Issue 1, March 2013

PagesTitleAuthor(s)Papers
229 - 235Proposal of Credit Card Fraudulent Use Detection by Online-type Decision Tree Construction and Verification of Generality

DOI: 10.20533/ijisr.2042.4639.2013.0028
Tatsuya Minegishi, Ayahiko Niimi Download Paper
236 - 245Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach

DOI: 10.20533/ijisr.2042.4639.2013.0029
Mahmoud Khonji, Youssef Iraqi, Andrew Jones Download Paper
246 - 255On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods

DOI: 10.20533/ijisr.2042.4639.2013.0030
Aymen Boudguiga, Maryline Laurent Download Paper
256 - 265Verifying Mutual Authentication for the DLK Protocol Using ProVerif Tool

DOI: 10.20533/ijisr.2042.4639.2013.0031
H. M. N. Al Hamadi, C. Y. Yeun, M. J. Zemerly, M. A. Al-Qutayri, A. Gawanmeh Download Paper

Issue 2, June 2013

PagesTitleAuthor(s)Papers
266 - 273Recognition Accuracy and Robustness of Fingerprint Templates Generated by Discrete Fractional Sine Transform

DOI: 10.20533/ijisr.2042.4639.2013.0032
Hiroyuki Yoshimura Download Paper
274 - 284Secure Cryptographic Mechanisms for Safeguarding Citizen Communications in the Presence of Tyranny

DOI: 10.20533/ijisr.2042.4639.2013.0033
Soulaf Saab, Wassim Itani, Ayman Kayssi, Ali Chehab, Cesar Ghali Download Paper
285 - 293Injection and Evaluation of New Attacks on Ad hoc Proactive Routing Algorithms

DOI: 10.20533/ijisr.2042.4639.2013.0034
Mahmood Salehi, Hamed Samavati Download Paper
294 - 302Domain Restriction Based Formal Model for Firewall Configurations

DOI: 10.20533/ijisr.2042.4639.2013.0035
Amjad Gawanmeh Sofiène Tahar Download Paper

Issue 3, September 2013

PagesTitleAuthor(s)Papers
303 - 312Securing Files in the Cloud

DOI: 10.20533/ijisr.2042.4639.2013.0036
Kheng Kok Mar Download Paper
313 - 324Securing USIM-based Mobile Communications from Interoperation of SIMbased Communications

DOI: 10.20533/ijisr.2042.4639.2013.0037
Eric Southern, Abdelkader Ouda, Abdallah Shami Download Paper
325 - 334An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

DOI: 10.20533/ijisr.2042.4639.2013.0038
Muhammad Qasim Saeed, Colin D. Walter Download Paper
335 - 343State-of-the-Art of Virtualization, its Security Threats and Deployment Models

DOI: 10.20533/ijisr.2042.4639.2013.0039
Fatma Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly Download Paper

Issue 4, December 2013

PagesTitleAuthor(s)Papers
344 - 353Detecting Image Spam Using Image Texture Features

DOI: 10.20533/ijisr.2042.4639.2013.0040
Basheer Al-Duwairi, Ismail Khater, Omar Al-Jarrah Download Paper
354 - 363Increasing Security Guidelines’ Framework Efficiency

DOI: 10.20533/ijisr.2042.4639.2013.0041
Yury Chemerkin Download Paper
364 - 373Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others

DOI: 10.20533/ijisr.2042.4639.2013.0042
Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew Martin Download Paper
374 - 382DSGM-Based Analysis of Computer Networks Security

DOI: 10.20533/ijisr.2042.4639.2013.0043
Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel Download Paper