Issue 1, March 2015

Pages Title Author(s) Papers
517 - 526 The Network Factor in Proactive Digital Evidence Acquisition

DOI: 10.20533/ijicr.2042.4655.2015.0066
Irvin Homem, Spyridon Dosis, Oliver Popov Download Paper
527 - 530 Forensic Analysis and the Inimitability of Human Footprints

DOI: 10.20533/ijicr.2042.4655.2015.0067
F.Y. Osisanwo, A.O. Adetunmbi, B.K. Alese Download Paper
531- 539 Designing a Attendance System Based on Physical and Virtual Services Using the Internet of Things

DOI: 10.20533/ijicr.2042.4655.2015.0068
Sara Jeza Alotaibi Download Paper

Issue 2, June 2015

Pages Title Author(s) Papers
540 - 549 A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks

DOI: 10.20533/ijicr.2042.4655.2015.0069
Christina-Angeliki Toli, Bart Preneel Download Paper
550 - 561 Intrusion Detection using Ensemble Learning on Combined Features

DOI: 10.20533/ijicr.2042.4655.2015.0070
Michael Milliken, Yaxin Bi, Leo Galway, Glenn Hawe Download Paper
562 - 570 Hyhoneydv6: A hybrid Honeypot Architecture for IPv6 Networks

DOI: 10.20533/ijicr.2042.4655.2015.0071
Sven Schindler, Bettina Schnor, Thomas Scheffler Download Paper
571 - 582 A Rivest Shamir Adleman Approach to Attribute Based Security System

DOI: 10.20533/ijicr.2042.4655.2015.0072
L.A. Nwosu, B.K. Alese, A.F. Thompson, O.O. Obe Download Paper

Issue 3, September 2015

Pages Title Author(s) Papers
583 - 591 Addressing the Inadequacies of Role Based Access Control (RBAC) Models for Highly Privileged Administrators: Introducing the SNAP Principle for Mitigating Privileged Account Breaches

DOI: 10.20533/ijicr.2042.4655.2015.0073
Samuel Moses, Dale C. Rowe, Sarah A. Cunha Download Paper
592 - 600 Promoting STEM Careers and ICT4D by Using Robotics to Reduce the Gender Gap in a Rural Region

DOI: 10.20533/ijicr.2042.4655.2015.0074
Arnoldo Rodríguez, Rogelio Nájera Download Paper
601 - 612 Evaluating Degrees of Isolation between Tenants enabled by Multitenancy Patterns for Cloud-hosted Version Control Systems (VCS)

DOI: 10.20533/ijicr.2042.4655.2015.0075
Laud Charles Ochei, Andrei Petrovski, Julian M. Bass Download Paper
613 - 620 Enhancing FP-Growth Performance Using Multi-threading based on Comparative Study

DOI: 10.20533/ijicr.2042.4655.2015.0076
Yousef K. Abu Samra, Ashraf Y. A. Maghari Download Paper

Issue 4, December 2015

Pages Title Author(s) Papers
621 - 629 HTML5 IndexedDB Encryption: Prevention against Potential Attacks

DOI: 10.20533/ijicr.2042.4655.2015.0077
Stefan Kimak, Jeremy Ellman Download Paper
630 - 639 Trusted Energy-Efficient Cloud-Based Services Brokerage Platform

DOI: 10.20533/ijicr.2042.4655.2015.0078
Bandar Aldawsari, Thar Baker, David England Download Paper
640 - 646 Artificial User Emulator to Detect Intelligent Malware on Android

DOI: 10.20533/ijicr.2042.4655.2015.0079
Shirish Singh, Saket Singh, Bhairavi Mishra Download Paper
647 - 654 Performance Comparison of Simulated Annealing, GA and ACO Applied to TSP

DOI: 10.20533/ijicr.2042.4655.2015.0080
Hosam H. A. Mukhairez, Ashraf Y. A. Maghari Download Paper