Issue 1, March 2019

PagesTitleAuthor(s)Papers
821 - 830Analysis of a PBX Toll Fraud Honeypot

DOI: 10.20533/ijisr.2042.4639.2019.0094
N. McInnes, E.J. Zaluska, G. Wills Download Paper
831 - 838Architectural Solutions for Context-Aware Applications: KoDA Prototype

DOI: 10.20533/ijisr.2042.4639.2019.0095
Dennis Lupiana Download Paper
839 - 847Proposing a Secure Component-based-Application Logic and System’s Integration Testing Approach

DOI: 10.20533/ijisr.2042.4639.2019.0096
Faisal Nabi, Jianming Yong, Xiaohui Tao Download Paper
848 - 853Towards Fact-Based Digital Forensic Evidence Collection Methodology

DOI: 10.20533/ijisr.2042.4639.2019.0097
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed Download Paper

Issue 2, June 2019

PagesTitleAuthor(s)Papers
854 - 861Factors Limiting the Adoption of Cloud Computing in Teleradiology

DOI: 10.20533/ijisr.2042.4639.2019.0098
Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun Download Paper
862 - 870Zlto: Increase and Track Positive Behavior using Secure Blockchain Technology

DOI: 10.20533/ijisr.2042.4639.2019.0099
Michael Gu, Allan Van Der Meulen, Kurt Appolis, Christine Taphel, Marlon Parker, Gary Wills Download Paper
871 - 880Host-Based Detection and Analysis of Android Malware

DOI: 10.20533/ijisr.2042.4639.2019.0100
Moses Ashawa, Sarah Morris Download Paper

Issue 3, September 2019

PagesTitleAuthor(s)Papers
881 - 890Data Publishing Techniques and Privacy Preserving

DOI: 10.20533/ijisr.2042.4639.2019.0101
Ajit Singh Download Paper
891 - 897Multiple Model Tree Meta Algorithms Improvement of Network Intrusion Detection Predictions Accuracy

DOI: 10.20533/ijisr.2042.4639.2019.0102
Olasehinde Olayemi O., Olayemi Olufunke C., Alese B. K. Download Paper
898 - 905A Taxonomy of Logic Attack Vulnerabilities in Component-based e-Commerce System

DOI: 10.20533/ijisr.2042.4639.2019.0103
Faisal Nabi, Jianming Yong, Xiaohui Tao Download Paper