2015
2015
Volume 9, Number 4, 2015 April
-
- Grey Relational Analysis for Route Choice Decision-making under Uncertain Information, Jianhu Zheng (pp. 1-8).
- Proposed Method to Enhance the Performance of AOMDV under DDOS Attack, Singh Kulbir Kaur Waraich and Simar Preet Singh (pp. 9-18).
- A Video Watermarking Algorithm based on Motion Vector, Shi Guochuan Shi, Guanyu Chen and Binhao Shi (pp. 19-24).
- Perceived K-value Location Privacy Protection Method Based on LBS in Augmented Reality, Yang Yang (pp. 35-32).
- Analysis on Supply and Demand Status of Information Protection of Human Resources in Korea, Seung-Woan Chai, Sang-Ho Jie and Kyoung-Sik Min (pp. 33-40).
- Location Positioning and Privacy Preservation Methods in Location-based Service, Xu Zhang and Hae Young Bae (pp. 41-52).
- Ontology-based Privacy Preserving Digital Forensics Framework, Xuejiao Wan, Jingsha He, Huanguang uang and Yonghao Mai (pp. 53-62).
- A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response, EpiphaniouAyei E. Ibor and Gregory Epiphaniou (pp. 63-80).
- Fusion Trust Relation and Rating Data Algorithm, Xiaofeng Li (pp. 81-90).
- A Novel Lightweight Hybrid Intrusion Detection Method Using a Combination of Data Mining Techniques, Jatuphum Juanchaiyaphum, Ngamnij Arch -int, Somjit Arch-int andSaiyan Saiyod (pp. 91-106).
- A Trust-based Stable Routing Protocol in Vehicular ad-hoc Networks, Junxia Ma and Chen Yang (pp. 107-116).
- Low-Cost Round Encryption Method for Embedded System, Qi Yue, Luo Xinqiang and Wan Yadong (pp. 117-124).
- Image Forgery Authentication and Classification using Hybridization of HMM and SVM Classifier, Mohammad Farukh Hashmi and Avinash G. Keskar (pp. 125-140).
- Based on the Ant Colony Algorithm is a Distributed Intrusion Detection Method, Yiran Wang and Chunxia Wang (pp. 141-152).
- Systems Ensuring Quality in Biometric Systems, Md. Mahbubur Rahman, Amit Karmaker, Md.Mahmudul Hasan and Samsuddin Ahmed (pp. 153-160).
- Study on Reliability Optimization Problem of Computer Network, Liang Lei (pp. 161-174).
- A Robust Watermarking Scheme Based on Least Significant Bit and Discrete Cosine Transform, Zhou Fu-an (pp. 175-184).
- Clone Detection Using Enhanced EDD (EEDD) with Danger Theory in Mobile Wireless Sensor Network, L. S. Sindhuja and G. Padmavathi (pp. 185-202).
- Blind Watermarking Scheme based on U matrix Through QSVD Transformation, Feng Liu, Hao Feng and Chao Lu (pp. 203-216).
- A User Access Control Scheme for Reducing Authentication Keys in Cloud Systems, Seungtae Hong, Hyeongil Kim, Taehoon Kim and Jaewoo Chang (pp. 217-228).
- Unsupervised Extraction of Signatures and Roles from Large-Scale Mail Archives, Yuan Xiaoqin (pp. 229-238).
- Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security, R. Divya and V. Vijayalakshmi (pp. 23-246).
- Research on Intrusion Detection Algorithm Based on BP Neural Network, Chunmin Qiu, Jie Shan (pp. 247-258).
- ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method, Wang Xingzhu (pp. 259-270).
- Authentication Model for Location based Queries, Roshan S. Deshmukh and D. G. Harkut (pp. 271-278).
- Real-valued Dual Negative Selection Technique for Intrusion Detection, Niu Ling and Feng Gao Feng (pp. 279-288).
- A Revew and Compative Analysis of various Encryption Algorithms, Rajdeep Bhanot and Rahul Hans (pp. 289-306).
- A Wavelet Transform Based Support Vector Machine Ensemble Algorithm and Its Application in Network Intrusion Detection, Xuesen Cai and Fanhua Yu (pp. 307-316).
- Android’s External Device Attack: Demonstration and Security Suggestions, Zhang Wei, Yang Chao and Chen Yunfang (pp. 317-326).
- Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks, Gideon Rajan and Gihwan Cho (pp. 327-336).