Issue 1, March 2013

291 - 300Validating the IAMS Framework

DOI: 10.20533/ijicr.2042.4655.2013.0037
Sara Jeza Alotaibi, Mike Wald Download Paper
301 - 310A Novel Inference-based Approach to Evaluate Failure Interdependency in Access Control Models

DOI: 10.20533/ijicr.2042.4655.2013.0038
Saad Saleh Alaboodi, Gordon B. Agnew Download Paper
311 - 315Two Trends in Mobile Malware: Financial Motives and Transitioning from Static to Dynamic Analysis

DOI: 10.20533/ijicr.2042.4655.2013.0039
Emre Erturk Download Paper

Issue 2, June 2013

316 - 322Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS

DOI: 10.20533/ijicr.2042.4655.2013.0040
M. Marquez Andrade, N. Vlajic Download Paper
323 - 327A Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control

DOI: 10.20533/ijicr.2042.4655.2013.0041
Norah Farooqi, Siobhan North Download Paper
328 - 333On The Analysis Of Information Found On Windows Application Memory

DOI: 10.20533/ijicr.2042.4655.2013.0042
Funminiyi Olajide, Nick Savage, Galyna Akmayeva, Charles Shoniregun Download Paper

Issue 3, September 2013

334 - 339Implementation and Analysis of an Error Detection and Correction System on FPGA

DOI: 10.20533/ijicr.2042.4655.2013.0043
Constantin Anton, Laurentiu Mihai Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban Download Paper
340 - 347How Artificial Intlligence Can Link Up with Human Science

DOI: 10.20533/ijicr.2042.4655.2013.0044
Mitra Zibanejad Download Paper
348 - 353Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity

DOI: 10.20533/ijicr.2042.4655.2013.0045
Mohammed Alhussein, Duminda Wijesekera Download Paper

Issue 4, December 2013

354 - 357FALI: Time Memory Information of Windows Computer Systems

DOI: 10.20533/ijicr.2042.4655.2013.0046
Funminiyi Olajide, Richard Trafford Download Paper
358 - 364Indirect NFC-Login on a Non-NFC Device using an NFC-Smartphone

DOI: 10.20533/ijicr.2042.4655.2013.0047
Bernd Borchert, Max Günther Download Paper
365 - 375Implementation Issues in RFID-based Anticounterfeiting for Apparel Supply Chain

DOI: 10.20533/ijicr.2042.4655.2013.0048
Choi S.H., Cheung H.H., Yang B., Yang X.Y. Download Paper
376 - 381On the Property of the Distribution of Symbols in SQL Injection Attack

DOI: 10.20533/ijicr.2042.4655.2013.0049
Takeshi Matsuda Download Paper