Issue 1, March 2014

Pages Title Author(s) Papers
382 - 390 Mandatory Access Control Policies Based on Vague Requirements

DOI: 10.20533/ijicr.2042.4655.2014.0050
Juraj Masar, Jiri Bartos, Cyril Klimes Download Paper
391 - 397 A Threat Model for a Cloud Infrastructure with no Hypervisor

DOI: 10.20533/ijicr.2042.4655.2014.0051
William A. R. de Souza, Allan Tomlinson Download Paper
398 - 404 Cloud Computing Security Issues and Recommendations

DOI: 10.20533/ijicr.2042.4655.2014.0052
Hanim Eken Download Paper
405 - 407 Face Recognition on Android Smartphones

DOI: 10.20533/ijicr.2042.4655.2014.0053
Antonia Rana, Andrea Ciardulli Download Paper

Issue 2, June 2014

Pages Title Author(s) Papers
408 - 415 A Distributed Phoenix++ Framework for Big Data Recommendation Systems

DOI: 10.20533/ijicr.2042.4655.2014.0054
Chongxiao Cao, Fengguang Song, Daniel G. Waddington Download Paper
416 - 423 Service Constraint Guarantees

DOI: 10.20533/ijicr.2042.4655.2014.0055
Aspen Olmsted, RoxAnn Stalvey Download Paper
424 - 435 Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare

DOI: 10.20533/ijicr.2042.4655.2014.0056
Antti Evesti, Jani Suomalainen, Reijo Savola Download Paper
436 - 442 Revocation for Certificateless Authentication in VANETs

DOI: 10.20533/ijicr.2042.4655.2014.0057
Pino Caballero-Gil, Francisco Martín Fernández, Cándido Caballero-Gil Download Paper

Issue 3, September 2014

Pages Title Author(s) Papers
443 - 453 Towards a General Framework for Business Process Modeling

DOI: 10.20533/ijicr.2042.4655.2014.0058
Irfan Chishti Download Paper
454 - 463 Cloud-based Alert Notification

DOI: 10.20533/ijicr.2042.4655.2014.0059
Marjan Gusev, Sasko Ristov Download Paper
464 - 471 An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine

DOI: 10.20533/ijicr.2042.4655.2014.0060
Keisuke Kato, Vitaly Klyuev Download Paper
472 - 480 Risk Assessment of Network Distributed Android Applications

DOI: 10.20533/ijicr.2042.4655.2014.0061
Hossain Shahriar, Victor Clincy Download Paper

Issue 4, December 2014

Pages Title Author(s) Papers
481 - 488 Improving Intrusion Detection by the Automated Generation of Detection Rules

DOI: 10.20533/ijicr.2042.4655.2014.0062
Abdulrazaq Almutairi, David Parish Download Paper
489 - 504 Migrating from Closed Source Software to OSS–Security Issues and Challenges

DOI: 10.20533/ijicr.2042.4655.2014.0063
Olusegun Ajigini Download Paper
505 - 511 Enhanced Algorithm for Data Privacy Preservation using Data Anonymization with Low Information

DOI: 10.20533/ijicr.2042.4655.2014.0064
Amalraj Irudayasamy, Arockiam Lawrence Download Paper
512 - 516 Real Time Total Productive Maintenance System

DOI: 10.20533/ijicr.2042.4655.2014.0065
Özge Kart, Alp Kut Download Paper