Volume 6, Number 1, January 2014 |
Citation Count |
|
Optimised Malware Detection in Digital Forensics
|
05 |
|
A Novel Paradigm in Authentication System Using Swifi Encryption /Decryption Approach
|
01 |
|
Cloud Computing and Security Issues in the Cloud
|
63 |
|
A Novel Approach: A Hybrid Semantic Matchmaker for Service Discovery in Service Oriented Architecture
|
02 |
|
SPARQL: Semantic Information Retrieval by Embedding Prepositions
|
01 |
|
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for Electronic Commerce Transactions and Payments
|
0 |
|
An IAC Approach for Detecting Profile Cloning in Online Social Networks
|
04 |
|
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
|
09 |
|
Volume 6, Number 2, March 2014 |
Citation Count |
|
The Impact of Management Information systems(MIS) Technologies on the quality of Services provided at the University of TABUK
|
03 |
|
Enhancing the Impregnability of Linux Servers
|
0 |
|
Implementing Packet Broadcasting Algorithm Of Mimo Based Mobile Ad-Hoc Networks To Exploit Diversity
|
02 |
|
A New Hybrid Algorithm for Business Intelligence Recommender System
|
0 |
|
Volume 6, Number 3, May 2014 |
Citation Count |
|
Privacy Protection for Role-Based Access Control in Service Oriented Architecture
|
01 |
|
Survey of Manet Misbehaviour Detection Approaches
|
08 |
|
Attack Graph-Based Risk Assessment and Optimisation Approach
|
05 |
|
Security Issues Associated with Big Data in Cloud Computing
|
50 |
|
A Survey of Trends in Massive DDOS Attacks and Cloud-Based Mitigations
|
18 |
|
Role of Integrated Virtual E-Learning System for Distance Learning Students
|
0 |
|
Self-Protection Mechanism For Wireless Sensor Networks
|
04 |
|
Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
|
01 |
|
Volume 6, Number 4, July 2014 |
Citation Count |
|
End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks.
|
01 |
|
Analysis of RSA Algorithm using GPU Programming
|
10 |
|
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
|
02 |
|
Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features
|
24 |
|
State of Mobile Banking in Tanzania and Security Issues
|
09 |
|
A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images
|
03 |
|
Volume 6, Number 5, September 2014 |
Citation Count |
|
A Secure Electronic Payment Protocol for Wireless Mesh Networks
|
01 |
|
Cloud Based Access Control Model for Selective Encryption of Documents with Traitor Detection
|
02 |
|
Reducing the Cognitive Load on Analysts through Hamming Distance Based Alert Aggregation
|
0 |
|
A Secure Cluster Based Communication in Wireless Network using Cryptographic Reports
|
0 |
|
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
|
01 |
|
Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review
|
06 |
|
Volume 6, Number 6, November 2014 |
Citation Count |
|
A Cryptographic Mutual Authentication Scheme for Web Applications
|
04 |
|
Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data Using Secure Division
|
02 |
|
Collaborative Defence for Distributed Attacks (Case Study of Palestinian Information Systems)
|
0 |
|
Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concepts
|
0 |
|
Key Management Techniques in Wireless Sensor Networks
|
03 |