Volume 6 (2016)
Issues 1, March 2016
Pages | Title | Author(s) | Papers |
625 - 635 | Secure Mutual Self-Authenticable Mechanism for Wearable Devices DOI: 10.20533/ijisr.2042.4639.2016.0072 |
Nnabuike Eya, Trust Mapoka, Simon Shepherd, Raed A Abd-Alhameed, Issa Elfergani and Jonathan Rodriguez | |
636 - 642 | Testing a Trust Management System for Cloud Computing Using Simulation DOI: 10.20533/ijisr.2042.4639.2016.0073 |
Norah Farooqi | |
643 - 650 | Smartphones Hotspots Intrusion Detection System (SHIDS) DOI: 10.20533/ijisr.2042.4639.2016.0074 |
Khoula Al Harthy, Nazaraf Shah, James Shuttleworth |
Issue 2, June 2016
Pages | Title | Author(s) | Papers |
651 - 659 | Advanced Widespread Behavioral Probes against Lateral Movements DOI: 10.20533/ijisr.2042.4639.2016.0075 |
Alessandro Greco, Giovanni Pecoraro, Alberto Caponi, Giuseppe Bianchi, | |
660 - 666 | A Review of Using Gaming Technology for Cyber-Security Awareness DOI: 10.20533/ijisr.2042.4639.2016.0076 |
Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki | |
667 - 676 | Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through Multi-Factor Authentication and other Techniques DOI: 10.20533/ijisr.2042.4639.2016.0077 |
Samuel Moses, Dale C. Rowe |
Issue 3, September 2016
Pages | Title | Author(s) | Papers |
677 - 684 | Majority Rule Approach of Deep Learning for Time Series Data DOI: 10.20533/ijisr.2042.4639.2016.0078 |
Ayahiko Niimi, Masato Ikeda | |
685 - 690 | NTRU Modulo p Flaw DOI: 10.20533/ijisr.2042.4639.2016.0079 |
Anas Ibrahim, Alexander Chefranov | |
691 - 700 | A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches DOI: 10.20533/ijisr.2042.4639.2016.0080 |
Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, Fudong Li |