2013
2013
Volume 7, Number 5, 2013 September
-
- An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers, Najib A. Kofahi (pp. 1-16).
- Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks, Jianmin Zhang, Jianwei Tan and Jian Li (pp. 17-28).
- Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph, Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Bazara I. A. Barry (pp. 29-42).
- A Mutual RFID Security Protocol for Wireless Reader, He Jialiang and Xu Zhiqiang (pp. 43-52).
- A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs), Z. Lashkaripour and A. Ghaemi Bafghi (pp. 53-66).
- A New Fast and High Performance Intrusion Detection System, Ahmed Ahmim and Nacira Ghoualmi-Zine (pp. 67-80).
- A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic, Gagandeep Kaur, Vikas Saxena and J. P. Gupta (pp. 81-100).
- A Robust Behavior Modeling for Detecting Hard-coded Address Contained Shellcodes, Javad Khodaverdi and Farnaz Amin (pp. 101-112).
- Implementing Database Methods for Increasing the Performance of Intelligent CCTV, Yong Wan Ju and Seung Jai Yi (pp. 113-120).
- A Novel Method to Avoid Malicious Applications on Android, Sangho Lee and Da Young Ju (pp. 121-130).
- Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC, Sung-Wook Park and Im-Yeong Lee (pp. 131-138).
- Content Reuse Prevention Scheme to Prevent Privacy Invasion of Social Network Service, Su-Young Jung and Jin Kwak (pp. 139-146).
- Experimental Study of DDoS Defense System for Web Service, Namkyun Baik and Namhi Kang (pp. 147-156).
- Policy Direction of QoS Interworking and Management among Service Providers for Broadcast-Communication Convergent, Chin-Chol Kim, Jong-Pil Jeong and Jae-Young Choi (pp. 157-166).
- A Logistic Neural Network Approach to Extended Warranty Claims, Lee Sang-Hyun, Lim Jong-Han and Moon Kyung-Il (pp. 167-174).
- Vehicle License Plate Recognition Based on Hierarchical Approach, Dongwook Kim and Liu Zheng (pp. 175-182).
- Audio Watermarking by Coefficient Quantization in the DWT-DCT Dual Domain, De Li, Yingying Ji and JongWeon Ki (pp. 183-192).
- Intrusion Detection Ensemble Algorithm based on Bagging and Neighborhood Rough Set, Hui Zhao (pp. 193-204).
- Secure Communication based on a Fractional Order Chaotic System, Shuai Wang, Wei Sun, Cao-Yuan Ma, Di Wang and Zheng-Chen (pp. 205-216).
- Network Security Threats Situation Assessment and Analysis Technology Study, Xiangdong Cai, Yang Jingyi and Huanyu Zhang (pp. 217-224).
- Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng and Jeong-Uk Kim (pp. 225-236).
- An Improved Algorithm of Elliptic Curve Cryptograph, Kai Zhang and Tao Yan (pp. 237-248).
- Attack Graph Algorithm in the Application of Intrusion Detection System, Luo Zhiyong, You Bo, Xu Jiazhong, Yu Guixin and Liu Yahui (pp. 249-256).
- A Heuristics-based Static Analysis Approach for Detecting Packed PE Binaries, Rohit Arora, Anishka Singh, Himanshu Pareek and Usha Rani Edara (pp. 257-268).
- Preventing and Detecting Plagiarism in Programming Course, Wang Chunhui, Liu Zhiguo and Liu Dongsheng (pp. 269-278).
- An Adaptive Method for Source-end Detection of Pulsing DoS Attacks, Ming Yu (pp. 279-288).
- Platforms and Applications in Hardware Security: Trends and Challenges, Edward David Moreno (pp. 289-304).
- Access-control-based Efficient Privacy Protection Method for Social Networking Services, Yu-Jong Jang and Jin Kwak (pp. 305-314).
- Security Management Architecture for Secure Smartwork Center, Yun Sang Byun and Jin Kwak (pp. 315-320).
- Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues, Mehdi Maleknasab, Moazam Bidaki and Ali Harounabadi (pp. 321-342).
- A Study on Differential User Authentication Scheme based on Client in Home Network, Changhoon Lee, Woongryul Jeon, Dongho Won (pp. 343-354).
- A Multi-Stage Fingerprint Recognition Method for Payment Verification System, Woong-Sik Kim (pp. 355-364).
- Relative Importance Analysis of inter-evaluation items in Korean IS Standard Audit Checklist Using Decision making Techniques, Boo-Hyung Lee (pp. 365-376).
- A Novel Image Encryption Using Arnold Cat, Pan Tian-gong and Li Da-yong (pp. 377-386).
- An Improved Overlap-Key-Sharing Key Management Scheme for Wireless Sensor Networks, Li Lan Ying, Yi Chun Huan, Sun Jian Da and Si Tie Qiang (pp. 387-396).
- An Encryption Method for QR Code Image Based on ECA, Yu Xiaoyang, Song Yang, Yu Yang, Yu Shuchun, Cheng Hao and Guan Yanxia (pp. 397-406).
- Design of Active Frequency Selective Surfaces for the RCS Reduction, Guo hui Yang, Shuang Ma, Er chao Wang, Yuemei Qin and Xuemai Gu (pp. 407-414).
- Byte-index Chunking Algorithm for Data Deduplication System, Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Chuck Yoo and Young Woong Ko (pp. 415-424).
- Development and Analysis of an Information Security Learning Method using Situation-based Problems, Yungyeong Ko, Seonghee Lee and Seong Baeg Kim (pp. 425-434).