About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
SECURECOMM 2006
SECOVAL 2006WENS 2006
Other Years
SECURECOMM 2005SECURECOMM 2006SECURECOMM 2007SECURECOMM 2008SECURECOMM 2009SECURECOMM 2010SECURECOMM 2011SECURECOMM 2012SECURECOMM 2013SECURECOMM 2014SECURECOMM 2014SECURECOMM 2015SECURECOMM 2016SECURECOMM & ATCS & SEPRIOT 2017SECURECOMM 2017SECURECOMM 2020SECURECOMM 2021SECURECOMM 2022SECURECOMM 2023
Ethics and Malpractice Statement

    SECURECOMM

    2nd International ICST Conference on Security and Privacy in Comunication Networks

    The scope of SecureComm 2006 has been broadened since the inaugural 2005 event. SecureComm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas …

    The scope of SecureComm 2006 has been broadened since the inaugural 2005 event. SecureComm seeks high-quality research contributions in the form of well-developed full papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.

    more »
    Editor(s): Mukesh Singhal (University of Kentucky) and John Baras (University of Maryland, College Park)
    Publisher
    IEEE
    ISBN
    1-4244-0423-1
    Conference dates
    28th Aug–1st Sep 2006
    Location
    Baltimore, USA
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 33 results
    Page size: 102550
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    • A Flexible Approach to Intrusion Alert Anonymization and Correlation

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Dingbang Xu , Peng Ning
    • An Intellilgent Infrastructure Strategy to Improving the Performance and Detection Capability of Intrusion Detection Systems

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Emmanuel Hooper
    • A Framework for Identifying Compromised Nodes in Sensor Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Qing Zhang , Ting Yu , Peng Ning
    • Denial of Service Attacks and Defenses in Decentralized Trust Management

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu
    • An Architecture for an Email Worm Prevention System

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba
    • A Distributed Stealthy Coordination Mechanism for Worm Synchronization

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya Krishnan, Adrian Perrig
    • Effective Detection of Active Worms with Varying Scan Rate

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Wei Yu, Xun Wang, Dong Xuan , David Lee
    • On Mobile Viruses Exploiting Messaging and Bluetooth Services

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Abhijit Bose, Kang G. Shin
    • Discount Anonymous On Demand Routing for Mobile Ad hoc Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Liu Yang, Markus Jakobsson, Susanne Wetzel
    • In-Band Wormholes and Countermeasures in OLSR Networks

      Research Article in 2nd International ICST Conference on Security and Privacy in Comunication Networks

      Peter Kruus, Dan Sterne, Richard Gopaul, Michael Heyman, Brian Rivera, Brian Luu, Peter Budulas, Tommy Johnson, Natalie Ivanic, Geoff Lawler
    • 1
    • 2
    • 3
    • 4
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL