2015
2015
Volume 9, Number 11, 2015 November
-
- Research on Modification and Optimization of Network Topology and Internet Security based on Neural Network Structure and Mathematical Optimization, Gaoli Zhao, Junping Song and Wei Chen (pp. 1-12).
- Achieve Fairness in Rational Secret Sharing Protocol, Wang Jie (pp. 13-22).
- Secured Data Sharing based on Information Centric Trust in the Internet of Vehicles, Eun-Kyu Lee and Ki Young Lee (pp. 23-34).
- Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System, Xu Zhao, Jin Jiang and Max Stinnett (pp. 35-46).
- Malicious Processor Detection based on the Security Agent, Seong-Muk Choi, Yeol-Joo Ryou, Hoo-Ki Lee, Hee-Hoon Cho and Jong-Bae Kim (pp. 47-54).
- A New MAC Protocol PB-TDMA for WSNs Based on Event-driven, Hui Wang, Xuefeng Li, Yunfeng Wang (pp. 55-62).
- Evaluation and Prediction of Driver’s Bad Driving Behavior Based on the Moving Vehicle Attitude, Huaikun Xiang, Shaopeng Yang, Shi An and Shaoyun Ren (pp. 63-76).
- Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication, Shafiq Ul Rehman and Selvakumar Manickam (pp. 77-86).
- Research on Operating Performance and E-business Marketing Strategy in Retail Enterprises based on Online Shopping, Yongqiang Zhang, Yanlei Gao, Xiang Li and Duchun Wang (pp. 87-96).
- Botnet Detection Based on Genetic Neural Network, Chunyong Yin, Ardalan Husin Awlla, Zhichao Yin and Jin Wang (pp. 97-104).
- Draft of National Cybersecurity Act, Dea-woo Park (pp. 105-112).
- The RAS Scheduling Algorithm Based on 802.11n WIFI Router, Meng Han,Wenyu Chen, Wei Pi, Wen Li and Ru Zeng (pp. 113-124).
- Hybrid Key Management Scheme for Wireless Sensor Networks, R.Sharmila and V.Vijayalakshmi (pp. 125-132).
- Approaches of Collaborative Cloud Process Service: Constructing Service-Oriented Architecture, Chen Wang, Wu Zhao, Jie Wang and Ling Chen (pp. 133-144).
- Identification of Software NFR based on the Fuzzy-QFD Model, Shucheng Xiao, Jiafeng Wu, Erhua He and Zhendong Yang (pp. 145-154).
- Ensuring Data Confidentiality and Authentication through Encryption at Application Layer, Kaleem Ullah, M.N.A. Khan (pp. 155-166).
- The Invulnerability Studies on Data Center Network, Kai Peng and Binbin Huang (pp. 167-186).
- State of the Art of finite GMM Based Biometrics Face Authentication Systems, Soltane Mohamed (pp. 187-200).
- Machining Surface Quality Analysis of Aluminum Alloy Thin-Walled Parts in Aerospace, Dai Bing, Yu Guang-bin, Guan Yan-qi, Shao Jun-peng,Guan Yan-qi, Wu Xue-mei, Liu Yu-xin (pp. 201-208).
- Chinese Word Sense Disambiguation Based on Beam Search, Zhang Chun-Xiang, He Shan, Gao Xue-Yao and Lu Zhi-Mao (pp. 209-216).
- Implementation of Schnorr Signcryption Algorithm on DSP, Aya Elshobaky, Mohamed Rasslan and Shawkat Guirguis (pp. 217-230).
- Improved Subgraph estimation PageRank Algorithm for Web Page Rank, Lanying Li, Qiuli Zhou, Yin Kong and Yiming Dong (pp. 231-238).
- Network Intrusion Detection Model With Clustering Ensemble Method, Liang-Wei Chen (pp. 239-250).
- Network Security and Metrology: A Survey, Reham Abdellatif Abouhogail (pp. 251-270).
- A Trust-based Immune Strategy for File Pollution in P2P Networks, Xianwei Xu (pp. 271-280).
- A Novel Image Encryption Method Based On Couple Mapped Lattice and Two-Stage Diffusion, Yunsheng Zhong and Xu Xu (pp. 281-292).
- A Modular-Arithmetic-Based Encryption Scheme, Odule, Tola John, Awodele O. (pp. 293-302).
- A Security DV-Hop Localization Algorithm Resist Spoofing Attack, Wanli Zhang, Qixiang Song (pp. 303-312).
- A Key Pre-distribution Scheme Based on Deployment Information, Shulan Xia, Jilin Wang, Ru-gang Wang (pp. 313-322).
- Cryptography Based Dynamic Multi-Keyword Ranked Search Using ECC/B+TRE, Prasanna B T, C B Akki (pp. 323-336).
- Research on College Students’ English Learning Based on Network Language Differences between Chinese and English, Jun Liu (pp. 337-346).
- Reversing Bytecode of Obfuscated Java Based Smart Card Using Side Chanel Analysis, Mohammed Amine Kasmi, Mostafa Azizi and Jean-Louis Lanet (pp. 347-356).
- The Dynamic Effects of Psychological Contract to College Physical Education Teachers: an Network Organization Perspective, Yuan Xiaozhi, Wan Ping, Zhou Hang and Li Zhenliang (pp. 357-366).
- An Improved Decision-Making Model for Multimedia Teaching and College Students’ Physical Health: an Empirical Analysis of Wushu Education, Wei Dongyi, Zhang Yan and Ruan Xiaojuan (pp. 367-376).
- Optimization of Rao-Blackwellized Particle Filter in Activity Pedestrian Simultaneously Localization and Mapping (SLAM): An Initial Proposal, Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad and Raja Zahilah Raja Mohd Radzi (pp. 377-390).
- A Stealthy Attack Against Tor Guard Selection, Quangang Li, Peipeng Liu and Zhiguang Qin (pp. 391-402).
- Mechanism on Computer Access Permission Management Based on the Proposed Dynamic Password Algorithm, Jiujun Cheng, Yang Yang, Jianyu Shao, Jingxue Liao (pp. 403-418).
- Anonymous Password-based Authenticated Key Agreement Scheme with Non-tamper Resistant Smart Cards, Yunghee Lee, Hyunsung Kim (pp. 419-428).
- Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol, Daming Hu, Deyun Chen, Yuanxu Zhang and Shujun Pei (pp. 429-438).