Volume 2 (2012)
Issue 1, March 2012
Pages | Title | Author(s) | Papers |
106 - 112 | Hardware Implementation of Elliptic Curve Point Multiplication over GF(2m) for ECC protocols DOI: 10.20533/ijisr.2042.4639.2012.0013 |
Moncef Amara, Amar Siad | |
113 - 120 | Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet DOI: 10.20533/ijisr.2042.4639.2012.0014 |
Hao Zhao, Sead Muftic | |
121 - 131 | User-Profile Framework against a Spit Attack on VoIP Systems DOI: 10.20533/ijisr.2042.4639.2012.0015 |
Marialisa Scatá, Aurelio La Corte |
Issue 2, June 2012
Pages | Title | Author(s) | Papers |
132 - 139 | Improvements on Self-Organizing Feature Maps for User-to-Root and Remote-to-Local Network Intrusion Detection on the 1999 KDD Cup Dataset DOI: 10.20533/ijisr.2042.4639.2012.0016 |
Ryan Wilson, Charlie Obimbo | |
140 - 143 | User Identification: Bio-Inspired Visual User Detection DOI: 10.20533/ijisr.2042.4639.2012.0017 |
W. Han, I. S. Han | |
144 - 153 | Privacy and Security of DHCP Unique Identifiers DOI: 10.20533/ijisr.2042.4639.2012.0018 |
Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront | |
154 - 163 | Node Management without Directory Servers in DHT-based Anonymous Communication Systems using ID-based Encryption DOI: 10.20533/ijisr.2042.4639.2012.0019 |
Hiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo |
Issue 3, September 2012
Pages | Title | Author(s) | Papers |
164 - 168 | On the Identification of Information Extracted from Windows Physical Memory DOI: 10.20533/ijisr.2042.4639.2012.0020 |
Funminiyi Olajide, Nick Savage | |
169 - 177 | Advanced DDoS Attacks Traffic Simulation with a Test Center Platform DOI: 10.20533/ijisr.2042.4639.2012.0021 |
Jie Wang, Raphael C.-W. Phan, John N.Whitley and David J. Parish | |
178 - 182 | A New CVSS-Based Tool to Mitigate the Effects of Software Vulnerabilities DOI: 10.20533/ijisr.2042.4639.2012.0022 |
Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl | |
183 - 192 | Towards Securing Databases on Mobile Devices: A Log-based Approach DOI: 10.20533/ijisr.2042.4639.2012.0023 |
Subhasish Mazumdar, Anand Paturi |
Issue 4, December 2012
Pages | Title | Author(s) | Papers |
193 - 201 | A Reconfigurable Hardware Platform for Secure and Efficient Malware Collection in Next-Generation High-Speed Networks DOI: 10.20533/ijisr.2042.4639.2012.0024 |
Sascha Mühlbach, Andreas Koch | |
202 - 210 | One-Dependence Estimators for Accurate Detection of Anomalous Network Traffic DOI: 10.20533/ijisr.2042.4639.2012.0025 |
Zubair A. Baig, Abdulrhman S. Shaheen, and Radwan AbdelAal | |
211 - 218 | Linearisation Attacks on FCSR-based Stream Ciphers DOI: 10.20533/ijisr.2042.4639.2012.0026 |
Arshad Ali | |
219 - 228 | Display Integrity Assurance for SMS Transaction Authorization DOI: 10.20533/ijisr.2042.4639.2012.0027 |
Mohammed Alzomai, Audun Jøsang, Bander Alfayyadh |