2016
2016
Volume 10, Number 1, 2016 January
-
- Improving Wireless Security for Cooperation of Untrusted Secondary Transmitters, Yayan Ma, Baoyun Wang (pp. 1-12).
- A Study on the Big Data Log Analysis for Security, Kyung-Sik Jeon, Se-Jeong Park, Sam-Hyun Chun and Jong-Bae Kim (pp. 13-20).
- Performance evaluation of Collaborative Learning and E-commerce Security: Comprehensive Ability of China’s PE Teachers to Use Computer, Zhang Yan, Wei Dongyi, Liu Yichong, Long Xiaodong and Tao Ganchen (pp. 21-30).
- Email Spam Filtering Based on the MNMF Algorithm, Zun-xiong Liu, Shan-shan Tian, Zhi-qiang Huang, Jiang-wei Liu (pp. 31-44).
- Multilevel Decentralized Protection Scheme Based on Moving Targets, Mikhail Styugin and Nikolay Parotkin (pp. 45-54).
- Study on a Dynamic E-business Application Framework Based on Web Service-Based SOA, Xueqiang Yin (pp. 55-64).
- Implementation about Thread and Internet-based Motion Receiving Imitation Controller for Humanoid, Hee-Jung Byun and Su Goog Shon (pp. 65-74).
- An Anomaly Detection Framework for Detecting Anomalous Virtual Machines under Cloud Computing Environment, GuiPing Wang and JiaWei Wang (pp. 75-86).
- Schema Theorem Based on Probability for Multigenic Chromosomes Genes Expression Programming, Huifang Cheng, Jianli Zhao and Haitao Wang (pp. 87-94).
- A Combined Model of Clustering and Classification Methods for Preserving Privacy in Social Networks against Inference and Neighborhood Attacks, Ali Zaghian and Ayoub Bagheri (pp. 95-102).
- Security Analysis of Speech Perceptual Hashing Authentication Algorithm, Zhang Qiu-yu, Ren Zhan-wei, Xing Peng-fei, Huang Yi-bo and Yu Shuang (pp. 103-118).
- A Novel Iris Authentication Using ECDSA, Srinivasan Nagaraj and G. S. V. P. Raju (pp. 119-124).
- Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xueming Zhang, Guangwei Wang and Fang Xu (pp. 125-138).
- Research on New Multi-Feature Large-Scale Image Retrieval Algorithm based on Semantic Parsing and Modified Kernel Clustering Method, Tiejun Wang, Weilan Wang (pp. 139-154).
- New Secure Load Sharing Algorithm in Network Layer, Mouhcine Chliah, Ghizlane Orhanou and Said El Hajji (pp. 155-166).
- Fixture Design for Automobile Oil Receiving Tray Reaming and Milling, Hu Hong and Cui Yaxin (pp. 167-172).
- Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System, Munna Kumar, Bimal Kumar Mishra and T. C. Panda (pp. 173-190).
- The Design of WLAN Wireless Access Protocol based on Certified NFC, Jinjin Pan, Yun Li, Zhigang Jin and Xunjun Wang (pp. 191-202).
- A Zero-Watermark Scheme for Identification Photos based on QR Code and Visual Cryptography, De Li, Zhe Liu and LiHua Cui (pp. 203-214).
- Some Clustering-Based Methodology Applications to Anomaly Intrusion Detection Systems, Veselina Jecheva and Evgeniya Nikolova (pp. 215-228).
- Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme, Zhang Qiu-yu, Ren Zhan-wei, Huang Yi-bo, Yu Shuang and Hu Wen-jin (pp. 229-240).
- Information Concealing Based on Outer P-sets, Tan Xiao-dong and Ruan Qun-sheng (pp. 241-246).
- Phishing Attacks and Defenses, Junaid Ahsenali Chaudhry, Shafique Ahmad Chaudhry, Robert G. Rittenhouse (pp. 247-256).
- Research on Immunity to Electric Impulsive Interference of ZPW-2000 Track Circuit in Station, Xiaochun Wu and Guoqing Li (pp. 257-264).
- Non-interactive Security Framework for Mobile Device based Academic Monitoring System, B. Muthusenthil, C. Vijayakumaran, Hyunsung Kim (pp. 265-276).
- Robustness and Security of Router-level Internet and Complex Networks Examples under Hybrid Networks Attacks, Xu Ye, Shen Yang, Wang Zhuo (pp. 277-286).
- A Lighweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks, Huaqiang Xu, Rui Wang and Zhiping Jia (pp. 287-302).
- A Robust Watermarking Scheme for City Image, Ruichen Jin and Jongweon Kim(pp. 303-314).
- An Enhanced Biometric-Based Three Factors User Authentication Scheme for Multi-server Environments, Youping Lin, Kaihui Wang, Baocan Zhang, Yuzhen Liu, Xiong Li(pp. 315-328).
- A New Low Complexity NLOS Identification Approach Based on Minimum Slope and Kurtosis of Energy Block for 60 GHz System, Xiaolin Liang, Hao Zhang, Tingting Lv, T. Aaron. Gulliver(pp. 329-342).
- An Improved Kernel Clustering Algorithm for Mixed-Type Data in Network Forensic, Min Ren, Peiyu Liu, Zhihao Wang, Lin Lü (pp. 343-354).
- Distinguishing Attack on CPB-Based Cipher COSB-128, Tran Song Dat Phuc, Changhoon Lee(pp. 355-360).
- Eye Region Activity State based Face Liveness Detection System, Xu Guang Zhu, Yin Pan Long, Lei Bang Jun, Zou YaoBin, Yang Ji Quan(pp. 361-374).
- Research on Life Prediction of Train Control Center Based on Random and Fuzzy Theoryr, Xiao Chun Wu and Jian Wu(pp. 375-384).
- Improving Distributed Forensics and Incident Response in Loosely Controlled Networked Environments, Veselina Jecheva and Evgeniya Nikolova (pp. 385-414).
- Oriented User Group Verifiable Attribute-Based Encryption Scheme, Xueyan Liu and Zhanming Li (pp. 415-426).
- The Design for Heat Flux Sensor of High Transient and Large Range in the Explosion Field, Guo Yu-yan, KongDe-ren and Chen Jing (pp. 427-436).
- Copyright Management for Mix Music, Jeongseok Jo and Jongweon Ki (pp. 437-448).
- A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent, Jian Zhang, Li Yang and Haode Liao (pp. 449-460).