Issue 1, March 2015

Pages Title Author(s) Papers
529 - 537 Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies

DOI: 10.20533/ijisr.2042.4639.2015.0060
Edina Hatunic-Webster, Fred Mtenzi, Brendan O’Shea Download Paper
538 - 545 Traffic Classification for the Detection of Anonymous Web Proxy Routing

DOI: 10.20533/ijisr.2042.4639.2015.0061
Shane Miller, Kevin Curran, Tom Lunney Download Paper
546 - 550 A Secured Automatic Notification System Based on Short Message Service

DOI: 10.20533/ijisr.2042.4639.2015.0062
Emmy Mugisha, Bob Alex Ogwang, Victor Ongoma, Gongxuan Zhang Download Paper

Issue 2, June 2015

Pages Title Author(s) Papers
551 - 558 Modelling Threats with Security Requirements in Cloud Storage

DOI: 10.20533/ijisr.2042.4639.2015.0063
Fara Yahya, Robert J. Walters, Gary B. Wills Download Paper
559 - 564 Herding Cats: How to Launch a Cyber Security Club in an Academic Setting

DOI: 10.20533/ijisr.2042.4639.2015.0064
Matt Piazza, Aspen Olmsted Download Paper
565 - 573 A Conceptual Model for Cultivating an Information Security Culture

DOI: 10.20533/ijisr.2042.4639.2015.0065
Emad Sherif, Steven Furnell, Nathan Clarke Download Paper

Issue 3, September 2015

Pages Title Author(s) Papers
574 - 581 Horn Schunck Algorithm for Facial Expression Change Detection Classification

DOI: 10.20533/ijisr.2042.4639.2015.0066
N. Zainudin, S. Ramli, T. Tan Zizi, N. A. Hasbullah, M. Mohd Hanafi, N. A. Wahab, N. Ibrahim Download Paper
582 - 590 Predicting Multi-Stage Attacks Based on Hybrid Approach

DOI: 10.20533/ijisr.2042.4639.2015.0067
Abdulrazaq Z. Almutairi, James Flint, David Parish Download Paper
591 - 599 A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception

DOI: 10.20533/ijisr.2042.4639.2015.0068
Saud Alotaibi, Steven Furnell, Nathan Clarke Download Paper

Issue 4, December 2015

Pages Title Author(s) Papers
600 - 607 Improving Gnutella Query Search Algorithm with Jumps

DOI: 10.20533/ijisr.2042.4639.2015.0069
Kholoud Althobaiti, Sara Jeza Alotaibi, Hend Alqahtani Download Paper
608 - 616 Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures

DOI: 10.20533/ijisr.2042.4639.2015.0070
Tasneem Yousuf, Rwan Mahmoud, Fadi Aloul, Imran Zualkernan Download Paper
617 - 624 From Insect to Secure: Applying Nest-mate Recognition Approach of Honeybee to Improve Intrusion Detection System

DOI: 10.20533/ijisr.2042.4639.2015.0071
Ghassan Ahmed Ali Download Paper