2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2016 2016 Volume 10, Number 1, 2016 January Improving Wireless Security for Cooperation of Untrusted Secondary Transmitters, Yayan Ma, Baoyun Wang (pp. 1-12). A Study on the Big Data Log Analysis for Security, Kyung-Sik Jeon, Se-Jeong Park, Sam-Hyun Chun and Jong-Bae Kim (pp. 13-20). Performance evaluation of Collaborative Learning and E-commerce Security: Comprehensive Ability of China’s PE Teachers to Use Computer, Zhang Yan, Wei Dongyi, Liu Yichong, Long Xiaodong and Tao Ganchen (pp. 21-30). Email Spam Filtering Based on the MNMF Algorithm, Zun-xiong Liu, Shan-shan Tian, Zhi-qiang Huang, Jiang-wei Liu (pp. 31-44). Multilevel Decentralized Protection Scheme Based on Moving Targets, Mikhail Styugin and Nikolay Parotkin (pp. 45-54). Study on a Dynamic E-business Application Framework Based on Web Service-Based SOA, Xueqiang Yin (pp. 55-64). Implementation about Thread and Internet-based Motion Receiving Imitation Controller for Humanoid, Hee-Jung Byun and Su Goog Shon (pp. 65-74). An Anomaly Detection Framework for Detecting Anomalous Virtual Machines under Cloud Computing Environment, GuiPing Wang and JiaWei Wang (pp. 75-86). Schema Theorem Based on Probability for Multigenic Chromosomes Genes Expression Programming, Huifang Cheng, Jianli Zhao and Haitao Wang (pp. 87-94). A Combined Model of Clustering and Classification Methods for Preserving Privacy in Social Networks against Inference and Neighborhood Attacks, Ali Zaghian and Ayoub Bagheri (pp. 95-102). Security Analysis of Speech Perceptual Hashing Authentication Algorithm, Zhang Qiu-yu, Ren Zhan-wei, Xing Peng-fei, Huang Yi-bo and Yu Shuang (pp. 103-118). A Novel Iris Authentication Using ECDSA, Srinivasan Nagaraj and G. S. V. P. Raju (pp. 119-124). Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xueming Zhang, Guangwei Wang and Fang Xu (pp. 125-138). Research on New Multi-Feature Large-Scale Image Retrieval Algorithm based on Semantic Parsing and Modified Kernel Clustering Method, Tiejun Wang, Weilan Wang (pp. 139-154). New Secure Load Sharing Algorithm in Network Layer, Mouhcine Chliah, Ghizlane Orhanou and Said El Hajji (pp. 155-166). Fixture Design for Automobile Oil Receiving Tray Reaming and Milling, Hu Hong and Cui Yaxin (pp. 167-172). Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System, Munna Kumar, Bimal Kumar Mishra and T. C. Panda (pp. 173-190). The Design of WLAN Wireless Access Protocol based on Certified NFC, Jinjin Pan, Yun Li, Zhigang Jin and Xunjun Wang (pp. 191-202). A Zero-Watermark Scheme for Identification Photos based on QR Code and Visual Cryptography, De Li, Zhe Liu and LiHua Cui (pp. 203-214). Some Clustering-Based Methodology Applications to Anomaly Intrusion Detection Systems, Veselina Jecheva and Evgeniya Nikolova (pp. 215-228). Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme, Zhang Qiu-yu, Ren Zhan-wei, Huang Yi-bo, Yu Shuang and Hu Wen-jin (pp. 229-240). Information Concealing Based on Outer P-sets, Tan Xiao-dong and Ruan Qun-sheng (pp. 241-246). Phishing Attacks and Defenses, Junaid Ahsenali Chaudhry, Shafique Ahmad Chaudhry, Robert G. Rittenhouse (pp. 247-256). Research on Immunity to Electric Impulsive Interference of ZPW-2000 Track Circuit in Station, Xiaochun Wu and Guoqing Li (pp. 257-264). Non-interactive Security Framework for Mobile Device based Academic Monitoring System, B. Muthusenthil, C. Vijayakumaran, Hyunsung Kim (pp. 265-276). Robustness and Security of Router-level Internet and Complex Networks Examples under Hybrid Networks Attacks, Xu Ye, Shen Yang, Wang Zhuo (pp. 277-286). A Lighweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks, Huaqiang Xu, Rui Wang and Zhiping Jia (pp. 287-302). A Robust Watermarking Scheme for City Image, Ruichen Jin and Jongweon Kim(pp. 303-314). An Enhanced Biometric-Based Three Factors User Authentication Scheme for Multi-server Environments, Youping Lin, Kaihui Wang, Baocan Zhang, Yuzhen Liu, Xiong Li(pp. 315-328). A New Low Complexity NLOS Identification Approach Based on Minimum Slope and Kurtosis of Energy Block for 60 GHz System, Xiaolin Liang, Hao Zhang, Tingting Lv, T. Aaron. Gulliver(pp. 329-342). An Improved Kernel Clustering Algorithm for Mixed-Type Data in Network Forensic, Min Ren, Peiyu Liu, Zhihao Wang, Lin Lü (pp. 343-354). Distinguishing Attack on CPB-Based Cipher COSB-128, Tran Song Dat Phuc, Changhoon Lee(pp. 355-360). Eye Region Activity State based Face Liveness Detection System, Xu Guang Zhu, Yin Pan Long, Lei Bang Jun, Zou YaoBin, Yang Ji Quan(pp. 361-374). Research on Life Prediction of Train Control Center Based on Random and Fuzzy Theoryr, Xiao Chun Wu and Jian Wu(pp. 375-384). Improving Distributed Forensics and Incident Response in Loosely Controlled Networked Environments, Veselina Jecheva and Evgeniya Nikolova (pp. 385-414). Oriented User Group Verifiable Attribute-Based Encryption Scheme, Xueyan Liu and Zhanming Li (pp. 415-426). The Design for Heat Flux Sensor of High Transient and Large Range in the Explosion Field, Guo Yu-yan, KongDe-ren and Chen Jing (pp. 427-436). Copyright Management for Mix Music, Jeongseok Jo and Jongweon Ki (pp. 437-448). A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent, Jian Zhang, Li Yang and Haode Liao (pp. 449-460).