ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTING

Author(s): Katerina Lourida | Antonis Mouhtaropoulos | Alex Vakaloudis
Volume: 2
Issue: 3
Year: 2013





DIGITAL FORENSIC TRENDS AND FUTURE

Author(s): Farhood Norouzizadeh Dezfoli | Ali Dehghantanha | Ramlan Mahmoud | Nor Fazlida Binti Mohd Sani | Farid Daryabar
Volume: 2
Issue: 2
Year: 2013





AN AUTOMATED MALWARE DETECTION SYSTEM FOR ANDROID USING BEHAVIOR-BASED ANALYSIS AMDA

Author(s): Kevin Joshua Abela | Don Kristopher Angeles | Jan Raynier Delas Alas | Robert Joseph Tolentino | Miguel Alberto Gomez
Volume: 2
Issue: 2
Year: 2013





DOMAIN INFORMATION BASED BLACKLISTING METHOD FOR THE DETECTION OF MALICIOUS WEBPAGES

Author(s): Ralph Edem Agbefu | Yoshiaki Hori | Kouichi Sakurai
Volume: 2
Issue: 2
Year: 2013





ON ENHANCING DATA UTILITY IN K-ANONYMIZATION FOR DATA WITHOUT HIERARCHICAL TAXONOMIES

Author(s): Mohammad Rasool Sarrafi Aghdam | Noboru Sonehara
Volume: 2
Issue: 2
Year: 2013





A REVIEW ON IMPACTS OF CLOUD COMPUTING ON DIGITAL FORENSICS

Author(s): Farid Daryabar | Ali Dehghantanha | Nur Izura Udzir | Nor Fazlida binti Mohd Sani | Solahuddin bin Shamsuddin
Volume: 2
Issue: 2
Year: 2013





THE MEAN FAILURE COST CYBERSECURITY MODEL TOWARD SECURITY MEASURES AND ASSOCIATED MECHANISMS

Author(s): Neila Rjaibi | Latifa Ben Arfa Rabai | Anis Ben Aissa
Volume: 2
Issue: 2
Year: 2013





EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT

Author(s): Lin G. De Luna | Patrick Kevin G. Detera | Samuel David F. Guerrero | Hiro R. Mejia | Miguel Alberto N. Gomez
Volume: 2
Issue: 1
Year: 2013





INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS

Author(s): Alexis V. Pantola | Susan Pancho-Festin | Florante Salvador
Volume: 2
Issue: 1
Year: 2013





AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORK INTRUDERS

Author(s): Ben Whitham
Volume: 2
Issue: 1
Year: 2013





PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS

Author(s): Christian Horn | Matthias Blankenburg | Maximilian Fechteler | Jorg Kruger
Volume: 2
Issue: 1
Year: 2013





A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING – AN EMPIRICAL STUDY

Author(s): WD Kearney | HA Kruger
Volume: 2
Issue: 1
Year: 2013





A DRM SCHEME USING FILE PHYSICAL INFORMATION

Author(s): Cheng Qu | Yinyan Yu | Zhi Tang | Xiaoyu Cui
Volume: 2
Issue: 1
Year: 2013





PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT

Author(s): Yoshihiro Kita | Fumio Sugai | MiRang Park | Naonobu Okazaki
Volume: 2
Issue: 1
Year: 2013





AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES)

Author(s): Frances Bernadette C. De Ocampo | Trisha Mari L. Del Castillo | Miguel Alberto N. Gomez
Volume: 2
Issue: 1
Year: 2013





COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS

Author(s): Gianni Fenu | Fabrizio Solinas
Volume: 2
Issue: 1
Year: 2013





A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION

Author(s): Shuhui Hou | Siu-Ming Yiuy | Tetsutaro Ueharaz | Ryoichi Sasakix
Volume: 2
Issue: 1
Year: 2013





SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION

Author(s): Ahmad Abusukhon | Mohamad Talib | Issa Ottoum
Volume: 1
Issue: 4
Year: 2012





AN ANALYSIS OF BASE STATION LOCATION ACCURACY WITHIN MOBILE-CELLULAR NETWORKS

Author(s): Liam Smit | Adrie Stander | Jacques Ophoff
Volume: 1
Issue: 4
Year: 2012





MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS

Author(s): Mohammed Ibrahim | Mohd Taufik Abdullah | Ali Dehghantanha
Volume: 1
Issue: 4
Year: 2012





A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS

Author(s): Asou Aminnezhad | Ali Dehghantanha | Mohd Taufik Abdullah
Volume: 1
Issue: 4
Year: 2012





A COMPARATIVE STUDY OF THE PERCEPTIONS OF END USERS IN THE EASTERN, WESTERN, CENTRAL, SOUTHERN AND NORTHERN REGIONS OF SAUDI ARABIA ABOUT EMAIL SPAM AND DEALING WITH IT

Author(s): Hasan Alkahtani | Robert Goodwin | Paul Gardner-Stephen
Volume: 1
Issue: 4
Year: 2012





TRUSTED DOCUMENT SIGNING BASED ON USE OF BIOMETRIC (FACE) KEYS

Author(s): Ahmed Elmadani
Volume: 1
Issue: 4
Year: 2012





TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD

Author(s): M. Azuwa | Rabiah Ahmad | Shahrin Sahib | Solahuddin Shamsuddin
Volume: 1
Issue: 4
Year: 2012





EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS

Author(s): K SuganyaDevi | N Malmurugan | R Sivakumar
Volume: 1
Issue: 3
Year: 2012





THE PROBLEM TO CONSENT TO THE COLLECTION, USE, AND DISCLOSURE OF PERSONAL INFORMATION IN CYBERSPACE

Author(s): Thilla Rajaretnam
Volume: 1
Issue: 3
Year: 2012





A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING

Author(s): Salasiah Sulaiman | Zaiton Muda | Julia Juremi | Ramlan Mahmod | Sharifah Md. Yasin
Volume: 1
Issue: 3
Year: 2012





SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED

Author(s): A. Z. Yonis | M. F. L. Abdullah
Volume: 1
Issue: 3
Year: 2012





ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY

Author(s): Julia Juremi | Ramlan Mahmod | Salasiah Sulaiman | Jazrin Ramli
Volume: 1
Issue: 3
Year: 2012





RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS

Author(s): Ramya Dharam | Sajjan G. Shiva
Volume: 1
Issue: 3
Year: 2012





TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY

Author(s): Mouna Jouini | Anis Ben Aissa | Latifa Ben Arfa Rabai | Ali Mili
Volume: 1
Issue: 3
Year: 2012





DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?

Author(s): Ida Madieha Abdul Ghani Azmi | Sonny Zulhuda | Sigit Puspito Wigati Jarot
Volume: 1
Issue: 3
Year: 2012





MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME

Author(s): Fazli Bin Mat Nor | Kamarularifin Abd Jalil | Jamalul-lail Ab Manan
Volume: 1
Issue: 3
Year: 2012





SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE

Author(s): Ala A. Abdulrazeg | Norita Md Norwawi | Nurlida Basir
Volume: 1
Issue: 3
Year: 2012





THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE

Author(s): Thilla Rajaretnam
Volume: 1
Issue: 3
Year: 2012





AMALGAMATION OF CYCLIC BIT OPERATION IN SD-EI IMAGE ENCRYPTION METHOD: AN ADVANCED VERSION OF SD-EI METHOD: SD-EI VER-2

Author(s): Somdip Dey
Volume: 1
Issue: 3
Year: 2012





AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIES

Author(s): Somdip Dey
Volume: 1
Issue: 2
Year: 2012





AN AIS INSPIRED ALERT REDUCTION MODEL

Author(s): Mohammad Mahboubian | Nur Izura Udzir | Shamala Subramaniam | Nor Asila Wati Abdul Hamid
Volume: 1
Issue: 2
Year: 2012





MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASE

Author(s): Davoud Mougouei | Wan Nurhayati Wan Ab. Rahman | Mohammad Moein Almasi
Volume: 1
Issue: 2
Year: 2012





POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMS

Author(s): Qizhi Tian | Sorin A. Huss
Volume: 1
Issue: 2
Year: 2012





TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTING

Author(s): Edna Dias Canedo | Rafael Timóteo de Sousa Junior | Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
Volume: 1
Issue: 2
Year: 2012





FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAY

Author(s): Kee-Won Kim | Jun-Cheol Jeon
Volume: 1
Issue: 2
Year: 2012





AUTHENTICATING DEVICES IN UBIQUITOUS COMPUTING ENVIRONMENT

Author(s): Kamarularifin Abd Jalil | Qatrunnada Binti Abdul Rahman
Volume: 1
Issue: 2
Year: 2012





A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASP

Author(s): Mark Evered
Volume: 1
Issue: 2
Year: 2012





GENETIC ALGORITHM APPROACH FOR RISK REDUCTION OF INFORMATION SECURITY

Author(s): Alireza Tamjidyamcholo | Rawaa Dawoud Al-Dabbagh
Volume: 1
Issue: 1
Year: 2012





SECURE MODEL FOR VIRTUALIZATION LAYER IN CLOUD INFRASTRUCTURE

Author(s): Sina Manavi | Sadra Mohammadalian | Nur Izura Udzir | Azizol Abdullah
Volume: 1
Issue: 1
Year: 2012





FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT

Author(s): Pin Shen Teh | Shigang Yue | Andrew B.J. Teoh
Volume: 1
Issue: 1
Year: 2012





GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS

Author(s): Mohd Anuar Mat Isa | Jamalul-lail Ab Manan | Ramlan Mahmod | Habibah Hashim | Nur Izura Udzir | Ali Dehghan Tanha | Mar Yah Said
Volume: 1
Issue: 1
Year: 2012




