Issue 1, March 2014

Pages Title Author(s) Papers
191 - 197 Full Function Firewalls and Fast Routing Query on MANETs

DOI: 10.20533/jitst.2046.3723.2014.0025
Ting Zhang, Dale Lindskog Download Paper
198 - 202 Assisted Learning Virtual Support (ALVS) for Personal Learning Environments

DOI: 10.20533/jitst.2046.3723.2014.0026
Robert Costello, Nigel Shaw Download Paper
203 - 209 Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication

DOI: 10.20533/jitst.2046.3723.2014.0027
Omoyele Akinsowon, Boniface Alese, Olumide Adewale Download Paper
210 - 219 A Study on the Impact of ICT on Collaborative Learning Processes in Libyan Higher Education

DOI: 10.20533/jitst.2046.3723.2014.0028
Thuraya Kenan, Abdussalam Elzawi, Crinela Pislaru, Maysoun Restoum Download Paper
220 - 231 Attack Graph-Based Risk Assessment and Optimisation Approach

DOI: 10.20533/jitst.2046.3723.2014.0029
Mohammed Alhomidi, Martin Reed Download Paper

Issue 2, June 2014

Pages Title Author(s) Papers
232 - 238 How Too much Emphasis on Connectivity is Decelerating the Exploitation of Digital Content in Poor Countries

DOI: 10.20533/jitst.2046.3723.2014.0030
Leonard J. Mselle, Tabu S. Kondo Download Paper
239 - 245 Evaluating Security Mechanisms Implemented on Windows Azure

DOI: 10.20533/jitst.2046.3723.2014.0031
Alexander Akinbi, Ella Pereira, Chris Beaumont Download Paper
246 - 253 The Applicability of Electrocardiogram (ECG) As Biometrics in Securing the Communication of Wireless Body Area Network

DOI: 10.20533/jitst.2046.3723.2014.0032
Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah Download Paper
254 - 262 An Elastic Scaling Method for Cloud Security

DOI: 10.20533/jitst.2046.3723.2014.0033
Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat Download Paper
263 - 270 Security Infrastructure for Hybrid Clouds and Cloud Federation

DOI: 10.20533/jitst.2046.3723.2014.0034
Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R., Prafulla, Shwetha R.,Yashaswini A. Download Paper

Issue 3, September 2014

Pages Title Author(s) Papers
271 - 279 Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gathering

DOI: 10.20533/jitst.2046.3723.2014.0035
Bruno Dinis, Carlos Serrão Download Paper
280 - 287 Information Privacy Concerns in a Participatory Crowdsourcing Smart City Project

DOI: 10.20533/jitst.2046.3723.2014.0036
Liezel Cilliers, Stephen Flowerday Download Paper
288 - 299 Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFC

DOI: 10.20533/jitst.2046.3723.2014.0037
Christian Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner Download Paper
300 - 310 Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems

DOI: 10.20533/jitst.2046.3723.2014.0038
Ricardo Villalón-Fonseca, Braulio J. SolanoRojas, Gabriela Marín-Raventós Download Paper
311 - 319 A Data Partition Based Model to Enforce Security in Cloud Database

DOI: 10.20533/jitst.2046.3723.2014.0039
Osama M Ben Omran, Brajendra Panda Download Paper

Issue 4, December 2014

Pages Title Author(s) Papers
320 - 328 Security Factors Influencing End Users’ Adoption of E-Government

DOI: 10.20533/jitst.2046.3723.2014.0040
Nawaf Alharbi, Maria Papadaki, Paul Dowland Download Paper
329 - 337 A Collaborative Framework for QoC-driven Context Information Provision

DOI: 10.20533/jitst.2046.3723.2014.0041
Elarbi Badidi Download Paper
338 - 343 Integrating Enterprise Security Infrastructure with Cloud Computing

DOI: 10.20533/jitst.2046.3723.2014.0042
Oliver Pfaff, Sebastian Ries Download Paper
344 - 350 Post-Quantum Crystography based Security Framework for Cloud Computing

DOI: 10.20533/jitst.2046.3723.2014.0043
A.J. Gabriel, B.K. Alese, A.O. Adetunmbi, O.S. Adewale Download Paper