2016
2016
Volume 10, Number 8, 2016 August
-
- Towards an Analysis of Passive Attacks on Anonymous Communication Systems, Tianbo Lu, Pan Gao, Lingling Zhao, Yang Li and Wan Jiang Han (pp. 1-12).
- An Empirical Study of the Military IoT Security Priorities, Seung-hoon Jung, Jae-choon An, Jin-young Park, Yong-tae Shin and Jong-bae Kim (pp. 13-22).
- A Fast Detection and Recognition Algorithm with Construction of Fast Support Vector Machine based on Entropy Weight, Zhu Li (pp. 23-28).
- Security Parallel Migration of the Federal Cloud Markov Chain Multi Virtual Machine, Wu Lanhua (pp. 29-38).
- A Novel Forgery Detection Mechanism for Sensitive Data, Vikas Dhawan and Gurjot Singh Gaba (pp. 39-48).
- Terminal Anomaly Detection System Based on Dynamic Taint Analysis Technology, Wang Yutong, Chang Chaowen and Han Peisheng (pp. 49-58).
- Analysis of Various Cryptography Techniques: A Survey, Neha Tayal, Ritesh Bansal, Shailender Gupta and Sangeeta Dhall (pp. 59-92).
- Forecasting on Ecological Security of Zhalong Wetland Nature Reserve based on Gray Theory, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 93-102).
- Simulation and Analysis for Error from Satellite Tracking Segment Anti-spoofing, Liu You-ming, Feng Qi and Li Ting-jun (pp. 103-120).
- A Group Key based Security Model for Big Data System, Heeyoul Kim (pp. 121-130).
- Secure DNP3 Services Scheme in Smart Grid Link Layer Based on GCM-AES, Ye Lu, Tao Feng and Guohua Ma (pp. 131-144).
- “Soft-Man” and Data Mining based Distributed Intrusion Detection System, Jun Zheng (pp. 145-150).
- A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection, Yasir Hamid, M. Sugumaran and Ludovic Journaux (pp. 151-158).
- Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks, Zeyu Sun, Longxing Li and Xuelun Li (pp. 159-172).
- Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm, Andysah Putera, Utama Siahaan and Robbi Rahim (pp. 173-180).
- Multi-level detection and Warning Model for Bandwidth Consumption Attacks, Jincui Yang, Fangjiao Zhang and Wenbo Hu (pp. 181-190).
- The Risk Evaluation Research of Computer Network Security based on Grey Clustering, Ning Yu (pp. 191-200).
- Worm Propagation with Differential Infectivity under Quarantine Control Strategy, Sounak Paul and Bimal Kumar Mishra (pp. 201-214).
- Research on Smart Grid Risk Assessment Based on Matter-Element Extenics, Jing Zhou and Zhaoxi Mu (pp. 215-224).
- Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation, Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan (pp. 225-238).
- Flow-based Physical Security, Sabah Al-Fedaghi (pp. 239-250).
- Applying Fuzzy Synthetic Evaluation Approach to Risk Assessment of Large-scale Activities, Zheng Jianhu and Huang Mingfang (pp. 251-262).
- A Novel Rough Set Methodology and Machine Learning based Novel Network Intrusion Detection System: Theoretical Analysis and Applications, Yang Hui-jun (pp. 263-276).
- A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment, Junath Naseer Ahamed and N. Ch. S. N. Iyengar (pp. 277-294).
- Security Architecture and Requirements for Wireless Sensor Networks, Yiguang Gong, Feng Ruan, Zhiyong Fan, Jianmin Hou, Ping Mei and Tao Li (pp. 295-302).
- Research on Complex Products based on Digital Layout Design and Simulation Modeling, Nuo Zhang, Jingjing Jiao, Hongxiu Liu and Zhen Yao (pp. 303-314).
- Indistinguishable Executable Code Generation Method, Mikhail Styugin (pp. 315-324).
- Large-scale Evolutionary Knowledge Network and Multiple Integration of University Ideological and Political Education Resources Based on Inference Algorithm, Chunyan Ma (pp. 325-334).
- Developing Data Mining Techniques for Intruder Detection in Network Traffic, Amar Agrawal, Sabah Mohammed and Jinan Fiaidhi (pp. 335-342).
- Attack Detection Research for Software Defined Network, Jianfei Zhou and Na Liu (pp. 343-352).
- Research on Data Intrusion Detection Technology based on Fuzzy Algorithmn, Sheng Zhao, Huishan Han and Xuekui Shi (pp. 353-364).
- A Study on the Device Authentication and Key Distribution Method for Internet of Things, Jae-young Lee and Do-Eun Cho (pp. 365-374).
- Application of Data Mining in Fiscal Expenditure on the New Urbanization and Income Gap based on Network Big Data, Yan Liu (pp. 375-384).
- Improved BIRCH Clustering Algorithm and Human Resource Management Efficiency: An Organizational Learning Perspective, Yingjun Han (pp. 385-394).
- DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks, Tanvi Gupta, Sumit Kumar, Ankit Tomar and KamalKant Verma (pp. 395-406).
- Secure Communication in Two-Way Relay Networks with Channel Estimation Errors, Yao Chenhong, Pei Changxing and Guo Jing (pp. 407-416).
- Efficient and Fast Detection of Covert Channels using Mutation Analysis, Mohammed Ennahbaouui and Said El Hajji (pp. 417-434).
- Network Intrusion Detection Based on Stochastic Neural Networks Method, Yunfeng Yang and Fengxian Tang (pp. 435-446).
- Research on Anti-Spoofing and Detection Technology in Satellite Positioning Section, Liu You-ming, Feng Qi and Li Ting-jun (pp. 447-456).