KSII Transactions on Internet and Information Systems
Monthly Online Journal (eISSN: 1976-7277)
Menu
About
Hot Downloaded Papers
Hot Downloaded Papers (Past 3 months)
Most Downloaded Papers
Editorial Board
Digital Library
Information
Author Guide
Publications Ethics and Malpractice Statement
Editor and Reviewer Guide
Special Issues
Submit Manuscript
Digital Library
Home
Digital Library
Search Results: [ keyword: Network security ] (25)
21
.
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks
Rong Jiang
,
Jun Luo
,
Xiaoping Wang
,
Vol. 7, No. 8, August 29, 2013
10.3837/tiis.2013.08.017
Wireless Sensor Networks
Group Key Management
route key tree
Network Security
22
.
Detecting LDoS Attacks based on Abnormal Network Traffic
Kai Chen
,
HuiYu Liu
,
XiaoSu Chen
,
Vol. 6, No. 7, July 24, 2012
10.3837/tiis.2012.07.007
low-rate
denial of service
Network Security
abnormal traffic
23
.
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation
Iman Almomani
,
Maha Saadeh
,
Vol. 6, No. 4, April 24, 2012
10.3837/tiis.2012.04.016
Authentication/Integrity, energy-efficient
network security, tree-based routing, WSN
24
.
Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly
Sunghyun Kim
,
Heejo Lee
,
Vol. 4, No. 4, August 26, 2010
10.3837/tiis.2010.08.013
firewall
Security Policy
policy anomalies
Network Security
ACL
25
.
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Sun Ho Kim
,
Byeong-hee Roh
,
Vol. 2, No. 3, June 24, 2008
10.3837/tiis.2008.03.001
Network Security
DDoS
Attack Traffic Modeling
Attack Detection
1
2
3
Unified Search
(
in
title, author, abstract
,
and
keywords
)
Category Search
Title
Author
Abstract
Keywords
DOI
Search
Division Filtering
Internet & Communications (5)
Internet Security (13)
Internet Computing & Service (1)
Internet Services & Management (1)
Security & Privacy (3)
Others (2)
Filter
Reset