Issue 1, March 2014

382 - 390Mandatory Access Control Policies Based on Vague Requirements

DOI: 10.20533/ijicr.2042.4655.2014.0050
Juraj Masar, Jiri Bartos, Cyril Klimes Download Paper
391 - 397A Threat Model for a Cloud Infrastructure with no Hypervisor

DOI: 10.20533/ijicr.2042.4655.2014.0051
William A. R. de Souza, Allan Tomlinson Download Paper
398 - 404Cloud Computing Security Issues and Recommendations

DOI: 10.20533/ijicr.2042.4655.2014.0052
Hanim Eken Download Paper
405 - 407Face Recognition on Android Smartphones

DOI: 10.20533/ijicr.2042.4655.2014.0053
Antonia Rana, Andrea Ciardulli Download Paper

Issue 2, June 2014

408 - 415A Distributed Phoenix++ Framework for Big Data Recommendation Systems

DOI: 10.20533/ijicr.2042.4655.2014.0054
Chongxiao Cao, Fengguang Song, Daniel G. Waddington Download Paper
416 - 423Service Constraint Guarantees

DOI: 10.20533/ijicr.2042.4655.2014.0055
Aspen Olmsted, RoxAnn Stalvey Download Paper
424 - 435Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare

DOI: 10.20533/ijicr.2042.4655.2014.0056
Antti Evesti, Jani Suomalainen, Reijo Savola Download Paper
436 - 442Revocation for Certificateless Authentication in VANETs

DOI: 10.20533/ijicr.2042.4655.2014.0057
Pino Caballero-Gil, Francisco Martín Fernández, Cándido Caballero-Gil Download Paper

Issue 3, September 2014

443 - 453Towards a General Framework for Business Process Modeling

DOI: 10.20533/ijicr.2042.4655.2014.0058
Irfan Chishti Download Paper
454 - 463Cloud-based Alert Notification

DOI: 10.20533/ijicr.2042.4655.2014.0059
Marjan Gusev, Sasko Ristov Download Paper
464 - 471An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine

DOI: 10.20533/ijicr.2042.4655.2014.0060
Keisuke Kato, Vitaly Klyuev Download Paper
472 - 480Risk Assessment of Network Distributed Android Applications

DOI: 10.20533/ijicr.2042.4655.2014.0061
Hossain Shahriar, Victor Clincy Download Paper

Issue 4, December 2014

481 - 488Improving Intrusion Detection by the Automated Generation of Detection Rules

DOI: 10.20533/ijicr.2042.4655.2014.0062
Abdulrazaq Almutairi, David Parish Download Paper
489 - 504Migrating from Closed Source Software to OSS–Security Issues and Challenges

DOI: 10.20533/ijicr.2042.4655.2014.0063
Olusegun Ajigini Download Paper
505 - 511Enhanced Algorithm for Data Privacy Preservation using Data Anonymization with Low Information

DOI: 10.20533/ijicr.2042.4655.2014.0064
Amalraj Irudayasamy, Arockiam Lawrence Download Paper
512 - 516Real Time Total Productive Maintenance System

DOI: 10.20533/ijicr.2042.4655.2014.0065
Özge Kart, Alp Kut Download Paper