Volume 3 (2013)
Issue 1, March 2013
Pages | Title | Author(s) | Papers |
229 - 235 | Proposal of Credit Card Fraudulent Use Detection by Online-type Decision Tree Construction and Verification of Generality DOI: 10.20533/ijisr.2042.4639.2013.0028 |
Tatsuya Minegishi, Ayahiko Niimi | |
236 - 245 | Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach DOI: 10.20533/ijisr.2042.4639.2013.0029 |
Mahmoud Khonji, Youssef Iraqi, Andrew Jones | |
246 - 255 | On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods DOI: 10.20533/ijisr.2042.4639.2013.0030 |
Aymen Boudguiga, Maryline Laurent | |
256 - 265 | Verifying Mutual Authentication for the DLK Protocol Using ProVerif Tool DOI: 10.20533/ijisr.2042.4639.2013.0031 |
H. M. N. Al Hamadi, C. Y. Yeun, M. J. Zemerly, M. A. Al-Qutayri, A. Gawanmeh |
Issue 2, June 2013
Pages | Title | Author(s) | Papers |
266 - 273 | Recognition Accuracy and Robustness of Fingerprint Templates Generated by Discrete Fractional Sine Transform DOI: 10.20533/ijisr.2042.4639.2013.0032 |
Hiroyuki Yoshimura | |
274 - 284 | Secure Cryptographic Mechanisms for Safeguarding Citizen Communications in the Presence of Tyranny DOI: 10.20533/ijisr.2042.4639.2013.0033 |
Soulaf Saab, Wassim Itani, Ayman Kayssi, Ali Chehab, Cesar Ghali | |
285 - 293 | Injection and Evaluation of New Attacks on Ad hoc Proactive Routing Algorithms DOI: 10.20533/ijisr.2042.4639.2013.0034 |
Mahmood Salehi, Hamed Samavati | |
294 - 302 | Domain Restriction Based Formal Model for Firewall Configurations DOI: 10.20533/ijisr.2042.4639.2013.0035 |
Amjad Gawanmeh Sofiène Tahar |
Issue 3, September 2013
Pages | Title | Author(s) | Papers |
303 - 312 | Securing Files in the Cloud DOI: 10.20533/ijisr.2042.4639.2013.0036 |
Kheng Kok Mar | |
313 - 324 | Securing USIM-based Mobile Communications from Interoperation of SIMbased Communications DOI: 10.20533/ijisr.2042.4639.2013.0037 |
Eric Southern, Abdelkader Ouda, Abdallah Shami | |
325 - 334 | An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications DOI: 10.20533/ijisr.2042.4639.2013.0038 |
Muhammad Qasim Saeed, Colin D. Walter | |
335 - 343 | State-of-the-Art of Virtualization, its Security Threats and Deployment Models DOI: 10.20533/ijisr.2042.4639.2013.0039 |
Fatma Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly |
Issue 4, December 2013
Pages | Title | Author(s) | Papers |
344 - 353 | Detecting Image Spam Using Image Texture Features DOI: 10.20533/ijisr.2042.4639.2013.0040 |
Basheer Al-Duwairi, Ismail Khater, Omar Al-Jarrah | |
354 - 363 | Increasing Security Guidelines’ Framework Efficiency DOI: 10.20533/ijisr.2042.4639.2013.0041 |
Yury Chemerkin | |
364 - 373 | Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others DOI: 10.20533/ijisr.2042.4639.2013.0042 |
Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew Martin | |
374 - 382 | DSGM-Based Analysis of Computer Networks Security DOI: 10.20533/ijisr.2042.4639.2013.0043 |
Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel |