All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
Author(s): Mario Marco Corbelli | Fabio Garzia | Roberto Cusani
Volume: 04
Issue: 03
Year: 2013




Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
Author(s): Lance Cleghorn
Volume: 04
Issue: 03
Year: 2013




Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks
Author(s): Shweta Tripathi | Brij Gupta | Ammar Almomani | Anupama Mishra | Suresh Veluru
Volume: 04
Issue: 03
Year: 2013




Diffusion Analysis of Message Expansion in STITCH-256
Author(s): Norziana Jamil | Ramlan Mahmod | Muhammad Reza Z’aba | Nur Izura Udzir | Zuriati Ahmad Zukarnain
Volume: 04
Issue: 03
Year: 2013




A Novel Solution to Handle DDOS Attack in MANET
Author(s): Meghna Chhabra | Brij Gupta | Ammar Almomani
Volume: 04
Issue: 03
Year: 2013




Web Security and Log Management: An Application Centric Perspective
Author(s): Andrew Mwaura Kahonge | William Okello-Odongo | Evans K. Miriti | Elisha Abade
Volume: 04
Issue: 03
Year: 2013




Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing
Author(s): Abou-el-ela Abdou Hussien | Nermin Hamza | Hesham A. Hefny
Volume: 04
Issue: 02
Year: 2013




The Package Concept for Enforcing Usage Control
Author(s): Patricia Ghann | Changda Wang | Conghua Zhou
Volume: 04
Issue: 02
Year: 2013




Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations
Author(s): Maria Chroni | Angelos Fylakis | Stavros D. Nikolopoulos
Volume: 04
Issue: 02
Year: 2013




A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
Author(s): Khalid Benlhachmi | Mohammed Benattou
Volume: 04
Issue: 02
Year: 2013




ISO/IEC 27000, 27001 and 27002 for Information Security Management
Author(s): Georg Disterer
Volume: 04
Issue: 02
Year: 2013




Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
Author(s): Dmitry Silnov
Volume: 04
Issue: 02
Year: 2013




RFID Applications: Prospects and Challenges in Bangladesh
Author(s): Abdul Kadar Muhammad Masum | Faruk Bhuiyan | Kazi Golam Azam
Volume: 04
Issue: 02
Year: 2013




A Socio-Technical Approach to Cyber Risk Management and Impact Assessment
Volume: 04
Issue: 01
Year: 2013



A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
Volume: 04
Issue: 01
Year: 2013



Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment
Volume: 04
Issue: 01
Year: 2013



Technology of Secure File Archiving in the Uniformly Random Distributed Archive Scheme
Volume: 04
Issue: 01
Year: 2013



Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case
Author(s): Qingquan Sun | Peng Wu | Yeqing Wu | Mengcheng Guo | Jiang Lu
Volume: 03
Issue: 04
Year: 2012




Category-Based Intrusion Detection Using PCA
Author(s): Gholam Reza Zargar | Tania Baghaie
Volume: 03
Issue: 04
Year: 2012




Dynamic Identity Based Authentication Protocol for Two-Server Architecture
Author(s): Sandeep K. Sood
Volume: 03
Issue: 04
Year: 2012




MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents
Author(s): Thomas Djotio Ndié | Claude Tangha | Guy Bertrand Fopak
Volume: 03
Issue: 04
Year: 2012




Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models
Author(s): Alfredo Maesa | Fabio Garzia | Michele Scarpiniti | Roberto Cusani
Volume: 03
Issue: 04
Year: 2012




Identifier Migration for Identity Continuance in Single Sign-On
Author(s): Yoshio Kakizaki | Kazunari Maeda | Keiichi Iwamura
Volume: 03
Issue: 04
Year: 2012




State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming
Author(s): Mario Góngora-Blandón | Miguel Vargas-Lombardo
Volume: 03
Issue: 04
Year: 2012




C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
Author(s): Moad Mowafi | Lo'ai Tawalbeh | Walid Aljoby | Mohammad Al-Rousan
Volume: 03
Issue: 04
Year: 2012




Simultaneous Hashing of Multiple Messages
Author(s): Shay Gueron | Vlad Krasnov
Volume: 03
Issue: 04
Year: 2012




Secure Messaging Implementation in OpenSC
Author(s): Maurizio Talamo | Maulahikmah Galinium | Christian H. Schunck | Franco Arcieri
Volume: 03
Issue: 04
Year: 2012




Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture
Author(s): Amir Mohamed Talib | Rodziah Atan | Rusli Abdullah | Masrah Azrifah Azmi Murad
Volume: 03
Issue: 04
Year: 2012




Digital Forensics and Cyber Crime Datamining
Author(s): K. K. Sindhu | B. B. Meshram
Volume: 03
Issue: 03
Year: 2012




Data Stream Subspace Clustering for Anomalous Network Packet Detection
Author(s): Zachary Miller | Wei Hu
Volume: 03
Issue: 03
Year: 2012




Feedback Reliability Ratio of an Intrusion Detection System
Author(s): Usha Banerjee | Gaurav Batra | K. V. Arya
Volume: 03
Issue: 03
Year: 2012




A New Steganography Method Based on the Complex Pixels
Author(s): Amin Hashemi Pour | Ali Payandeh
Volume: 03
Issue: 03
Year: 2012




Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
Author(s): Aziz Baayer | Nourddine Enneya | Mohammed Elkoutbi
Volume: 03
Issue: 03
Year: 2012




Perception on Cyber Terrorism: A Focus Group Discussion Approach
Author(s): Rabiah Ahmad | Zahri Yunos | Shahrin Sahib | Mariana Yusoff
Volume: 03
Issue: 03
Year: 2012




The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n,2n – 1,2n,–n) Equations
Author(s): Xinqian Lin | Shengqiang Tang | Wentao Huang
Volume: 03
Issue: 03
Year: 2012




The Application of Mixed Method in Developing a Cyber Terrorism Framework
Author(s): Rabiah Ahmad | Zahri Yunos
Volume: 03
Issue: 03
Year: 2012




Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
Author(s): Archana Tiwari | Manisha Sharma
Volume: 03
Issue: 03
Year: 2012




Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Author(s): Yaser Jararweh | Lo’ai Tawalbeh | Hala Tawalbeh | Abidalrahman Moh’d
Volume: 03
Issue: 02
Year: 2012




Effect of Network Traffic on IPS Performance
Author(s): Shahriar Mohammadi | Vahid Allahvakil | Mojtaba Khaghani
Volume: 03
Issue: 02
Year: 2012




A Visual Cryptography Based Digital Image Copyright Protection
Author(s): Adel Hammad Abusitta
Volume: 03
Issue: 02
Year: 2012




A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS
Author(s): Ahmad Bakhtiyari Shahri | Zuraini Ismail
Volume: 03
Issue: 02
Year: 2012




New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
Author(s): Ming Tong | Tao Chen | Wei Zhang | Linna Dong
Volume: 03
Issue: 02
Year: 2012




Determinants in Human Gait Recognition
Author(s): Tahir Amin | Dimitrios Hatzinakos
Volume: 03
Issue: 02
Year: 2012




A Robust Method to Detect Hidden Data from Digital Images
Author(s): Romany F. Mansour | W. F. Awwad | A. A. Mohammed
Volume: 03
Issue: 02
Year: 2012




A Fair Electronic Cash System with Identity-Based Group Signature Scheme
Author(s): Khalid. O. Elaalim | Shoubao Yang
Volume: 03
Issue: 02
Year: 2012




Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks
Author(s): Sanjeev Kumar | Raja Sekhar Reddy Gade
Volume: 03
Issue: 02
Year: 2012




Reference Encryption for Access Right Segregation and Domain Representation
Author(s): Lanfranco Lopriore
Volume: 03
Issue: 02
Year: 2012



