2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2016 2016 Volume 10, Number 3, 2016 March Landing Risk Evaluation of Carrier-Based Aircraft Based on Mean-Variance Statistics Error Multi-Attribute Dynamic Decision Making, Li Hui(pp. 1-10). Improving Korea’s Societal Security by Preparing for Unforeseen Disasters: Focused on the Horizontal Collaboration Approach, Younhee Kim, Hakkyong Kim (pp. 11-20). Extracting Clone Genealogies for Tracking Code Clone Changes, Chun-Hui Wang, Ying Tu, Li-Ping Zhang, Dong-Sheng Liu (pp. 21-28). Secure Signature Authentication Algorithm in Mobile Internet, Hua Lin Sun (pp. 29-40). Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique, G. Keerthana, G. Padmavathi (pp. 41-54). A secure Certificateless Aggregate Signature Scheme, Baoyuan Kang and Danhui Xu (pp. 55-68, 06). Research on the Relationship of Optical Illusion Deceleration Marking and Changing Rate of Pupil, Ting Shang, Boming Tang and Panpan Tao (pp. 69-80). Face Recognition Using Neural Network: A Review, Manisha M. Kasar, Debnath Bhattacharyya and Tai-hoon Kim (pp. 81-100). Moving Object Detection and Identification Method Based on Vision, Tao Jian-Ping, Lv Xiao-lan and Liu Jun (pp. 101-110). Holistic Performance Model for Cyber Security Implementation Frameworks, Issa Atoum and Ahmed Otoom (pp. 111-120). Bagging eEP-based Classifiers for Junk Mail Classification, Yan Li and Hua Zhou (pp. 121-128). A Systematic Review of Network Flow Watermarking In Anonymity Systems, Tianbo Lu, Rui Guo, Lingling Zhao and Yang Li (pp. 129-138). A Secure Score Report Implemented in a Spreadsheet without Privacy Concerns, Dongchang Yoo, Minyoung Bae and Yongjin Yeom (pp. 139-150). Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance, Wang Guangze, Wang Peng, Luo Zhiyong and Zhu Suxia (pp. 151-160). A Light Weight Security Scheme for Network Coding Based on a Mobius Transformation, M. H. Tadayon (pp. 161-172). Application of BP Neural Network Model based on Particle Swarm Optimization in Enterprise Network Information Security, Shumei Liu (pp. 173-182). Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph, Wang Guangze, Wang Peng, Luo Zhiyong, Zhu Suxia (pp. 183-192). A Provably-Anonymous Authentication Scheme for Roaming Services, Junghyun Nam, Kim-Kwang Raymond Choo and Juryon Paik (pp. 193-204). Color Digital Image Encryption Technology and Software Implementation based on Chaotic Map, Pei Wang (pp. 205-214). Research on User Identification Algorithm based on Rewriting URL, Zhou Jiadi and Geng Hai (pp. 215-222). Android Permissions Management at App Installing, Sujit Biswas, Wang Haipeng and Javed Rashid (pp. 223-232). Food Supply Chain Safety Risk Evaluation Based on AHP Fuzzy Integrated Evaluation Method, Wang Xiaoping (pp. 233-244). Overview of Risk Management System of Commercial Bank Data Center, Zheng Li, Shanlin Yang and Zhenyao Lis (pp. 245-258). Critical Analysis of Steganography “An Art of Hidden Writing”, Aqsa Rashid, Muhammad Khurrum Rahim (pp. 259-282). Slope Stability Analysis of Open Pit Mine Based on AHP and Entropy Weight Method, Hongsen Luo, Yong He, Guohui Li and Ji Li (pp. 283-294). Novel Digital Signature Schemes based on Factoring and Discrete Logarithms, Shin-Yan Chiou (pp. 295-310). Research on Stability of Strategic Alliance in Heilongjiang Soybean Processing Industry: an Empirical Study based on AHP and FCE Method, Xiaomei Zhang, Na Liu and Yang Wang (pp. 311-320). Overflow Mechanism and Demonstration of Knowledge Flow on Enterprise Endogenous Innovation by the Three-Dimensional Space: Based on the Open Innovation Perspective, Min Yang, Jingxian Wang (pp. 321-332). Study on the Organizational Structure of Rural Land Stock Cooperative System based on Game Theory and Network Data, Liang Xiao (pp. 333-344). Performance Analysis of LSB Based Watermarking for Optimization of PSNR and MSE, Sehra Jindal, Shreya Goel, Tanya Puri, Asheesh Bhardwaj, Ishan Mahant, Sartaj Singh, Dhairya Sood (pp. 345-350). Empirical Research on Relationship between Entrepreneurial Resource, Strategy and Performance under Different Environment, Shaozhong Yu and Le Zhang (pp. 351-368). RFID Bi-Directional Authentication Protocol Based on Dynamic Coupled Integer Tent Map, Liu Jiandong, Zhang Xiao, Wang Yequan, Shang Kai (pp. 369-382). A Random PRESENT Encryption Algorithm Based on Dynamic S-box, Zhiying Tang, Jie Cui, Hong Zhong, Mingyong Yu (pp. 383-392, 33). Study on Dynamic Guidance Obstacle Avoidance of UAV based on the Minimum Angle Shift, Xiong Zhiyong, Yang Xiuxia, Zhang Yi, Hua Wei, Liu Xiaowei (pp. 393-404). A Survey on Wireless Mesh Networks and its Security Issues, R. Regan and J. Martin Leo Manickam (pp. 405-418). Modeling the Spread of Computer Viruses under the Effects of Infected External Computers and Removable Storage Media, Xulong Zhang (pp. 419-428). SVDD-Based Financial Fraud Detection Method through Respective Learnings of Normal/Abnormal Behaviors, Mun-Kweon Jeong, Seong-Ho An and Kihyo Nam (pp. 429-438). A Novel Method of Searching Primitive Roots Modulo Fermat Prime Numbers, Dalei Zhang and Hong Zhong (pp. 439-448). Research on Computer Network Virus Defense Technology in Cloud Technology Environment, Zhao Sheng, Han Hui Shan, Shi Xue Kui (pp. 449-460).