Issue 1, March 2014

PagesTitleAuthor(s)Papers
191 - 197Full Function Firewalls and Fast Routing Query on MANETs

DOI: 10.20533/jitst.2046.3723.2014.0025
Ting Zhang, Dale Lindskog Download Paper
198 - 202Assisted Learning Virtual Support (ALVS) for Personal Learning Environments

DOI: 10.20533/jitst.2046.3723.2014.0026
Robert Costello, Nigel Shaw Download Paper
203 - 209Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication

DOI: 10.20533/jitst.2046.3723.2014.0027
Omoyele Akinsowon, Boniface Alese, Olumide Adewale Download Paper
210 - 219A Study on the Impact of ICT on Collaborative Learning Processes in Libyan Higher Education

DOI: 10.20533/jitst.2046.3723.2014.0028
Thuraya Kenan, Abdussalam Elzawi, Crinela Pislaru, Maysoun Restoum Download Paper
220 - 231Attack Graph-Based Risk Assessment and Optimisation Approach

DOI: 10.20533/jitst.2046.3723.2014.0029
Mohammed Alhomidi, Martin Reed Download Paper

Issue 2, June 2014

PagesTitleAuthor(s)Papers
232 - 238How Too much Emphasis on Connectivity is Decelerating the Exploitation of Digital Content in Poor Countries

DOI: 10.20533/jitst.2046.3723.2014.0030
Leonard J. Mselle, Tabu S. Kondo Download Paper
239 - 245Evaluating Security Mechanisms Implemented on Windows Azure

DOI: 10.20533/jitst.2046.3723.2014.0031
Alexander Akinbi, Ella Pereira, Chris Beaumont Download Paper
246 - 253The Applicability of Electrocardiogram (ECG) As Biometrics in Securing the Communication of Wireless Body Area Network

DOI: 10.20533/jitst.2046.3723.2014.0032
Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah Download Paper
254 - 262An Elastic Scaling Method for Cloud Security

DOI: 10.20533/jitst.2046.3723.2014.0033
Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat Download Paper
263 - 270Security Infrastructure for Hybrid Clouds and Cloud Federation

DOI: 10.20533/jitst.2046.3723.2014.0034
Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R., Prafulla, Shwetha R.,Yashaswini A. Download Paper

Issue 3, September 2014

PagesTitleAuthor(s)Papers
271 - 279Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gathering

DOI: 10.20533/jitst.2046.3723.2014.0035
Bruno Dinis, Carlos Serrão Download Paper
280 - 287Information Privacy Concerns in a Participatory Crowdsourcing Smart City Project

DOI: 10.20533/jitst.2046.3723.2014.0036
Liezel Cilliers, Stephen Flowerday Download Paper
288 - 299Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFC

DOI: 10.20533/jitst.2046.3723.2014.0037
Christian Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner Download Paper
300 - 310Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems

DOI: 10.20533/jitst.2046.3723.2014.0038
Ricardo Villalón-Fonseca, Braulio J. SolanoRojas, Gabriela Marín-Raventós Download Paper
311 - 319A Data Partition Based Model to Enforce Security in Cloud Database

DOI: 10.20533/jitst.2046.3723.2014.0039
Osama M Ben Omran, Brajendra Panda Download Paper

Issue 4, December 2014

PagesTitleAuthor(s)Papers
320 - 328Security Factors Influencing End Users’ Adoption of E-Government

DOI: 10.20533/jitst.2046.3723.2014.0040
Nawaf Alharbi, Maria Papadaki, Paul Dowland Download Paper
329 - 337A Collaborative Framework for QoC-driven Context Information Provision

DOI: 10.20533/jitst.2046.3723.2014.0041
Elarbi Badidi Download Paper
338 - 343Integrating Enterprise Security Infrastructure with Cloud Computing

DOI: 10.20533/jitst.2046.3723.2014.0042
Oliver Pfaff, Sebastian Ries Download Paper
344 - 350Post-Quantum Crystography based Security Framework for Cloud Computing

DOI: 10.20533/jitst.2046.3723.2014.0043
A.J. Gabriel, B.K. Alese, A.O. Adetunmbi, O.S. Adewale Download Paper