Volume 5, Number 1, January 2013 |
Citation Count |
|
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
|
0 |
|
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
|
09 |
|
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
|
0 |
|
How to Find a Fixed Point in Shuffle Efficiently
|
0 |
|
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
|
09 |
|
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
|
12 |
|
Text Steganographic Approaches: A Comparison
|
42 |
|
Volume 5, Number 2, March 2013 |
Citation Count |
|
Incident Response Plan for a Small to Medium Sized Hospital
|
0 |
|
Privacy Preserving Data Mining by using Implicit Function Theorem
|
02 |
|
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems
|
0 |
|
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
|
03 |
|
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
|
0 |
|
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
|
0 |
|
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
|
02 |
|
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment
|
02 |
|
Code Aware Dynamic Source Routing for Distributed Sensor Network
|
01 |
|
Resonance Based Micromechanical Cantilever for Gas Sensing
|
0 |
|
Traceback of DOS Over Autonomous Systems
|
04 |
|
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment
|
26 |
|
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
|
01 |
|
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour
|
0 |
|
E-Commerce Systems Security for Small Businesses
|
04 |
|
Volume 5, Number 3, May 2013 |
Citation Count |
|
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters
|
0 |
|
An Efficient Group Authentication for Group Communications
|
06 |
|
Password Based Scheme and Group Testing for Defending DDOS Attacks
|
03 |
|
Security Algorithms for WIMAX
|
02 |
|
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network
|
04 |
|
HTTPI Based Web Service Security over SOAP
|
05 |
|
Implementation of a Security Protocol for Bluetooth and WI-FI
|
03 |
|
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine
|
11 |
|
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks
|
02 |
|
Volume 5, Number 4, July 2013 |
Citation Count |
|
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level
|
0 |
|
Phishing Techniques and Mitigating the Associated Security Risks
|
* |
|
Wireless Networks Security in Jordan: A Field Study
|
03 |
|
Early Detection of SQL Injection Attacks
|
06 |
|
A Framework for Security Components Anomalies Severity Evaluation and Classification
|
0 |
|
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication
|
04 |
|
Defence Schemes From Attacker's Own Reward Processes
|
01 |
|
Controlling IP Falsifying Using Realistic Simulation
|
0 |
|
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
|
01 |
|
Internal Security on an IDS Based on Agents
|
02 |
|
A New Stemmer to Improve Information Retrieval
|
16 |
|
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm
|
0 |
|
Steganography and Random Grids
|
0 |
|
An Improved MULTI-SOM Algorithm
|
02 |
|
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario
|
01 |
|
Volume 5, Number 5, September 2013 |
Citation Count |
|
Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?
|
03 |
|
A Security Framework in Cloud Computing Infrastructure
|
13 |
|
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC)
|
0 |
|
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT)
|
0 |
|
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing
|
07 |
|
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System
|
06 |
|
Secure Collaborative Processing Architecture for MITB Attack Detection
|
02 |
|
Security Challenges, Issues and Their Solutions For Vanet
|
64 |
|
Defense Mechanisms for Computer-Based Information Systems
|
02 |
|
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
|
02 |
|
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment
|
05 |
|
Z-Shaped Dipole Antenna and its Fractal Iterations
|
04 |
|
A Novel Approach for Secure Routing Through BGP Using Symmetric Key
|
01 |
|
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
|
0 |
|
A Novel Technique to Detect Intrusion in Manet
|
03 |
|
Volume 5, Number 6, November 2013 |
Citation Count |
|
Complete Network Security Protection for SME's within Limited Resources
|
02 |
|
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases
|
02 |
|
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking
|
01 |
|
Securing Mobile Cloud Using Finger Print Authentication
|
13 |
|
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine
|
01 |
|
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems
|
0 |
|
Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical Spectrum Hole
|
0 |