Login / Signup
J. Information Security
2010
2012
2010
2012
Keyphrases
Publications
volume 3, number 1, 2012
Vijay Anand
,
Jafar Saniie
,
Erdal Oruklu
Security Policy Management Process within Six Sigma Framework.
J. Information Security
3 (1) (2012)
Rasim M. Alguliev
,
Saadat A. Nazirova
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem.
J. Information Security
3 (1) (2012)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy.
J. Information Security
3 (1) (2012)
Tat Wing Chim
,
Jeanno Chin Long Cheung
,
Siu-Ming Yiu
,
Lucas Chi Kwong Hui
,
Victor O. K. Li
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET.
J. Information Security
3 (1) (2012)
Peter Schartner
Random but System-Wide Unique Unlinkable Parameters.
J. Information Security
3 (1) (2012)
Yogendra Narain Singh
,
Sanjay Kumar Singh
Evaluation of Electrocardiogram for Biometric Authentication.
J. Information Security
3 (1) (2012)
Ilung Pranata
,
Geoff Skinner
,
Rukshan Athauda
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment.
J. Information Security
3 (1) (2012)
volume 3, number 2, 2012
Ming Tong
,
Tao Chen
,
Wei Zhang
,
Linna Dong
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks.
J. Information Security
3 (2) (2012)
Yaser Jararweh
,
Lo'ai Ali Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh'd
Hardware Performance Evaluation of SHA-3 Candidate Algorithms.
J. Information Security
3 (2) (2012)
Youssef Gahi
,
Mouhcine Guennoun
,
Zouhair Guennoun
,
Khalil El-Khatib
Privacy Preserving Scheme for Location-Based Services.
J. Information Security
3 (2) (2012)
Tahir Amin
,
Dimitrios Hatzinakos
Determinants in Human Gait Recognition.
J. Information Security
3 (2) (2012)
Shweta Tripathi
,
Bandu Baburao Meshram
Digital Evidence for Database Tamper Detection.
J. Information Security
3 (2) (2012)
Ahmad Bakhtiyari Shahri
,
Zuraini Ismail
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS.
J. Information Security
3 (2) (2012)
Khalid O. Elaalim
,
Shoubao Yang
A Fair Electronic Cash System with Identity-Based Group Signature Scheme.
J. Information Security
3 (2) (2012)
Romany Fouad Mansour
,
Waleed F. Awwad
,
Amal A. Mohammed
A Robust Method to Detect Hidden Data from Digital Images.
J. Information Security
3 (2) (2012)
Sanjeev Kumar
,
Raja Sekhar Reddy Gade
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks.
J. Information Security
3 (2) (2012)
Yonghong Chen
,
Jiancong Chen
Digital Image Watermarking Based on Mixed Error Correcting Code.
J. Information Security
3 (2) (2012)
Vladimir V. Grishachev
Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications.
J. Information Security
3 (2) (2012)
Lanfranco Lopriore
Reference Encryption for Access Right Segregation and Domain Representation.
J. Information Security
3 (2) (2012)
Adel Hammad Abusitta
A Visual Cryptography Based Digital Image Copyright Protection.
J. Information Security
3 (2) (2012)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Effect of Network Traffic on IPS Performance.
J. Information Security
3 (2) (2012)
volume 3, number 3, 2012
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs.
J. Information Security
3 (3) (2012)
Rabiah Ahmad
,
Zahri Yunos
,
Shahrin Sahib
,
Mariana Yusoff
Perception on Cyber Terrorism: A Focus Group Discussion Approach.
J. Information Security
3 (3) (2012)
Zachary Miller
,
Wei Hu
Data Stream Subspace Clustering for Anomalous Network Packet Detection.
J. Information Security
3 (3) (2012)
Rabiah Ahmad
,
Zahri Yunos
The Application of Mixed Method in Developing a Cyber Terrorism Framework.
J. Information Security
3 (3) (2012)
K. K. Sindhu
,
B. B. Meshram
Digital Forensics and Cyber Crime Datamining.
J. Information Security
3 (3) (2012)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Feedback Reliability Ratio of an Intrusion Detection System.
J. Information Security
3 (3) (2012)
Amin Hashemi Pour
,
Ali Payandeh
A New Steganography Method Based on the Complex Pixels.
J. Information Security
3 (3) (2012)
Xinqian Lin
,
Shengqiang Tang
,
Wentao Huang
) Equations.
J. Information Security
3 (3) (2012)
Archana Tiwari
,
Manisha Sharma
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication.
J. Information Security
3 (3) (2012)
volume 3, number 4, 2012
Moad Mowafi
,
Lo'ai Ali Tawalbeh
,
Walid A. Aljoby
,
Mohammad Al-Rousan
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol.
J. Information Security
3 (4) (2012)
Yoshio Kakizaki
,
Maeda Kazunari
,
Keiichi Iwamura
Identifier Migration for Identity Continuance in Single Sign-On.
J. Information Security
3 (4) (2012)
Mario Góngora-Blandón
,
Miguel Vargas-Lombardo
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming.
J. Information Security
3 (4) (2012)
Thomas Ndié Djotio
,
Claude Tangha
,
Guy Bertrand Fopak
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents.
J. Information Security
3 (4) (2012)
Alfredo Maesa
,
Fabio Garzia
,
Michele Scarpiniti
,
Roberto Cusani
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models.
J. Information Security
3 (4) (2012)
Sandeep K. Sood
Dynamic Identity Based Authentication Protocol for Two-Server Architecture.
J. Information Security
3 (4) (2012)
Gholam Reza Zargar
,
Tania Baghaie
Category-Based Intrusion Detection Using PCA.
J. Information Security
3 (4) (2012)
Amir Mohamed Talib
,
Rodziah Binti Atan
,
Rusli Abdullah
,
Masrah Azrifah Azmi Murad
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture.
J. Information Security
3 (4) (2012)
Qingquan Sun
,
Peng Wu
,
Yeqing Wu
,
Mengcheng Guo
,
Jiang Lu
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case.
J. Information Security
3 (4) (2012)
Shay Gueron
,
Vlad Krasnov
Simultaneous Hashing of Multiple Messages.
J. Information Security
3 (4) (2012)
Maurizio Talamo
,
Maulahikmah Galinium
,
Christian H. Schunck
,
Franco Arcieri
Secure Messaging Implementation in OpenSC.
J. Information Security
3 (4) (2012)
volume 2, number 3, 2011
Sirisha Surisetty
,
Sanjeev Kumar
McAfee SecurityCenter Evaluation under DDoS Attack Traffic.
J. Information Security
2 (3) (2011)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Effectiveness of Built-in Security Protection of Microsoft's Windows Server 2003 against TCP SYN Based DDoS Attacks.
J. Information Security
2 (3) (2011)
Shinichi Murata
,
Yasunari Yoshitomi
,
Hiroaki Ishii
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression.
J. Information Security
2 (3) (2011)
volume 2, number 4, 2011
Alok Sharma
,
Sunil Pranit Lal
Tanimoto Based Similarity Measure for Intrusion Detection System.
J. Information Security
2 (4) (2011)
Eliza Yingzi Du
,
Kai Yang
,
Zhi Zhou
Key Incorporation Scheme for Cancelable Biometrics.
J. Information Security
2 (4) (2011)
Zachary Miller
,
William Deitrick
,
Wei Hu
Anomalous Network Packet Detection Using Data Stream Mining.
J. Information Security
2 (4) (2011)
Charlie Obimbo
,
Benjamin Ferriman
Vulnerabilities of LDAP As An Authentication Service.
J. Information Security
2 (4) (2011)
Kamlesh Gupta
,
Sanjay Silakari
New Approach for Fast Color Image Encryption Using Chaotic Map.
J. Information Security
2 (4) (2011)
Manjit Thapa
,
Sandeep K. Sood
On Secure Digital Image Watermarking Techniques.
J. Information Security
2 (4) (2011)