2016
2016
Volume 10, Number 4, 2016 April
-
- Risk Assessment of Computer Network Security in Banks, Tan Juan (pp. 1-10).
- National Security in America: Over-Abundance of Caution & Lack of Practicality, James Pattison, Hakkyong Kim, Sungyong Lee (pp. 11-20).
- The Risk Assessment Method based on Multi-Attribute Fuzzy Decision-Making in the Application of the Internal Control, Jiamin Fang (pp. 21-32).
- An Efficient and Robust Data Integrity Verification Algorithm Based on Context Sensitive, Feng Xie, Hu Chen (pp. 33-40).
- Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment, Udhayakumar Shanmugam and Latha Tamilselvan (pp. 41-50).
- Real-time Network Attack Intention Recognition Algorithm, Qiu Hui, Wang Kun (pp. 51-62).
- Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks, Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai (pp. 63-70).
- A Mixed TS-ISA Algorithm for Reliability Redundancy Optimization Problem, Zhu Haiying, Liu Yubao (pp. 71-78).
- Differential Privacy via Weighted Sampling Set Cover, Zhonglian Hu, Zhaobin Liu, Yangyang Xu, Zhiyang Li (pp. 79-88).
- Face Detection using Image Morphology – A Review, Venkata Naresh Mandhala, Debnath Bhattacharyya, Tai-hoon Kim (pp. 89-94).
- An Analysis of Active Attacks on Anonymity Systems, Tianbo Lu, Pan Gao, Xiaofeng Du, Yang Li (pp. 95-104).
- HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks, Zeyu Sun, Xiaohui Ji, Yuanbo Li (pp. 105-116).
- Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment, Hind Idrissi, Arnaud Revel, El Mamoun Souidi (pp. 117-134).
- Research and Analysis on Network Security Modeling, Kehao Cao (pp. 135-142).
- Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process, Shafiq Ul Rehman and Selvakumar Manickam (pp. 143-154).
- Fault-tolerant Mechanism for Cloud Storage System with Integrity Verification Mechanism, Liu Hong qing, Huang Yan (pp. 155-166).
- An Integrity Protection Model based on Trusted Recovery Technology, Xiaojie Xu, Lisheng Wang (pp. 167-178).
- Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach, Ratnakirti Roy, Suvamoy Changder (pp. 179-196).
- The Research on the Network Public Opinion Risk Assessment based on the CWAHP-Entropy Method, Chai Wenlei and Cheng Mao (pp. 197-208).
- A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis, Cong-huan Ye, Zeng-gang Xiong, Yao-ming Ding,Xueming Zhang, Guangwei Wang and Fang Xu (pp. 209-220).
- Effective Belief Network for Cyber Security Frameworks, Issa Atoum and Ahmed Otoom (pp. 221-228).
- Anonymous Routing Protocols for Mobile Ad-Hoc Networks, Tianbo Lu, Hao Chen, Lingling Zhao and Yang Li (pp. 229-240).
- Network Intrusion Prediction Model based on RBF Features Classification, Wang Xing-zhu (pp. 241-248).
- An Effective Approach for Classification of Advanced Malware with High Accuracy, Ashu Sharma and Sanjay K. Sahay (pp. 249-266).
- A Parallel Algorithm of Multiple String Matching Based on Set-Partition in Multi-core Architecture, Jiahui Liu, Fangzhou Li and Guanglu Suns (pp. 267-278).
- Secure Multimedia Content Distribution for M2M Communication, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu (pp. 279-288).
- Trust System Architecture for Securing GOOSE Communication in IEC 61850 Substation Network, Muhammad Talha Abdul Rashid, Salman Yussof and Yunus Yusoff (pp. 2889-302).
- Efficient Certificateless Signcryption from Bilinear Pairings, Hongzhen Du (pp. 303-316).
- A Novel Image Change Detection Model and Optimization Algorithm based on Game Theory under the Bounded Rationality Conditions, Ning Wu, Harry Scott (pp. 317-330).
- Bag of Words Based Surveillance System Using Support Vector Machines, Nadhir Ben Halima, Osama Hosam (pp. 331-346).
- Trusted Quantum Botnet Research based on Dual-Chord Protocol, Wang Xin-Liang, Fu Meng-Meng (pp. 347-354).
- Research on the Performance Evaluation System of Public Cultural Service based on Web Survey: A Government Perspective, Yingjun Han and Rui Sun (pp. 355-366).
- Implementation of New Method to Generate a Key in Automatic Variable Key for Perfect Security, Moumita Das, Rajat Subhra Goswami, Chandan Tilak Bhunia (pp. 367-376).
- Research on the Enterprise Performance Management Information System Development and Robustness Optimization based on Data Regression Analysis and Mathematical Optimization Theory, Lei Liu, Hua Yang (pp. 377-390).
- Data Security Transmission Mechanism in Industrial Networked Control Systems against Deception Attack, Zulan Deng, Lun Xie, Yu Rong, Weize Li, Liangchen Jin (pp. 391-404).
- Security, Vulnerability and Protection of Vehicular On-board Diagnostics, Aastha Yadav, Gaurav Bose, Radhika Bhange, Karan Kapoor, N.Ch.S.N Iyengar, Ronnie D. Caytiles (pp. 405-422).
- Application of Improved BP Neural Network with Correlation Rules in Network Intrusion Detection, Yongfeng Cui, Xiangqian Li Ma and Zhijie Liu (pp. 423-430).