International Journal of Trust Management in Computing and Communications

Titel Veröffentlichungsdatum Sprache Zitate
Fuzzy logic-based detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network2013/01/01English1
An efficient bit plane X-OR algorithm for irreversible image steganography2013/01/01English1
Slow DoS attacks: definition and categorisation2013/01/01English1
Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection2013/01/01English1
Personalised reconfigurable trust management2018/01/01English
Socio-cultural distrust of internet information2018/01/01English
Caucus: an authentication protocol for cloud federation2018/01/01English
Personalised recommendation system for ranking in question-answering websites with splay tree by avoiding tumbleweed badge2018/01/01English
A hybrid technique to secure fingerprint templates using Delaunay neighbour structures2016/01/01English
A complete literature review on financial fraud detection applying data mining techniques2016/01/01English
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems2016/01/01English
Secure delegation of services through proxy signature with revocation2016/01/01English
Secured MPR node selection in the presence of cheating nodes2016/01/01English
A secure and privacy-preserving approach to communications in smart grids2016/01/01English
Multi-algorithmic fingerprint model for cancellable template generation2016/01/01English
Refining dependencies for information flow analysis of database applications2016/01/01English
TFSR: trust factors evaluation-based secure routing protocol for wireless sensor network2015/01/01English