Volume 3 (2014)
Issue 1, March 2014
Pages | Title | Author(s) | Papers |
191 - 197 | Full Function Firewalls and Fast Routing Query on MANETs DOI: 10.20533/jitst.2046.3723.2014.0025 |
Ting Zhang, Dale Lindskog | |
198 - 202 | Assisted Learning Virtual Support (ALVS) for Personal Learning Environments DOI: 10.20533/jitst.2046.3723.2014.0026 |
Robert Costello, Nigel Shaw | |
203 - 209 | Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication DOI: 10.20533/jitst.2046.3723.2014.0027 |
Omoyele Akinsowon, Boniface Alese, Olumide Adewale | |
210 - 219 | A Study on the Impact of ICT on Collaborative Learning Processes in Libyan Higher Education DOI: 10.20533/jitst.2046.3723.2014.0028 |
Thuraya Kenan, Abdussalam Elzawi, Crinela Pislaru, Maysoun Restoum | |
220 - 231 | Attack Graph-Based Risk Assessment and Optimisation Approach DOI: 10.20533/jitst.2046.3723.2014.0029 |
Mohammed Alhomidi, Martin Reed |
Issue 2, June 2014
Pages | Title | Author(s) | Papers |
232 - 238 | How Too much Emphasis on Connectivity is Decelerating the Exploitation of Digital Content in Poor Countries DOI: 10.20533/jitst.2046.3723.2014.0030 |
Leonard J. Mselle, Tabu S. Kondo | |
239 - 245 | Evaluating Security Mechanisms Implemented on Windows Azure DOI: 10.20533/jitst.2046.3723.2014.0031 |
Alexander Akinbi, Ella Pereira, Chris Beaumont | |
246 - 253 | The Applicability of Electrocardiogram (ECG) As Biometrics in Securing the Communication of Wireless Body Area Network DOI: 10.20533/jitst.2046.3723.2014.0032 |
Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah | |
254 - 262 | An Elastic Scaling Method for Cloud Security DOI: 10.20533/jitst.2046.3723.2014.0033 |
Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat | |
263 - 270 | Security Infrastructure for Hybrid Clouds and Cloud Federation DOI: 10.20533/jitst.2046.3723.2014.0034 |
Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R., Prafulla, Shwetha R.,Yashaswini A. |
Issue 3, September 2014
Pages | Title | Author(s) | Papers |
271 - 279 | Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gathering DOI: 10.20533/jitst.2046.3723.2014.0035 |
Bruno Dinis, Carlos Serrão | |
280 - 287 | Information Privacy Concerns in a Participatory Crowdsourcing Smart City Project DOI: 10.20533/jitst.2046.3723.2014.0036 |
Liezel Cilliers, Stephen Flowerday | |
288 - 299 | Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFC DOI: 10.20533/jitst.2046.3723.2014.0037 |
Christian Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner | |
300 - 310 | Infosec-Tree Model: An Applied, In-depth, and Structured Information Security Model for Computer and Network Systems DOI: 10.20533/jitst.2046.3723.2014.0038 |
Ricardo Villalón-Fonseca, Braulio J. SolanoRojas, Gabriela Marín-Raventós | |
311 - 319 | A Data Partition Based Model to Enforce Security in Cloud Database DOI: 10.20533/jitst.2046.3723.2014.0039 |
Osama M Ben Omran, Brajendra Panda |
Issue 4, December 2014
Pages | Title | Author(s) | Papers |
320 - 328 | Security Factors Influencing End Users’ Adoption of E-Government DOI: 10.20533/jitst.2046.3723.2014.0040 |
Nawaf Alharbi, Maria Papadaki, Paul Dowland | |
329 - 337 | A Collaborative Framework for QoC-driven Context Information Provision DOI: 10.20533/jitst.2046.3723.2014.0041 |
Elarbi Badidi | |
338 - 343 | Integrating Enterprise Security Infrastructure with Cloud Computing DOI: 10.20533/jitst.2046.3723.2014.0042 |
Oliver Pfaff, Sebastian Ries | |
344 - 350 | Post-Quantum Crystography based Security Framework for Cloud Computing DOI: 10.20533/jitst.2046.3723.2014.0043 |
A.J. Gabriel, B.K. Alese, A.O. Adetunmbi, O.S. Adewale |