2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2016 2016 Volume 10, Number 2, 2016 February Improved Bat Algorithm for Reliability-Redundancy Allocation Problems, Yubao Liu (pp. 1-12). Security Threats on Mobile Devices and their Effects: Estimations for the Future, Murat Yesilyurt, Yildiray Yalman (pp. 13-26). Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments, Xiao Jinke (pp. 27-38). Combination Weighting Method Based on Maximizing Deviations and Normalized Constraint Condition, Fulian Yin, Lu Lu, Jianping Chai and Yanbing Yang (pp. 39-51). A View on LSB Based Audio Steganography, Ratul Chowdhury, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Tai-hoon Kim (pp. 51-62). Vehicle Scheduling Optimization Based on Chaos Ant Colony Algorithm in Emergency Rescue, Lingxia Liu, Xuexia Gao and Qiang Song (pp. 63-74). Improvement Framework of Korean Certification System for Cloud Service Focus on Security, Hangoo Jeon, Young-Gi Min and Kwang-Kyu Seo (pp. 75-84). Research on the Strategy of Role Management Based on Grid Environment, Yi He Liu, Yu Ping Qin, Shuang Zhang (pp. 95-94). Research on Ant Colony Algorithm Optimization Neural Network Weights Blind Equalization Algorithm, Yanxiang Geng, Liyi Zhang, Yunshan Sun, Yao Zhang, Nan Yang and Jiawei Wu (pp. 95-104). Application of Audio Watermarking Procedures for Mix Music, Youngseok Lee, Jongweon Kim (pp. 105-114). The Lightweight Ownership Transfer Protocol using Physically Unclonable Function, Xuejun Zhang, Wanlu Huang, He Xu and Yu Wang (pp. 115-128). Multi-sensor Information Fusion Steady-State Kalman Estimator for Systems with System Errors and Sensor Errors, Yun Li, Ming Zhao, Gang Hao (pp. 129-140). Security Enhancement Scheme supporting range queries on encrypted DB for Secure e-Navigation Era, Donghyeok Lee and Namje Park (pp. 141-150). The Improvement of the Design Standard of Overloaded Highway, Dou Yuanming, Zhang Jingjing and Hu Chao (pp. 151-162). Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme, Tao Wan, Nan Jiang, Jianfeng Ma, Lin Yang (pp. 163-170). On the Deployment of Citizens’ Privacy Preserving Collective Intelligent eBusiness Models in Smart Cities, Artemis Avgerou, Panayotis E. Nastou, Dimitra Nastouli, Panos M. Pardalos and Yannis C. Stamatiou (pp. 171-184). Dynamic Assessment of Business Performance in Green Supply Chain based on Analytic Hierarchy Process Method, Xueling Nie (pp. 185-196). Evaluating Teaching Quality in Higher Education: Analytical Modelling and Computerized Implementation, Jingyun Zheng (pp. 197-204). A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map, Shouvik Chakraborty, Arindrajit Seal, Mousomi Roy, Kalyani Mali (pp. 205-216). Effective and Secure Access Control for Multi-Authority Cloud Storage Systems, Lin Xin, Xingming Sun, Zhangjie Fu, Liang-Ao Zhang and Jie Xi (pp. 217-236). Network Traffic Classification using Genetic Algorithms based on Support Vector Machine, Jie Cao, Zhiyi Fang (pp. 237-246). User Action-based Financial Fraud Detection Method by SVDD, Seong-Ho An, Kihyo Nam, Mun-Kweon Jeong, Yong-Rak Choi (pp. 247-254). Study on Multimedia Teaching and the Reform of College Physical Education: Evaluation of Teaching Effect, Lifeng Xu (pp. 255-266). Effects of Salt Water Drip Irrigation on Jujube Roots Soil Available Nitrogen Distribution: A Security Assurance Perspective, Xingpeng Wang, Tiecheng Bai, Jinhu Zhi and Zhaoyang Li (pp. 267-278). A Study to Examine the Superiority of CSAVK, AVK over Conventional Encryption with a Single Key, Rajat S Goswami, Swarnendu K Chakraborty, Chandan T Bhunia (pp. 279-286). An Electronic Cash System Based on Certificateless Group Signature, Liang Yan, Zhang Xiao and Zheng Zhi-ming (pp. 287-300). Cryptographic Protocols for Secure Cloud Computing, S. A. Alhumrani and Jayaprakash Kar (pp. 301-310). Research on the Security Enhanced Smart Hardware Assisted Regression Analysis and Health Monitoring Technique based Expanded Training Exercise Effect Evaluation Model, Kejin Shi (pp. 311-324). An Improved Event Scenario Correlation Method for Multi-Source Security Log, Qianyun Wang, Shuyu Chen, Hancui Zhang and Tianshu Wu (pp. 325-340). AL-Museelem Waleed, Li Chunlin, “User Privacy and Security in Cloud Computing”,(pp. 341-352). Novel Quantum-Inspired Co-evolutionary Algorithm, Ming Shao, Liang Zhou (pp. 353-364). An Extension Approach for Threat Detection and Defense of Software-Defined Networking, Hui Xu, Chunzhi Wang and Hongwei Chen (pp. 365-374). Network Security in Embedded System Using TLS, Vivek Negi, Himanshu Verma, Ipsita Singh, Aditya Vikram, Kanika Malik, Archana Singh, Gaurav Verma (pp. 375-384). Smartly Time of Arrival Interpretation in the Wide Band Ranging System, Xiaolin Liang, Hao Zhang, Tingting Lv, T. Aaron Gulliver (pp. 385-410). A Hybrid Key Establishment Scheme for Wireless Sensor Networks, Jianmin Zhang, Qingmin Cui, Rui Yang (pp. 411-422). Secure Linear Feedback Shift Register based IPv6 in VANET, Abhishek singh, Shekhar Verma and Geetam Singh Tomar (pp. 423-436). A Novel Intelligent Recommendation Algorithm based on Web Data Mining Technique under the Background of Deep Neural Network, Changchun Yang, Jun Wang, Min Yuan, Chenyang Lei (pp. 432-450).