Volume 6, Number 1, January 2014

  Citation Count

Optimised Malware Detection in Digital Forensics
SaeedAlmarri1 and Paul Sant2, 1University of Bedfordshire, United Kingdom and 2University Campus Milton Keynes, United Kingdom

05

A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
Shadi R. Masadeh1, Ahmad Azzazi2, Bassam A. Y. Alqaralleh3 and Ali, Mousa.Al Sbou3, 1Isra University, Jordan, 2Applied Science University, Jordan and 3Al-Hussein Bin Talal University, Jordan

01

Cloud Computing and Security Issues in the Cloud
Monjur Ahmed1 and Mohammad Ashraf Hossain2, 1Daffodil Institute of IT, Bangladesh and 2Freelance IT Consultant, Bangladesh

63

A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture
Soodeh Pakari, Esmaeel Kheirkhah and Mehrdad Jalali, Islamic Azad University, Mashhad, Iran

02

SPARQL: Semantic Information Retrieval by Embedding Prepositions
Sneha Kumari, Rajiv Pandey, Amit Singh and Himanshu Pathak, Amity University, India

01

A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions and Payments
Fahad A Alqahtani, De Montfort University, United Kingdom

0

An IAC Approach for Detecting Profile Cloning in Online Social Networks
MortezaYousefi Kharaji1 and FatemehSalehi Rizi2, 1Mazandaran University of Science and Technology, Iran and 2Sheikhbahaee University of Isfahan, Iran

04

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
Pallavi Vijay Chavan1, Mohammad Atique2 and Latesh Malik1, 1GHRCE - Nagpur, India and 2SGBAU -Amravati, India

09

Volume 6, Number 2, March 2014

  Citation Count

The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University of TABUK
Hiyam S. Ensour and Tareg M. Alinizi, Petra of university, Jordan

03

Enhancing the Impregnability of Linux Servers
Rama Koteswara Rao G1, Satya Prasad R2, Pathanjali Sastri A2 and P.E.S.N. Prasad1, 1Prasad V. Potluri Siddhartha Institute of Technology, India and 2Acharya Nagarjuna University, India

0

Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity
Swati Chowdhuri1, Santanu Maiti1, Sheli Sinha Chaudhuriand2 and P.K.Baneerjee2, 1Seacom Engineering College, India and 2Jadavpur University, India

02

A New Hybrid Algorithm for Business Intelligence Recommender System
P.Prabhu and N.Anbazhagan, Alagappa University, India

0

Volume 6, Number 3, May 2014

  Citation Count

Privacy Protection for Role-Based Access Control in Service Oriented Architecture
Helen Cheung, Celia Li, Ye Yu and Cungang Yang, Ryerson University, Canada

01

Survey of Manet Misbehaviour Detection Approaches
Punya Peethambaran and Jayasudha J. S, SCT College of Engineering, India

08

Attack Graph-Based Risk Assessment and Optimisation Approach
Mohammed Alhomidi and Martin Reed, University of Essex, UK

05

Security Issues Associated with Big Data in Cloud Computing
Venkata Narasimha Inukollu1 , Sailaja Arsi1 and Srinivasa Rao Ravuri2, 1Texas Tech University, USA and 2Cognizant Technology Solutions, India

50

A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
FuiFui Wong and Cheng Xiang Tan, TongJi University, China

18

Role of Integrated Virtual E-Learning System for Distance Learning Students
Shweta Soni and M.D.Katkar, G.H.Raisoni Institute of Engineering and Technology for Women, India

0

Self-Protection Mechanism For Wireless Sensor Networks
Hosam Soleman and Ali Payandeh, Maleke-Ashtar university Islamic Republic of Iran

04

Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
Divya Ann Luke, Jayasudha. J.S, SCT College of Engineering, India

01

Volume 6, Number 4, July 2014

  Citation Count

End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks.
Prabesh Dongol and Dhadesugoor R. Vaman, Prairie View A&M University, USA

01

Analysis of RSA Algorithm using GPU Programming
Sonam Mahajan and Maninder Singh, Thapar University, India

10

Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Ajah Ifeyinwa Angela, Ebonyi State University Abakaliki, Nigeria

02

Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features
Ranjeet Masram, Vivek Shahare, Jibi Abraham, Rajni Moona, College of Engineering Pune, India

24

State of Mobile Banking in Tanzania and Security Issues
Bossi Masamila, Dublin Institute of Technology, Ireland

09

A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
El-Tigani B. Abdelsatir, Sahar Salahaldeen, Hyam Omar and Afra Hashim, University of Khartoum, Sudan

03

Volume 6, Number 5, September 2014

  Citation Count

A Secure Electronic Payment Protocol for Wireless Mesh Networks
Helen Cheung and Cungang Yang, Ryerson University, Canada

01

Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection
Punya Peethambaran and. Jayasudha J. S, Sct College of Engineering, India

02

Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation
Peter Mell1 and Richard Harang2, 1National Institute of Standards and Technology, USA and 2U.S. Army Research Laboratory, USA

0

A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports
Hamsha and Nagaraj, RVCE Bangalore, India

0

A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
Waqas Aman, Gjovik University College, Norway

01

Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review
Kennedy Edemacu, Martin Euku and Richard Ssekibuule, Makerere UniversityKampala, Uganda

06

Volume 6, Number 6, November 2014

  Citation Count

A Cryptographic Mutual Authentication Scheme for Web Applications
Yassine Sadqi, Ahmed Asimi and Younes Asimi, Ibn Zohr University, Morocco

04

Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division
Sumana M1 and Hareesha K S2, 1M S Ramaiah Institute of Technology, India and 2Manipal Institute of Technology, India

02

Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems)
Hani Qusa, University College of Applied Science, Palestine

0

Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India

0

Key Management Techniques in Wireless Sensor Networks
Khawla Naji Shnaikat1 and Ayman Ahmed AlQudah2, 1University of Jordan, Jordan and 2University of Dammam, KSA

03