Issues 1, March 2016

625 - 635Secure Mutual Self-Authenticable Mechanism for Wearable Devices

DOI: 10.20533/ijisr.2042.4639.2016.0072
Nnabuike Eya, Trust Mapoka, Simon Shepherd, Raed A Abd-Alhameed, Issa Elfergani and Jonathan Rodriguez Download Paper
636 - 642Testing a Trust Management System for Cloud Computing Using Simulation

DOI: 10.20533/ijisr.2042.4639.2016.0073
Norah Farooqi Download Paper
643 - 650Smartphones Hotspots Intrusion Detection System (SHIDS)

DOI: 10.20533/ijisr.2042.4639.2016.0074
Khoula Al Harthy, Nazaraf Shah, James Shuttleworth Download Paper

Issue 2, June 2016

651 - 659Advanced Widespread Behavioral Probes against Lateral Movements

DOI: 10.20533/ijisr.2042.4639.2016.0075
Alessandro Greco, Giovanni Pecoraro, Alberto Caponi, Giuseppe Bianchi, Download Paper
660 - 666A Review of Using Gaming Technology for Cyber-Security Awareness

DOI: 10.20533/ijisr.2042.4639.2016.0076
Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki Download Paper
667 - 676Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through Multi-Factor Authentication and other Techniques

DOI: 10.20533/ijisr.2042.4639.2016.0077
Samuel Moses, Dale C. Rowe Download Paper

Issue 3, September 2016

677 - 684Majority Rule Approach of Deep Learning for Time Series Data

DOI: 10.20533/ijisr.2042.4639.2016.0078
Ayahiko Niimi, Masato Ikeda Download Paper
685 - 690NTRU Modulo p Flaw

DOI: 10.20533/ijisr.2042.4639.2016.0079
Anas Ibrahim, Alexander Chefranov Download Paper
691 - 700A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches

DOI: 10.20533/ijisr.2042.4639.2016.0080
Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, Fudong Li Download Paper