Volume 4 (2013)
Issue 1, March 2013
Pages | Title | Author(s) | Papers |
291 - 300 | Validating the IAMS Framework DOI: 10.20533/ijicr.2042.4655.2013.0037 |
Sara Jeza Alotaibi, Mike Wald | |
301 - 310 | A Novel Inference-based Approach to Evaluate Failure Interdependency in Access Control Models DOI: 10.20533/ijicr.2042.4655.2013.0038 |
Saad Saleh Alaboodi, Gordon B. Agnew | |
311 - 315 | Two Trends in Mobile Malware: Financial Motives and Transitioning from Static to Dynamic Analysis DOI: 10.20533/ijicr.2042.4655.2013.0039 |
Emre Erturk |
Issue 2, June 2013
Pages | Title | Author(s) | Papers |
316 - 322 | Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS DOI: 10.20533/ijicr.2042.4655.2013.0040 |
M. Marquez Andrade, N. Vlajic | |
323 - 327 | A Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control DOI: 10.20533/ijicr.2042.4655.2013.0041 |
Norah Farooqi, Siobhan North | |
328 - 333 | On The Analysis Of Information Found On Windows Application Memory DOI: 10.20533/ijicr.2042.4655.2013.0042 |
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun |
Issue 3, September 2013
Pages | Title | Author(s) | Papers |
334 - 339 | Implementation and Analysis of an Error Detection and Correction System on FPGA DOI: 10.20533/ijicr.2042.4655.2013.0043 |
Constantin Anton, Laurentiu Mihai Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban | |
340 - 347 | How Artificial Intlligence Can Link Up with Human Science DOI: 10.20533/ijicr.2042.4655.2013.0044 |
Mitra Zibanejad | |
348 - 353 | Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity DOI: 10.20533/ijicr.2042.4655.2013.0045 |
Mohammed Alhussein, Duminda Wijesekera |
Issue 4, December 2013
Pages | Title | Author(s) | Papers |
354 - 357 | FALI: Time Memory Information of Windows Computer Systems DOI: 10.20533/ijicr.2042.4655.2013.0046 |
Funminiyi Olajide, Richard Trafford | |
358 - 364 | Indirect NFC-Login on a Non-NFC Device using an NFC-Smartphone DOI: 10.20533/ijicr.2042.4655.2013.0047 |
Bernd Borchert, Max Günther | |
365 - 375 | Implementation Issues in RFID-based Anticounterfeiting for Apparel Supply Chain DOI: 10.20533/ijicr.2042.4655.2013.0048 |
Choi S.H., Cheung H.H., Yang B., Yang X.Y. | |
376 - 381 | On the Property of the Distribution of Symbols in SQL Injection Attack DOI: 10.20533/ijicr.2042.4655.2013.0049 |
Takeshi Matsuda |