Search


 
Issue Title
 
Volume 5, Issue 1, January 2016 Summarization of Various Security Aspects and Attacks in Distributed Systems: A Review Abstract  PDF
Istam Uktamovich Shadmanov, Kamola Shadmanova
 
Volume 5, Issue 2, March 2016 Enhancing Data Security in the Cloud Using the Proposed Algorithm Abstract  PDF
Naser Attar
 
Volume 3, Issue 3, May 2014 Current Status of e-Government Services in Tanzania: A Security Perspective Abstract  PDF
Mohamed Dewa, Irina Zlotnikova
 
Volume 4, Issue 6, November 2015 Developing an Allocation Framework for Information Security Systems Abstract  PDF
Shimaa Mohamed, Abdel Nasser Zaied, Walid Khedr
 
Volume 3, Issue 6, November 2014 Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View Abstract  PDF
Mohamed D. Waziri, Zaipuna O. Yonah
 
Volume 5, Issue 1, January 2016 Digital Image Encryption Based On Multiple Chaotic Maps Abstract  PDF
Amir Houshang Arab Avval, Jila ayubi, Farangiz Arab
 
Volume 3, Issue 5, September 2014 A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania Abstract  PDF
Mohamed D. Waziri, Zaipuna O. Yonah
 
Volume 3, Issue 2, March 2014 Citizens’ Readiness for Remote Electronic Voting in Tanzania Abstract  PDF
Sylvester Kimbi, Irina Zlotnikova
 
Volume 3, Issue 5, September 2014 A Method for Hiding Association rules with Minimum Changes in Database Abstract  PDF
Zahra Sheykhinezhad, Mohammad Naderi dehkordi, Hamid Rastegari
 
Volume 3, Issue 2, March 2014 Botnet Detection using NetFlow and Clustering Abstract  PDF
Pedram Amini, Reza Azmi, MuhammadAmin Araghizadeh
 
Volume 3, Issue 5, September 2014 Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Abstract  PDF
Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki
 
Volume 3, Issue 2, March 2014 Traditional Host based Intrusion Detection Systems’ Challenges in Cloud Computing Abstract  PDF
Masoudeh Keshavarzi
 
Volume 3, Issue 6, November 2014 Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol Abstract  PDF
Seyed Mohammad Alavi, Behzad Abdolmaleki, Karim Baghery
 
Volume 3, Issue 2, March 2014 A New Robust Audio Signal Steganography Based On Multiple Chaotic Algorithms With Edge Detection Technique Abstract  PDF
Amir Houshang Arab Avval, Shahram Mohanna
 
Volume 3, Issue 2, March 2014 Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard Abstract  PDF
Masoud Mohammadi, Mehdi Hosseinzadeh, Mohammad Esmaeildoust
 
Volume 4, Issue 3, May 2015 Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness Abstract  PDF
Daniel Koloseni
 
Volume 4, Issue 3, May 2015 A Strengthened Version of a Hash-based RFID Server-less Security Scheme Abstract  PDF
Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, Hamid Sharini
 
Volume 3, Issue 4, July 2014 A Secure Model for Remote Electronic Voting: A Case of Tanzania Abstract  PDF
Sylvester Kimbi, Irina Zlotnikova
 
Volume 4, Issue 3, May 2015 Mitigating Intrusion and Vulnerabilities in Cognitive Radio Networks Abstract  PDF
I. Ohaeri, O. Ekabua, B. Isong, M. Esiefarienrhe, M. Motojane
 
Volume 3, Issue 4, July 2014 Chaotic Image Encryption Based On Discrete Wavelet Abstract  PDF
Amirhoushang Arab Avval, Jila Ayubi
 
Volume 4, Issue 4, July 2015 A Survey on Security Issues in Big Data and NoSQL Abstract  PDF
Ebrahim Sahafizadeh, Mohammad Ali Nematbakhsh
 
Volume 2, Issue 3, July 2013 Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks Abstract  PDF
Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary
 
Volume 3, Issue 4, July 2014 Anomaly Detection Mechanism based on Common NSM Data Objects for Advanced Metering Infrastructure Abstract  PDF
Seongho Ju, Yonghun Lim, Chunghyo Kim, Kyungseok Jeon
 
Volume 4, Issue 4, July 2015 A comparative study and classification on web service security testing approaches Abstract  PDF
Azadeh Esfandyari
 
Volume 2, Issue 3, July 2013 A New Approach for Labeling Images Using CAPTCHA in Image Semantic Search Engines Abstract  PDF
Amir Golchini, Abolfazl Toroghi Haghighat, Hasan Rashidi
 
1 - 25 of 28 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"


Lululemon Black Friday cheap nfl jerseys Lululemon factory Outlet ny Black Friday discount tiffany outlet wholesale soccer jerseys online oakley black friday cheap nhl jerseys china cheap nfl jerseys north face black friday sale cheap nfl jerseys online Jordans Black Friday Sale 2015 Cheap Moncler Cyber Monday moncler outlet cheap soccer jerseys moncler outlet black friday cheap authentic nfl jerseys north face cyber monday Louboutin Black Friday canada wholesale cheap nfl jerseys lululemon cyber monday 2015 cheap nfl jerseys from china 2015 Cheap Moncler Black Friday Sale Moncler Cyber Monday 2015 cheap jerseys Lululemon Cyber Monday Sale jordans cyber monday deals 2015 cheap nike nfl jerseys Black Friday deals Lululemon 2015 jordan black friday 2015 Moncler Jackets Black Friday Sale 2015 Louboutin Pas Cher Black Friday 2015 Canada Lululemon north face black friday cheap wholesale soccer jerseys