Skip to content
NADIA

IJSIA Vol. 10, No. 4, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 4, 2016 April
    • Risk Assessment of Computer Network Security in Banks, Tan Juan (pp. 1-10).
    • National Security in America: Over-Abundance of Caution & Lack of Practicality, James Pattison, Hakkyong Kim, Sungyong Lee (pp. 11-20).
    • The Risk Assessment Method based on Multi-Attribute Fuzzy Decision-Making in the Application of the Internal Control, Jiamin Fang (pp. 21-32).
    • An Efficient and Robust Data Integrity Verification Algorithm Based on Context Sensitive, Feng Xie, Hu Chen (pp. 33-40).
    • Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment, Udhayakumar Shanmugam and Latha Tamilselvan (pp. 41-50).
    • Real-time Network Attack Intention Recognition Algorithm, Qiu Hui, Wang Kun (pp. 51-62).
    • Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks, Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai (pp. 63-70).
    • A Mixed TS-ISA Algorithm for Reliability Redundancy Optimization Problem, Zhu Haiying, Liu Yubao (pp. 71-78).
    • Differential Privacy via Weighted Sampling Set Cover, Zhonglian Hu, Zhaobin Liu, Yangyang Xu, Zhiyang Li (pp. 79-88).
    • Face Detection using Image Morphology – A Review, Venkata Naresh Mandhala, Debnath Bhattacharyya, Tai-hoon Kim (pp. 89-94).
    • An Analysis of Active Attacks on Anonymity Systems, Tianbo Lu, Pan Gao, Xiaofeng Du, Yang Li (pp. 95-104).
    • HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks, Zeyu Sun, Xiaohui Ji, Yuanbo Li (pp. 105-116).
    • Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment, Hind Idrissi, Arnaud Revel, El Mamoun Souidi (pp. 117-134).
    • Research and Analysis on Network Security Modeling, Kehao Cao (pp. 135-142).
    • Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process, Shafiq Ul Rehman and Selvakumar Manickam (pp. 143-154).
    • Fault-tolerant Mechanism for Cloud Storage System with Integrity Verification Mechanism, Liu Hong qing, Huang Yan (pp. 155-166).
    • An Integrity Protection Model based on Trusted Recovery Technology, Xiaojie Xu, Lisheng Wang (pp. 167-178).
    • Quality Evaluation of Image Steganography Techniques: A Heuristics based Approach, Ratnakirti Roy, Suvamoy Changder (pp. 179-196).
    • The Research on the Network Public Opinion Risk Assessment based on the CWAHP-Entropy Method, Chai Wenlei and Cheng Mao (pp. 197-208).
    • A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis, Cong-huan Ye, Zeng-gang Xiong, Yao-ming Ding,Xueming Zhang, Guangwei Wang and Fang Xu (pp. 209-220).
    • Effective Belief Network for Cyber Security Frameworks, Issa Atoum and Ahmed Otoom (pp. 221-228).
    • Anonymous Routing Protocols for Mobile Ad-Hoc Networks, Tianbo Lu, Hao Chen, Lingling Zhao and Yang Li (pp. 229-240).
    • Network Intrusion Prediction Model based on RBF Features Classification, Wang Xing-zhu (pp. 241-248).
    • An Effective Approach for Classification of Advanced Malware with High Accuracy, Ashu Sharma and Sanjay K. Sahay (pp. 249-266).
    • A Parallel Algorithm of Multiple String Matching Based on Set-Partition in Multi-core Architecture, Jiahui Liu, Fangzhou Li and Guanglu Suns (pp. 267-278).
    • Secure Multimedia Content Distribution for M2M Communication, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu (pp. 279-288).
    • Trust System Architecture for Securing GOOSE Communication in IEC 61850 Substation Network, Muhammad Talha Abdul Rashid, Salman Yussof and Yunus Yusoff (pp. 2889-302).
    • Efficient Certificateless Signcryption from Bilinear Pairings, Hongzhen Du (pp. 303-316).
    • A Novel Image Change Detection Model and Optimization Algorithm based on Game Theory under the Bounded Rationality Conditions, Ning Wu, Harry Scott (pp. 317-330).
    • Bag of Words Based Surveillance System Using Support Vector Machines, Nadhir Ben Halima, Osama Hosam (pp. 331-346).
    • Trusted Quantum Botnet Research based on Dual-Chord Protocol, Wang Xin-Liang, Fu Meng-Meng (pp. 347-354).
    • Research on the Performance Evaluation System of Public Cultural Service based on Web Survey: A Government Perspective, Yingjun Han and Rui Sun (pp. 355-366).
    • Implementation of New Method to Generate a Key in Automatic Variable Key for Perfect Security, Moumita Das, Rajat Subhra Goswami, Chandan Tilak Bhunia (pp. 367-376).
    • Research on the Enterprise Performance Management Information System Development and Robustness Optimization based on Data Regression Analysis and Mathematical Optimization Theory, Lei Liu, Hua Yang (pp. 377-390).
    • Data Security Transmission Mechanism in Industrial Networked Control Systems against Deception Attack, Zulan Deng, Lun Xie, Yu Rong, Weize Li, Liangchen Jin (pp. 391-404).
    • Security, Vulnerability and Protection of Vehicular On-board Diagnostics, Aastha Yadav, Gaurav Bose, Radhika Bhange, Karan Kapoor, N.Ch.S.N Iyengar, Ronnie D. Caytiles (pp. 405-422).
    • Application of Improved BP Neural Network with Correlation Rules in Network Intrusion Detection, Yongfeng Cui, Xiangqian Li Ma and Zhijie Liu (pp. 423-430).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA