
Privacy landscape in online social networks2015/01/01English
An interdisciplinary approach to accountability for future internet service provision2013/01/01English
EDARD: efficient data access based on rumour dissemination in wireless sensor networks2013/01/01English
Privacy aware publication of surveillance video2013/01/01English
A trust model-based analysis of social networks2013/01/01English
Trust and context view-based knowledge sharing in MANets2013/01/01English
Caucus: an authentication protocol for cloud federation2018/01/01English
Personalised reconfigurable trust management2018/01/01English
Socio-cultural distrust of internet information2018/01/01English
Personalised recommendation system for ranking in question-answering websites with splay tree by avoiding tumbleweed badge2018/01/01English
A complete literature review on financial fraud detection applying data mining techniques2016/01/01English