IJSIA Contents

Volume 13 Number 3, 2019 September
Volume 13 Number 2, 2019 June
Volume 13 Number 1, 2019 March
Volume 12 Number 6, 2018 November
Volume 12 Number 5, 2018 September
Volume 12 Number 4, 2018 July
Volume 12 Number 3, 2018 May
Volume 12 Number 2, 2018 March
Volume 12 Number 1, 2018 January
Volume 11 Number 12, 2017 December
Volume 11 Number 11, 2017 November
Volume 11 Number 10, 2017 October
Volume 11 Number 9, 2017 September
Volume 11 Number 8, 2017 August
Volume 11 Number 7, 2017 July
Volume 11 Number 6, 2017 June
Volume 11 Number 5, 2017 May
Volume 11 Number 4, 2017 April
Volume 11 Number 3, 2017 March
Volume 11 Number 2, 2017 February
Volume 11 Number 1, 2017 January
Volume 10 Number 12, 2016 December
Volume 10 Number 11, 2016 November
Volume 10 Number 10, 2016 October
Volume 10 Number 9, 2016 September
Volume 10 Number 8, 2016 August
Volume 10 Number 7, 2016 July
  • Grey Relative Evaluation of Airport Apron Safety Risk based on THEIL Index, Shi Li and Luo Fan (pp. 1-10).
  • Design of Low Power and Secure Implementation of SBox and Inverse-SBox for AES, Divya Sharma, Ankur Bhardwaj, Harshita Prasad, Jyoti Kandpal, Abhay Saxena, Kumar Shashi Kant and Gaurav Verma (pp. 11-24).
  • Towards a Comprehensive Analysis of Crowds Anonymity System, Tianbo Lu, Xinyuan Zhang, Xiaofeng Du and Yang Li (pp. 25-40).
  • Robust Anomaly Detection Using Supervised Relevance Neural Gas with Discriminant Analysis, Jia Weifeng and Chen Weijun (pp. 51-50).
  • A Steganographic Method for Images by 'Skip Position', P. Anusha and Debnath Bhattacharyya (pp. 51-58).
  • Reversible Data-hiding Algorithm in Encrypted Image for Security Application in Cloud Computing, Zhang Jing (pp. 59-70).
  • Effects of Internet Users' Perception Regarding the Risks and Benefits of the Internet on Cyberspace Trust, Wookjoon Sung and Dongwook Kim (pp. 71-82).
  • An Image Steganography Algorithm based on the Quantitative Features of Higher Order Local Model, Hao Huang and Zhiping Zhou (pp. 83-92).
  • Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu and Kaibing Zhang (pp. 93-102).
  • Certificateless Public Key Cryptography: A Research Survey, Jacob Sayid, Isaac Sayid and Jayaprakash Kar (pp. 103-118).
  • A Key Management and Cross-layer Routing Scheme for Wireless Sensor Networks, Fengjun Shang, Xiaolin Deng, Yongkui Zhou (pp. 119-134).
  • Cloud Computing Education Laboratory Safety Research, Zheng Li (pp. 135-146).
  • An Evaluation of Dynamic Java Bytecode Software Watermarking Algorithms, Krishan Kumar, Viney Kehar and Prabhpreet Kaur (pp. 147-156).
  • Intelligent Data Mining Algorithm Application in Enterprise Financial Management Strategy Optimization: A E-commerce Perspective, Lili Jia (pp. 157-168).
  • Cube Theory and k-error Linear Complexity Profile, Jianqin Zhou, Wanquan Liu, Xifeng Wang (pp. 169-184).
  • Research on Network Intrusion Detection Method based on Regular Expression Matching, Yi Wang (pp. 185-194).
  • An Algorithm of Eyelashes Detection for Iris Recognition, Wenyao Zhu, Zemao Zhao and Yufeng Wu (pp. 195-202).
  • A Study on the Web Services Vulnerability Assessment Plan, Sang-Wook Cha, Jong-Suk Park, Jangyoun Cho, Kyeong-seok Han and Jong-Bae Kim (pp. 203-212).
  • A Fusion Model for Securities Analysts' Stock Rating Information Based on the Evidential Reasoning Algorithm under Two-dimensional Progressive Recognition Framework, Weidong Zhu, Yiling Wang, Yong Wu and Yibo Sun (pp. 213-228).
  • Mobile Internet Tourism Information Security Research, Shan Xue (pp. 229-238).
  • Research on Weak Fault Detection Algorithm Chaotic Neural Network, Zhu Yuan Zhong (pp. 239-248).
  • Novel Intrusion Detection Method based on Triangular Matrix Factorization, Qi Yingchun and Niu Ling (pp. 249-258).
  • Securing Android In-app Billing Service against Automated Attacks, Heeyoul Kim and Sang-won Kim (pp. 259-268).
  • Research on Stock Price Prediction Model based on GA Optimized SVM Parameters, Liang bang-long, Lin jie and Yuan Guanghui (pp. 269-280).
  • Research on Data Mining Model of Intelligent Transportation Based on Granular Computing, Xiao-Lan Xie and Xiao-Feng Gu (pp. 282-286).
  • Effective Signcryption Approach for Secure Convention for Multilayer Consensus using ECC, Gautam Kumar and Hemraj Saini (pp. 287-306).
  • Research on Text Proofreading Method for Judgment Document, Xu Yabin and Ji Xuan (pp. 307-318).
  • Sentiment polarity Analysis on Microblogging Hot Topic, Xu Yabin and Zhang Guanglei (pp. 319-332).
  • A New Authentication Solution for Prevention of Some Typical Attacks in Ad Hoc Network, Haiyan Liu and Kongjun Bao (pp. 333-344).
  • Research and Implementation of Sobel Edge Detection Using Model-Based Design, Erhu Xie (pp. 345-354).
  • Threshold Delegation Scheme Based on Multi-Proxy Re-Encryption, You-Jin Song (pp. 355-362).
  • Web Spam Detection Based On Link Diversity and Content Features, Xu Gongwen, Li Xiaomei, Zhang Zhijun and Xu Li’Na (pp. 363-372).
  • Strategies for Improving the Electronic Information Industry Security based on IOII, Kun Zhang and Zhenji Zhang (pp. 373-382).
  • Research on Security Evaluation of Modern Information Service Industry in China, Li Menggang and Chen Fenfei (pp. 383-392).
  • QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm, Shweta Sharma and Vikas Sejwar (pp. 393-406).
Volume 10 Number 6, 2016 June
Volume 10 Number 5, 2016 May
Volume 10 Number 4, 2016 April
Volume 10 Number 3, 2016 March
Volume 10 Number 2, 2016 February
Volume 10 Number 1, 2016 January
Volume 9 Number 12, 2015 December
Volume 9 Number 11, 2015 November
Volume 9 Number 10, 2015 October
Volume 9 Number 9, 2015 September
Volume 9 Number 8, 2015 August
Volume 9 Number 7, 2015 July
Volume 9 Number 6, 2015 June
Volume 9 Number 5, 2015 May
Volume 9 Number 4, 2015 April
Volume 9 Number 3, 2015 March
Volume 9 Number 2, 2015 February
Volume 9 Number 1, 2015 January
Volume 8 Number 6, 2014 November
Volume 8 Number 5, 2014 September
Volume 8 Number 4, 2014 July
Volume 8 Number 3, 2014 May
Volume 8 Number 2, 2014 March
Volume 8 Number 1, 2014 January
Volume 7 Number 6, 2013 November
Volume 7 Number 5, 2013 September
Volume 7 Number 4, 2013 July
Volume 7 Number 3, 2013 May
Volume 7 Number 2, 2013 March
Volume 7 Number 1, 2013 January
Volume 6 Number 4, 2012 October
Volume 6 Number 3, 2012 July
Volume 6 Number 2, 2012 April
Volume 6 Number 1, 2012 January
Volume 5 Number 4, 2011 October
Volume 5 Number 3, 2011 July
Volume 5 Number 2, 2011 April
Volume 5 Number 1, 2011 January
Volume 4 Number 4, 2010 October
Volume 4 Number 3, 2010 July
Volume 4 Number 2, 2010 April
Volume 4 Number 1, 2010 January
Volume 3 Number 4, 2009 October
Volume 3 Number 3, 2009 July
Volume 3 Number 2, 2009 April
Volume 3 Number 1, 2009 January
Volume 2 Number 4, 2008 October
Volume 2 Number 3, 2008 July
Volume 2 Number 2, 2008 April
Volume 2 Number 1, 2008 January
Volume 1 Number 2, 2007 October
Volume 1 Number 1, 2007 July