Volume 5 (2015)
Issue 1, March 2015
Pages | Title | Author(s) | Papers |
529 - 537 | Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies DOI: 10.20533/ijisr.2042.4639.2015.0060 |
Edina Hatunic-Webster, Fred Mtenzi, Brendan O’Shea |
![]() |
538 - 545 | Traffic Classification for the Detection of Anonymous Web Proxy Routing DOI: 10.20533/ijisr.2042.4639.2015.0061 |
Shane Miller, Kevin Curran, Tom Lunney |
![]() |
546 - 550 | A Secured Automatic Notification System Based on Short Message Service DOI: 10.20533/ijisr.2042.4639.2015.0062 |
Emmy Mugisha, Bob Alex Ogwang, Victor Ongoma, Gongxuan Zhang |
![]() |
Issue 2, June 2015
Pages | Title | Author(s) | Papers |
551 - 558 | Modelling Threats with Security Requirements in Cloud Storage DOI: 10.20533/ijisr.2042.4639.2015.0063 |
Fara Yahya, Robert J. Walters, Gary B. Wills |
![]() |
559 - 564 | Herding Cats: How to Launch a Cyber Security Club in an Academic Setting DOI: 10.20533/ijisr.2042.4639.2015.0064 |
Matt Piazza, Aspen Olmsted |
![]() |
565 - 573 | A Conceptual Model for Cultivating an Information Security Culture DOI: 10.20533/ijisr.2042.4639.2015.0065 |
Emad Sherif, Steven Furnell, Nathan Clarke |
![]() |
Issue 3, September 2015
Pages | Title | Author(s) | Papers |
574 - 581 | Horn Schunck Algorithm for Facial Expression Change Detection Classification DOI: 10.20533/ijisr.2042.4639.2015.0066 |
N. Zainudin, S. Ramli, T. Tan Zizi, N. A. Hasbullah, M. Mohd Hanafi, N. A. Wahab, N. Ibrahim |
![]() |
582 - 590 | Predicting Multi-Stage Attacks Based on Hybrid Approach DOI: 10.20533/ijisr.2042.4639.2015.0067 |
Abdulrazaq Z. Almutairi, James Flint, David Parish |
![]() |
591 - 599 | A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception DOI: 10.20533/ijisr.2042.4639.2015.0068 |
Saud Alotaibi, Steven Furnell, Nathan Clarke |
![]() |
Issue 4, December 2015
Pages | Title | Author(s) | Papers |
600 - 607 | Improving Gnutella Query Search Algorithm with Jumps DOI: 10.20533/ijisr.2042.4639.2015.0069 |
Kholoud Althobaiti, Sara Jeza Alotaibi, Hend Alqahtani |
![]() |
608 - 616 | Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures DOI: 10.20533/ijisr.2042.4639.2015.0070 |
Tasneem Yousuf, Rwan Mahmoud, Fadi Aloul, Imran Zualkernan |
![]() |
617 - 624 | From Insect to Secure: Applying Nest-mate Recognition Approach of Honeybee to Improve Intrusion Detection System DOI: 10.20533/ijisr.2042.4639.2015.0071 |
Ghassan Ahmed Ali |
![]() |