2016
2016
Volume 10, Number 11, 2016 November
-
- Network Intrusion Detection Model based on Combination of Fisher Score and ELM Approach, Hong Mei, Wang Ju, Qi Yao Wu and Zhai Ning (pp. 1-12).
- Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management Scheme, Reza Khalilian, Abdalhossein Rezai and Farhad Mesrinejad (pp. 13-22).
- Research on Network Defense Graph Model in Network Security, Feng Qiand Haili Xu, (pp. 23-32).
- Color Image Blind Watermarking Algorithm Based on QR Decomposition and Voting in DWT Domain, Junxiang Wang, Ying Liu and Yonghong Zhu (pp. 33-46).
- Microscopic Analysis of Chips, Dominik Malcik, Martin Drahansky (pp. 47-66).
- A Fingerprint Feature Extraction Algorithm based on Optimal Decision for Text Copy Detection, Guohua Wu, Mengmeng Zhao, Lin Han, Sen Li (pp. 67-78).
- An User Authentication Scheme Based on the ECC and OpenID Techniques in the Internet of Things, Jong J. Lee and Ki Young Lee (pp. 79-88).
- Pricing Strategy of Dual Channel Supply Chain under Asymmetric Information, Zhou Yongwei and Fan Hehua (pp. 89-98).
- A Network Security Scanning System for Mobile Internet Based on Android, Guanlin Chen, Lidong Zhang (pp. 99-108).
- Design of New Pseudo-Random Number Generator Based on Non-Uniform Cellular Automata, Charifa Hanin, Fouzia Omary, Souad Elbernoussi and Bouchra Boulahiat (pp. 109-118).
- Internet Immunization Strategy based on Relations of Nodes, Fan Tongrang, Qin Wanting, Zhao Wenbin, Wang Qian, Yu Tao (pp. 119-130).
- A Novel Intrusion Detection Approach Based on Chaos Theory in Wireless Sensor Networks, Xinling Kong, Yonghong Chen, HuiTian, Tian Wang, Yiqiao Cai (pp. 131-142).
- The Antecedent and Consequence of Trust in Social Shopping, Haengnam Sung, Won-Jong Kim, Jae-Ik Shin (pp. 143-152).
- Multi-dimensional Network Security Situation Assessment, Lina Zhu, Guoen Xia, Zuochang Zhang, Jianhua Li and Renjie Zhou (pp. 153-164).
- Approach of HeDSS (Health-care Decision Support System) using Context-aware Technique, You-Jin Song, Jin-Mook Kim (pp. 165-174).
- Research on Fault Prognostics and Health Management of the On-Board Equipment Of CTCS-3 Train Control System, Xuejie Jiang and Guoning Li (pp. 175-186).
- Blacklisting and Forgiving Coarse-grained Access Control for Cloud Computing, Yan Zhu and Khaled Riad (pp. 187-200).
- Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks, Kyong Jin Kim and Seng Phil Hong (pp. 201-210).
- PV2JAVA: Automatic Generator of Security Protocol Implementations Written in Java Language from the Applied PI Calculus Proved in the Symbolic Model, Bo Meng, Yitong Yang, Jinli Zhang, Jintian Lu and Dejun Wang (pp. 211-228).
- FSSPCM: Fuzzy Publication of Data for Privacy Preserving, Yan Yan, Xiaohong Hao and Wanjun Wang (pp. 229-248).
- Periodic Virtual Hierarchy: A Trust Model for Smart Grid Devices, Arezou Moussavi-Khalkhali, Ram Krishnan, Mo Jamshidi (pp. 249-266).
- Research on the Defense Method of Vtable Hijacking, Wang Zixiang, Shan Chun, Xue Jingfeng and Sun Shiyouhu Changzhen (pp. 268-280).
- Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding, Wei Pan, Yang Zhou and Qingpu Zhang (pp. 281-292).
- Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems, Ki Hoon Kim, Jung ho Eom (pp. 293-302).
- Research on an Improved Intrusion Detection Algorithm, Yue Liu and Mei-shan Li (pp. 303-316).
- Research on Optimal Attack and Defense Decision of Network Security Based on Fuzzy Neural Network, Ye Ru-jun (pp. 317-324).