Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Security and Communi...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Security and Communication Networks
Article . 2013 . Peer-reviewed
License: Wiley Online Library User Agreement
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
DBLP
Article . 2020
Data sources: DBLP
versions View all 2 versions
addClaim

Security of e‐systems

Authors: Mohammad S. Obaidat; Petros Nicopolitidis; Weili Han;

Security of e‐systems

Abstract

In recent years, the dependence of people on electronic syslarge amounts of data collected by honeypots. Via tems (e-systems) has increased tremendously. Examples of e-systems widely used in everyday life include stand-alone computers, wired and wireless networks, cellular telephony networks, corporateWeb sites, electronic service, e-commerce and e-payment systems, and e-government systems. Because of the aforementioned spread of e-systems, many corporations and businesses rely heavily on the effective, proper, and secure operation of them. In most cases, such systems are used for storing, transmitting, and exchanging sensitive and confidential information, unauthorized access of which entails loss of money and credibility as well as the release of confidential information to competitors or enemies. This security is a crucial factor for these systems; however, its implementation must be cost-efficient so as to enable their widespread use. The aim of this special issue of the Journal of Security and Communication Networks is to highlight recent research in the broad area of e-systems security. We hope that this issue will be a useful reference for current and future trends in the very active area of wireless sensor networking. We received 10 papers from all over the world. Each paper was reviewed by at least two qualified reviewers. We have accepted six papers; thus, the acceptance rate for this issue is 60%. The articles in this special issue are organized as follows. The first article is entitled “A Hybrid NFC– Bluetooth Secure Protocol for Credit Transfer Among Mobile Phones” and is authored by David M. Monteiro, Joel J. P. C. Rodrigues, Jaime Lloret, and Sandra Sendra. The article proposes a mobile peer-to-peer communication system that can be used for money transfers. The proposed system is based on near field communication and Bluetooth technology and thus utilizes a hybrid communication protocol that combines the security characteristics of near field communication and the relatively high Bluetooth data transfer rates. The proposed system was deployed and evaluated in real environments with good results. The second article is in the area of Web service security is entitled “Characterization of Attacks Collected from the Deployment of Web Service Honeypot” and is authored by Abdallah Ghourabi, Tarek Abbes, and Adel Bouhoula. It proposes a honeypot implementation for Web services. The proposed system addresses the problem of the very

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold