Volume 9 (2019)
Issue 1, March 2019
Pages | Title | Author(s) | Papers |
821 - 830 | Analysis of a PBX Toll Fraud Honeypot DOI: 10.20533/ijisr.2042.4639.2019.0094 |
N. McInnes, E.J. Zaluska, G. Wills | |
831 - 838 | Architectural Solutions for Context-Aware Applications: KoDA Prototype DOI: 10.20533/ijisr.2042.4639.2019.0095 |
Dennis Lupiana | |
839 - 847 | Proposing a Secure Component-based-Application Logic and System’s Integration Testing Approach DOI: 10.20533/ijisr.2042.4639.2019.0096 |
Faisal Nabi, Jianming Yong, Xiaohui Tao | |
848 - 853 | Towards Fact-Based Digital Forensic Evidence Collection Methodology DOI: 10.20533/ijisr.2042.4639.2019.0097 |
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed |
Issue 2, June 2019
Pages | Title | Author(s) | Papers |
854 - 861 | Factors Limiting the Adoption of Cloud Computing in Teleradiology DOI: 10.20533/ijisr.2042.4639.2019.0098 |
Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun | |
862 - 870 | Zlto: Increase and Track Positive Behavior using Secure Blockchain Technology DOI: 10.20533/ijisr.2042.4639.2019.0099 |
Michael Gu, Allan Van Der Meulen, Kurt Appolis, Christine Taphel, Marlon Parker, Gary Wills | |
871 - 880 | Host-Based Detection and Analysis of Android Malware DOI: 10.20533/ijisr.2042.4639.2019.0100 |
Moses Ashawa, Sarah Morris |
Issue 3, September 2019
Pages | Title | Author(s) | Papers |
881 - 890 | Data Publishing Techniques and Privacy Preserving DOI: 10.20533/ijisr.2042.4639.2019.0101 |
Ajit Singh | |
891 - 897 | Multiple Model Tree Meta Algorithms Improvement of Network Intrusion Detection Predictions Accuracy DOI: 10.20533/ijisr.2042.4639.2019.0102 |
Olasehinde Olayemi O., Olayemi Olufunke C., Alese B. K. | |
898 - 905 | A Taxonomy of Logic Attack Vulnerabilities in Component-based e-Commerce System DOI: 10.20533/ijisr.2042.4639.2019.0103 |
Faisal Nabi, Jianming Yong, Xiaohui Tao |