2016
2016
Volume 10, Number 3, 2016 March
-
- Landing Risk Evaluation of Carrier-Based Aircraft Based on Mean-Variance Statistics Error Multi-Attribute Dynamic Decision Making, Li Hui(pp. 1-10).
- Improving Korea’s Societal Security by Preparing for Unforeseen Disasters: Focused on the Horizontal Collaboration Approach, Younhee Kim, Hakkyong Kim (pp. 11-20).
- Extracting Clone Genealogies for Tracking Code Clone Changes, Chun-Hui Wang, Ying Tu, Li-Ping Zhang, Dong-Sheng Liu (pp. 21-28).
- Secure Signature Authentication Algorithm in Mobile Internet, Hua Lin Sun (pp. 29-40).
- Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique, G. Keerthana, G. Padmavathi (pp. 41-54).
- A secure Certificateless Aggregate Signature Scheme, Baoyuan Kang and Danhui Xu (pp. 55-68, 06).
- Research on the Relationship of Optical Illusion Deceleration Marking and Changing Rate of Pupil, Ting Shang, Boming Tang and Panpan Tao (pp. 69-80).
- Face Recognition Using Neural Network: A Review, Manisha M. Kasar, Debnath Bhattacharyya and Tai-hoon Kim (pp. 81-100).
- Moving Object Detection and Identification Method Based on Vision, Tao Jian-Ping, Lv Xiao-lan and Liu Jun (pp. 101-110).
- Holistic Performance Model for Cyber Security Implementation Frameworks, Issa Atoum and Ahmed Otoom (pp. 111-120).
- Bagging eEP-based Classifiers for Junk Mail Classification, Yan Li and Hua Zhou (pp. 121-128).
- A Systematic Review of Network Flow Watermarking In Anonymity Systems, Tianbo Lu, Rui Guo, Lingling Zhao and Yang Li (pp. 129-138).
- A Secure Score Report Implemented in a Spreadsheet without Privacy Concerns, Dongchang Yoo, Minyoung Bae and Yongjin Yeom (pp. 139-150).
- Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance, Wang Guangze, Wang Peng, Luo Zhiyong and Zhu Suxia (pp. 151-160).
- A Light Weight Security Scheme for Network Coding Based on a Mobius Transformation, M. H. Tadayon (pp. 161-172).
- Application of BP Neural Network Model based on Particle Swarm Optimization in Enterprise Network Information Security, Shumei Liu (pp. 173-182).
- Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph, Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia (pp. 183-192).
- A Provably-Anonymous Authentication Scheme for Roaming Services, Junghyun Nam, Kim-Kwang Raymond Choo and Juryon Paik (pp. 193-204).
- Color Digital Image Encryption Technology and Software Implementation based on Chaotic Map, Pei Wang (pp. 205-214).
- Research on User Identification Algorithm based on Rewriting URL, Zhou Jiadi and Geng Hai (pp. 215-222).
- Android Permissions Management at App Installing, Sujit Biswas, Wang Haipeng and Javed Rashid (pp. 223-232).
- Food Supply Chain Safety Risk Evaluation Based on AHP Fuzzy Integrated Evaluation Method, Wang Xiaoping (pp. 233-244).
- Overview of Risk Management System of Commercial Bank Data Center, Zheng Li, Shanlin Yang and Zhenyao Lis (pp. 245-258).
- Critical Analysis of Steganography “An Art of Hidden Writing”, Aqsa Rashid, Muhammad Khurrum Rahim (pp. 259-282).
- Slope Stability Analysis of Open Pit Mine Based on AHP and Entropy Weight Method, Hongsen Luo, Yong He, Guohui Li and Ji Li (pp. 283-294).
- Novel Digital Signature Schemes based on Factoring and Discrete Logarithms, Shin-Yan Chiou (pp. 295-310).
- Research on Stability of Strategic Alliance in Heilongjiang Soybean Processing Industry: an Empirical Study based on AHP and FCE Method, Xiaomei Zhang, Na Liu and Yang Wang (pp. 311-320).
- Overflow Mechanism and Demonstration of Knowledge Flow on Enterprise Endogenous Innovation by the Three-Dimensional Space: Based on the Open Innovation Perspective, Min Yang, Jingxian Wang (pp. 321-332).
- Study on the Organizational Structure of Rural Land Stock Cooperative System based on Game Theory and Network Data, Liang Xiao (pp. 333-344).
- Performance Analysis of LSB Based Watermarking for Optimization of PSNR and MSE, Sehra Jindal, Shreya Goel, Tanya Puri, Asheesh Bhardwaj, Ishan Mahant, Sartaj Singh, Dhairya Sood (pp. 345-350).
- Empirical Research on Relationship between Entrepreneurial Resource, Strategy and Performance under Different Environment, Shaozhong Yu and Le Zhang (pp. 351-368).
- RFID Bi-Directional Authentication Protocol Based on Dynamic Coupled Integer Tent Map, Liu Jiandong, Zhang Xiao, Wang Yequan, Shang Kai (pp. 369-382).
- A Random PRESENT Encryption Algorithm Based on Dynamic S-box, Zhiying Tang, Jie Cui, Hong Zhong, Mingyong Yu (pp. 383-392, 33).
- Study on Dynamic Guidance Obstacle Avoidance of UAV based on the Minimum Angle Shift, Xiong Zhiyong, Yang Xiuxia, Zhang Yi, Hua Wei, Liu Xiaowei (pp. 393-404).
- A Survey on Wireless Mesh Networks and its Security Issues, R. Regan and J. Martin Leo Manickam (pp. 405-418).
- Modeling the Spread of Computer Viruses under the Effects of Infected External Computers and Removable Storage Media, Xulong Zhang (pp. 419-428).
- SVDD-Based Financial Fraud Detection Method through Respective Learnings of Normal/Abnormal Behaviors, Mun-Kweon Jeong, Seong-Ho An and Kihyo Nam (pp. 429-438).
- A Novel Method of Searching Primitive Roots Modulo Fermat Prime Numbers, Dalei Zhang and Hong Zhong (pp. 439-448).
- Research on Computer Network Virus Defense Technology in Cloud Technology Environment, Zhao Sheng, Han Hui Shan, Shi Xue Kui (pp. 449-460).