Issues 1, March 2016

Pages Title Author(s) Papers
625 - 635 Secure Mutual Self-Authenticable Mechanism for Wearable Devices

DOI: 10.20533/ijisr.2042.4639.2016.0072
Nnabuike Eya, Trust Mapoka, Simon Shepherd, Raed A Abd-Alhameed, Issa Elfergani and Jonathan Rodriguez Download Paper
636 - 642 Testing a Trust Management System for Cloud Computing Using Simulation

DOI: 10.20533/ijisr.2042.4639.2016.0073
Norah Farooqi Download Paper
643 - 650 Smartphones Hotspots Intrusion Detection System (SHIDS)

DOI: 10.20533/ijisr.2042.4639.2016.0074
Khoula Al Harthy, Nazaraf Shah, James Shuttleworth Download Paper

Issue 2, June 2016

Pages Title Author(s) Papers
651 - 659 Advanced Widespread Behavioral Probes against Lateral Movements

DOI: 10.20533/ijisr.2042.4639.2016.0075
Alessandro Greco, Giovanni Pecoraro, Alberto Caponi, Giuseppe Bianchi, Download Paper
660 - 666 A Review of Using Gaming Technology for Cyber-Security Awareness

DOI: 10.20533/ijisr.2042.4639.2016.0076
Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki Download Paper
667 - 676 Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through Multi-Factor Authentication and other Techniques

DOI: 10.20533/ijisr.2042.4639.2016.0077
Samuel Moses, Dale C. Rowe Download Paper

Issue 3, September 2016

Pages Title Author(s) Papers
677 - 684 Majority Rule Approach of Deep Learning for Time Series Data

DOI: 10.20533/ijisr.2042.4639.2016.0078
Ayahiko Niimi, Masato Ikeda Download Paper
685 - 690 NTRU Modulo p Flaw

DOI: 10.20533/ijisr.2042.4639.2016.0079
Anas Ibrahim, Alexander Chefranov Download Paper
691 - 700 A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches

DOI: 10.20533/ijisr.2042.4639.2016.0080
Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, Fudong Li Download Paper