Issue 1, March 2015

529 - 537Evaluation of the Model for Analysing Anti-Phishing Authentication Ceremonies

DOI: 10.20533/ijisr.2042.4639.2015.0060
Edina Hatunic-Webster, Fred Mtenzi, Brendan O’Shea Download Paper
538 - 545Traffic Classification for the Detection of Anonymous Web Proxy Routing

DOI: 10.20533/ijisr.2042.4639.2015.0061
Shane Miller, Kevin Curran, Tom Lunney Download Paper
546 - 550A Secured Automatic Notification System Based on Short Message Service

DOI: 10.20533/ijisr.2042.4639.2015.0062
Emmy Mugisha, Bob Alex Ogwang, Victor Ongoma, Gongxuan Zhang Download Paper

Issue 2, June 2015

551 - 558Modelling Threats with Security Requirements in Cloud Storage

DOI: 10.20533/ijisr.2042.4639.2015.0063
Fara Yahya, Robert J. Walters, Gary B. Wills Download Paper
559 - 564Herding Cats: How to Launch a Cyber Security Club in an Academic Setting

DOI: 10.20533/ijisr.2042.4639.2015.0064
Matt Piazza, Aspen Olmsted Download Paper
565 - 573A Conceptual Model for Cultivating an Information Security Culture

DOI: 10.20533/ijisr.2042.4639.2015.0065
Emad Sherif, Steven Furnell, Nathan Clarke Download Paper

Issue 3, September 2015

574 - 581Horn Schunck Algorithm for Facial Expression Change Detection Classification

DOI: 10.20533/ijisr.2042.4639.2015.0066
N. Zainudin, S. Ramli, T. Tan Zizi, N. A. Hasbullah, M. Mohd Hanafi, N. A. Wahab, N. Ibrahim Download Paper
582 - 590Predicting Multi-Stage Attacks Based on Hybrid Approach

DOI: 10.20533/ijisr.2042.4639.2015.0067
Abdulrazaq Z. Almutairi, James Flint, David Parish Download Paper
591 - 599A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception

DOI: 10.20533/ijisr.2042.4639.2015.0068
Saud Alotaibi, Steven Furnell, Nathan Clarke Download Paper

Issue 4, December 2015

600 - 607Improving Gnutella Query Search Algorithm with Jumps

DOI: 10.20533/ijisr.2042.4639.2015.0069
Kholoud Althobaiti, Sara Jeza Alotaibi, Hend Alqahtani Download Paper
608 - 616Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures

DOI: 10.20533/ijisr.2042.4639.2015.0070
Tasneem Yousuf, Rwan Mahmoud, Fadi Aloul, Imran Zualkernan Download Paper
617 - 624From Insect to Secure: Applying Nest-mate Recognition Approach of Honeybee to Improve Intrusion Detection System

DOI: 10.20533/ijisr.2042.4639.2015.0071
Ghassan Ahmed Ali Download Paper