Volume 7, Number 1, January 2015

  Citation Count

Multi-Facet Trust Model for Online Social Network Environment
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and 2Universiti Teknologi Petronas, Malaysia

03

Accessing Secured Data in Cloud Computing Environment
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia

06

Service Oriented Configuration Management of ‎Software ‎Architecture
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran

0

Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting?
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India

0

Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco

04

A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India

05

A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia

02

Volume 7, Number 2, March 2015

  Citation Count

Exploiting Rhetorical Relations to Multiple Documents Text Summarization
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and 2University of Yamanashi, Japan

0

An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia

01

A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan

03

Certificate Less Key Management Scheme in Manet Using Threshold Cryptography
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India

01

Comprehensive Survey of Possible Security Issues on 4G Networks
Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India

06

Volume 7, Number 3, May 2015

  Citation Count

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh'd Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and 2Tafila Technical University, Jordan

04

An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India

02

A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws)
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan

01

Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India

0

Volume 7, Number 4, July 2015

  Citation Count

Deterring Hacking Strategies via Targeting Scanning Properties
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia

-

Providing End-To-End Secure Communications in GSM Networks
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt

0

Volume 7, Number 5, September 2015

  Citation Count

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India

0

Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK

0

An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India

-

Volume 7, Number 6, November 2015

  Citation Count

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia

0

A Machine Learning Approach to Anomaly-Based Detection on Android Platforms
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria

04

A System for Validating and Comparing Host-Based Ddos Detection Mechanisms
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam

-