A
-
Abadi, M.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
-
Abolghasemi, M.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Aghaeinia, H.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Al-Nazer, A. A.
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
B
-
Berenjkoub, M.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
D
-
Dawson, E.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
F
-
Faez, K.
Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]
-
Fanian, A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
G
-
Gulliver, T. A.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Gutub, A. Abdul-Aziz
High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]
H
-
Habibi, J.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
J
-
Jalili, R.
Editorial [Volume 2, Issue 1, 2010, Pages 1-2]
-
Jalili, R.
Editorial [Volume 2, Issue 2, 2010, Pages 67-68]
-
Jalili, S.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]
R
-
Reid, J.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Rijmen, V.
Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]
S
-
Sadat Emami, S.
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]
-
Saidi, H.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]
-
Salim, F.
Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]
-
Saniee Abadeh, M.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]
Z
-
Zokaei, S.
A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]