Volume 7, Number 1, January 2015 |
Citation Count |
|
Multi-Facet Trust Model for Online Social Network Environment
|
03 |
|
Accessing Secured Data in Cloud Computing Environment
|
06 |
|
Service Oriented Configuration Management of ‎Software ‎Architecture
|
0 |
|
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting?
|
0 |
|
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)
|
04 |
|
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS
|
05 |
|
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation
|
02 |
|
Volume 7, Number 2, March 2015 |
Citation Count |
|
Exploiting Rhetorical Relations to Multiple Documents Text Summarization
|
0 |
|
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols
|
01 |
|
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection
|
03 |
|
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography
|
01 |
|
Comprehensive Survey of Possible Security Issues on 4G Networks
|
06 |
|
Volume 7, Number 3, May 2015 |
Citation Count |
|
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions
|
04 |
|
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection
|
02 |
|
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws)
|
01 |
|
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication
|
0 |
|
Volume 7, Number 4, July 2015 |
Citation Count |
|
Deterring Hacking Strategies via Targeting Scanning Properties
|
- |
|
Providing End-To-End Secure Communications in GSM Networks
|
0 |
|
Volume 7, Number 5, September 2015 |
Citation Count |
|
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications
|
0 |
|
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization
|
0 |
|
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing
|
- |
|
Volume 7, Number 6, November 2015 |
Citation Count |
|
A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network
|
0 |
|
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms
|
04 |
|
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms
|
- |