Issue 1, March 2013

Pages Title Author(s) Papers
291 - 300 Validating the IAMS Framework

DOI: 10.20533/ijicr.2042.4655.2013.0037
Sara Jeza Alotaibi, Mike Wald Download Paper
301 - 310 A Novel Inference-based Approach to Evaluate Failure Interdependency in Access Control Models

DOI: 10.20533/ijicr.2042.4655.2013.0038
Saad Saleh Alaboodi, Gordon B. Agnew Download Paper
311 - 315 Two Trends in Mobile Malware: Financial Motives and Transitioning from Static to Dynamic Analysis

DOI: 10.20533/ijicr.2042.4655.2013.0039
Emre Erturk Download Paper

Issue 2, June 2013

Pages Title Author(s) Papers
316 - 322 Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS

DOI: 10.20533/ijicr.2042.4655.2013.0040
M. Marquez Andrade, N. Vlajic Download Paper
323 - 327 A Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control

DOI: 10.20533/ijicr.2042.4655.2013.0041
Norah Farooqi, Siobhan North Download Paper
328 - 333 On The Analysis Of Information Found On Windows Application Memory

DOI: 10.20533/ijicr.2042.4655.2013.0042
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun Download Paper

Issue 3, September 2013

Pages Title Author(s) Papers
334 - 339 Implementation and Analysis of an Error Detection and Correction System on FPGA

DOI: 10.20533/ijicr.2042.4655.2013.0043
Constantin Anton, Laurentiu Mihai Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban Download Paper
340 - 347 How Artificial Intlligence Can Link Up with Human Science

DOI: 10.20533/ijicr.2042.4655.2013.0044
Mitra Zibanejad Download Paper
348 - 353 Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity

DOI: 10.20533/ijicr.2042.4655.2013.0045
Mohammed Alhussein, Duminda Wijesekera Download Paper

Issue 4, December 2013

Pages Title Author(s) Papers
354 - 357 FALI: Time Memory Information of Windows Computer Systems

DOI: 10.20533/ijicr.2042.4655.2013.0046
Funminiyi Olajide, Richard Trafford Download Paper
358 - 364 Indirect NFC-Login on a Non-NFC Device using an NFC-Smartphone

DOI: 10.20533/ijicr.2042.4655.2013.0047
Bernd Borchert, Max Günther Download Paper
365 - 375 Implementation Issues in RFID-based Anticounterfeiting for Apparel Supply Chain

DOI: 10.20533/ijicr.2042.4655.2013.0048
Choi S.H., Cheung H.H., Yang B., Yang X.Y. Download Paper
376 - 381 On the Property of the Distribution of Symbols in SQL Injection Attack

DOI: 10.20533/ijicr.2042.4655.2013.0049
Takeshi Matsuda Download Paper