Volume 5 (2014)
Issue 1, March 2014
Pages | Title | Author(s) | Papers |
382 - 390 | Mandatory Access Control Policies Based on Vague Requirements DOI: 10.20533/ijicr.2042.4655.2014.0050 |
Juraj Masar, Jiri Bartos, Cyril Klimes | |
391 - 397 | A Threat Model for a Cloud Infrastructure with no Hypervisor DOI: 10.20533/ijicr.2042.4655.2014.0051 |
William A. R. de Souza, Allan Tomlinson | |
398 - 404 | Cloud Computing Security Issues and Recommendations DOI: 10.20533/ijicr.2042.4655.2014.0052 |
Hanim Eken | |
405 - 407 | Face Recognition on Android Smartphones DOI: 10.20533/ijicr.2042.4655.2014.0053 |
Antonia Rana, Andrea Ciardulli |
Issue 2, June 2014
Pages | Title | Author(s) | Papers |
408 - 415 | A Distributed Phoenix++ Framework for Big Data Recommendation Systems DOI: 10.20533/ijicr.2042.4655.2014.0054 |
Chongxiao Cao, Fengguang Song, Daniel G. Waddington | |
416 - 423 | Service Constraint Guarantees DOI: 10.20533/ijicr.2042.4655.2014.0055 |
Aspen Olmsted, RoxAnn Stalvey | |
424 - 435 | Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare DOI: 10.20533/ijicr.2042.4655.2014.0056 |
Antti Evesti, Jani Suomalainen, Reijo Savola | |
436 - 442 | Revocation for Certificateless Authentication in VANETs DOI: 10.20533/ijicr.2042.4655.2014.0057 |
Pino Caballero-Gil, Francisco Martín Fernández, Cándido Caballero-Gil |
Issue 3, September 2014
Pages | Title | Author(s) | Papers |
443 - 453 | Towards a General Framework for Business Process Modeling DOI: 10.20533/ijicr.2042.4655.2014.0058 |
Irfan Chishti | |
454 - 463 | Cloud-based Alert Notification DOI: 10.20533/ijicr.2042.4655.2014.0059 |
Marjan Gusev, Sasko Ristov | |
464 - 471 | An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine DOI: 10.20533/ijicr.2042.4655.2014.0060 |
Keisuke Kato, Vitaly Klyuev | |
472 - 480 | Risk Assessment of Network Distributed Android Applications DOI: 10.20533/ijicr.2042.4655.2014.0061 |
Hossain Shahriar, Victor Clincy |
Issue 4, December 2014
Pages | Title | Author(s) | Papers |
481 - 488 | Improving Intrusion Detection by the Automated Generation of Detection Rules DOI: 10.20533/ijicr.2042.4655.2014.0062 |
Abdulrazaq Almutairi, David Parish | |
489 - 504 | Migrating from Closed Source Software to OSS–Security Issues and Challenges DOI: 10.20533/ijicr.2042.4655.2014.0063 |
Olusegun Ajigini | |
505 - 511 | Enhanced Algorithm for Data Privacy Preservation using Data Anonymization with Low Information DOI: 10.20533/ijicr.2042.4655.2014.0064 |
Amalraj Irudayasamy, Arockiam Lawrence | |
512 - 516 | Real Time Total Productive Maintenance System DOI: 10.20533/ijicr.2042.4655.2014.0065 |
Özge Kart, Alp Kut |