Issue 1, March 2013

Pages Title Author(s) Papers
229 - 235 Proposal of Credit Card Fraudulent Use Detection by Online-type Decision Tree Construction and Verification of Generality

DOI: 10.20533/ijisr.2042.4639.2013.0028
Tatsuya Minegishi, Ayahiko Niimi Download Paper
236 - 245 Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach

DOI: 10.20533/ijisr.2042.4639.2013.0029
Mahmoud Khonji, Youssef Iraqi, Andrew Jones Download Paper
246 - 255 On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods

DOI: 10.20533/ijisr.2042.4639.2013.0030
Aymen Boudguiga, Maryline Laurent Download Paper
256 - 265 Verifying Mutual Authentication for the DLK Protocol Using ProVerif Tool

DOI: 10.20533/ijisr.2042.4639.2013.0031
H. M. N. Al Hamadi, C. Y. Yeun, M. J. Zemerly, M. A. Al-Qutayri, A. Gawanmeh Download Paper

Issue 2, June 2013

Pages Title Author(s) Papers
266 - 273 Recognition Accuracy and Robustness of Fingerprint Templates Generated by Discrete Fractional Sine Transform

DOI: 10.20533/ijisr.2042.4639.2013.0032
Hiroyuki Yoshimura Download Paper
274 - 284 Secure Cryptographic Mechanisms for Safeguarding Citizen Communications in the Presence of Tyranny

DOI: 10.20533/ijisr.2042.4639.2013.0033
Soulaf Saab, Wassim Itani, Ayman Kayssi, Ali Chehab, Cesar Ghali Download Paper
285 - 293 Injection and Evaluation of New Attacks on Ad hoc Proactive Routing Algorithms

DOI: 10.20533/ijisr.2042.4639.2013.0034
Mahmood Salehi, Hamed Samavati Download Paper
294 - 302 Domain Restriction Based Formal Model for Firewall Configurations

DOI: 10.20533/ijisr.2042.4639.2013.0035
Amjad Gawanmeh Sofiène Tahar Download Paper

Issue 3, September 2013

Pages Title Author(s) Papers
303 - 312 Securing Files in the Cloud

DOI: 10.20533/ijisr.2042.4639.2013.0036
Kheng Kok Mar Download Paper
313 - 324 Securing USIM-based Mobile Communications from Interoperation of SIMbased Communications

DOI: 10.20533/ijisr.2042.4639.2013.0037
Eric Southern, Abdelkader Ouda, Abdallah Shami Download Paper
325 - 334 An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

DOI: 10.20533/ijisr.2042.4639.2013.0038
Muhammad Qasim Saeed, Colin D. Walter Download Paper
335 - 343 State-of-the-Art of Virtualization, its Security Threats and Deployment Models

DOI: 10.20533/ijisr.2042.4639.2013.0039
Fatma Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly Download Paper

Issue 4, December 2013

Pages Title Author(s) Papers
344 - 353 Detecting Image Spam Using Image Texture Features

DOI: 10.20533/ijisr.2042.4639.2013.0040
Basheer Al-Duwairi, Ismail Khater, Omar Al-Jarrah Download Paper
354 - 363 Increasing Security Guidelines’ Framework Efficiency

DOI: 10.20533/ijisr.2042.4639.2013.0041
Yury Chemerkin Download Paper
364 - 373 Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others

DOI: 10.20533/ijisr.2042.4639.2013.0042
Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew Martin Download Paper
374 - 382 DSGM-Based Analysis of Computer Networks Security

DOI: 10.20533/ijisr.2042.4639.2013.0043
Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel Download Paper