Issue 1, March 2019

Pages Title Author(s) Papers
821 - 830 Analysis of a PBX Toll Fraud Honeypot

DOI: 10.20533/ijisr.2042.4639.2019.0094
N. McInnes, E.J. Zaluska, G. Wills Download Paper
831 - 838 Architectural Solutions for Context-Aware Applications: KoDA Prototype

DOI: 10.20533/ijisr.2042.4639.2019.0095
Dennis Lupiana Download Paper
839 - 847 Proposing a Secure Component-based-Application Logic and System’s Integration Testing Approach

DOI: 10.20533/ijisr.2042.4639.2019.0096
Faisal Nabi, Jianming Yong, Xiaohui Tao Download Paper
848 - 853 Towards Fact-Based Digital Forensic Evidence Collection Methodology

DOI: 10.20533/ijisr.2042.4639.2019.0097
Nik Zulkarnaen Khidzir, Shekh Abdullah-Al-Musa Ahmed Download Paper

Issue 2, June 2019

Pages Title Author(s) Papers
854 - 861 Factors Limiting the Adoption of Cloud Computing in Teleradiology

DOI: 10.20533/ijisr.2042.4639.2019.0098
Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun Download Paper
862 - 870 Zlto: Increase and Track Positive Behavior using Secure Blockchain Technology

DOI: 10.20533/ijisr.2042.4639.2019.0099
Michael Gu, Allan Van Der Meulen, Kurt Appolis, Christine Taphel, Marlon Parker, Gary Wills Download Paper
871 - 880 Host-Based Detection and Analysis of Android Malware

DOI: 10.20533/ijisr.2042.4639.2019.0100
Moses Ashawa, Sarah Morris Download Paper

Issue 3, September 2019

Pages Title Author(s) Papers
881 - 890 Data Publishing Techniques and Privacy Preserving

DOI: 10.20533/ijisr.2042.4639.2019.0101
Ajit Singh Download Paper
891 - 897 Multiple Model Tree Meta Algorithms Improvement of Network Intrusion Detection Predictions Accuracy

DOI: 10.20533/ijisr.2042.4639.2019.0102
Olasehinde Olayemi O., Olayemi Olufunke C., Alese B. K. Download Paper
898 - 905 A Taxonomy of Logic Attack Vulnerabilities in Component-based e-Commerce System

DOI: 10.20533/ijisr.2042.4639.2019.0103
Faisal Nabi, Jianming Yong, Xiaohui Tao Download Paper