Issue Date | Title | Author(s) |
2008 | Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks | Khan, S; Mast, N; Loo, KK; Silahuddin, A |
2009 | Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks | Naeem, T; Loo, KK |
2010 | Criminal justice in France after September 11: Has the balance between liberty and security been disturbed? | Giannoulopoulos, D |
30-Jan-2020 | Digital Identities for Internet of Things Devices | Gronli, TM; Ginea, G |
2009 | The Fascist Moment: Security, Exclusion, Extermination | Neocleous, M |
2009 | A heuristic evaluation of the Facebook's advertising tool beacon | Jamal, A; Cole, M |
15-Jan-2010 | Intelligence and the machinery of government: conceptualizing the intelligence community | Davies, PHJ |
2016 | La lógica de la pacificación: Guerra-policía-acumulación | Neocleous, MA |
2014 | Mobile transactions over NFC and GSM | Saeed, MQ; Walter, C; Pourghomi, P; Ghinea, G |
2008 | Passive security threats and consequences in IEEE 802.11 wireless mesh networks | Khan, S; Mast, N; Loo, KK; Silahuddin, A |
2013 | A proposed NFC payment application | Pourghomi, P; Saeed, MQ; Ghinea, G |
2020 | Recursive Secure Filtering over Gilbert-Elliott Channels in Sensor Networks: The Distributed Case | Ding, D; Wang, Z; Han, QL; Zhang, XM |
2017 | Security of VoIP traffic over low or limited bandwidth networks | Alouneh, S; Abed, S; Ghinea, G |
2008 | Security: Collective good or commodity? | Krahmann, E |
2014 | Trusted integration of cloud-based NFC transaction players | Pourghomi, P; Saeed, MQ; Ghinea, G |
2007 | Usability issues with security of electronic mail | DeWitt, Alexander John Anthony George |
2011 | Validating digital forensic evidence | Shanmugam, Karthikeyan |