• A Layout-Similarity-Based Approach for Detecting Phishing Pages

  • Using Recurring Costs for Reputation Management in Peer-To-Peer Streaming Systems

  • Implications of Radio Fingerprinting on the Security of Sensor Networks

  • Anonymity and Security in Delay Tolerant Networks

  • OpenFire: Using Deception to Reduce Network Attacks

  • Modeling and Detection of Complex Attacks

  • SET: Detecting node clones in Sensor Networks

  • A BitTorrent-Driven Distributed Denial-of-Service Attack

  • Enhancing Frequency-based Wormhole Attack Detection with Novel Jitter Waveforms

  • An Assessment of VoIP Covert Channel Threats

  • RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks

  • Secure Lightweight Tunnel for Monitoring Transport Containers

  • PWC: A Proactive Worm Containment Solution for Enterprise Networks

  • Simple Authentication for the Web

  • Parameterizing Access Control for Heterogeneous Peer-to-Peer Applications

  • Detecting Worms via Mining Dynamic Program Execution

  • Breaking EMAP

  • Detecting Bogus BGP Route Information: Going Beyond Prefix Hijacking

  • Intrusion Detection Technology based on CEGA-SVM

  • Simple Cross-Site Attack Prevention

  • Secure Crash Reporting in Vehicular Ad hoc Networks

  • Global interoperability of national security and emergency preparedness (NS/EP) telecommunications services

  • Burstification effect on the TCP Synchronization and Congestion Window mechanism

  • Resource Consumption Based Preemption for Providing Fairness in Optical Burst Switching Networks

  • Optimal Timeslot Size for Synchronous Optical Burst Switching