Skip to content
NADIA

IJSIA Vol. 10, No. 5, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 5, 2016 May
    • A Novel Information Fusion Model for Assessment of Malware Threat, Chao Dai, Jianmin Pang, Xiaochuan Zhang, Guanghui Liang and Hong Bai (pp. 1-16).
    • Achieving Secure Deduplication by Using Private Cloud and Public Cloud, Guljar P. Shaikh, S. D. Chaudhary, Priyanka Paygude, Debnath Bhattacharyya (pp. 17-26).
    • Improving Unconstrained Iris Recognition Performance via Domain Adaptation Metric Learning Method, Yan Fei, Zhou Changjiu, and Tian Yantao (pp. 27-40).
    • On Privacy and Anonymity in Freenet System, Tianbo Lu, Zhimin Lin, Lingling Zhao, Yang Li (pp. 41-56).
    • Use of Silence as an Altered Approach for Speaker Recognition, Rupali Pawar, R. M. Jalnekar, J. S.Chitode (pp. 57-62).
    • An Analysis of Internet Censorship Circumvention Techniques, Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li and WanJiang Han (pp. 63-72).
    • Improving the Handoff Latency of the Wireless Mesh Networks Standar, Reham Abdellatif Abouhogail (pp. 73-86).
    • An External Parameter Optimize Method for 3D Optical Measurement System, Heyao Ma, Wantao He, Xianglin Meng, Dan Li (pp. 87-94).
    • A XSS Attack Detection Method based on Skip List, Shan Chun, Cui Jing, Hu ChangZhen, Xue JingFeng, Wang Hao and Mhagama Raphael (pp. 95-106).
    • Digital Image Watermarking Based On Joint (DCT-DWT) and Arnold Transform, Majdi Farag Mohammed El Bireki, M. F. L. Abdullah, Ali Abdrhman M. Ukasha and Ali A. Elrowayati (pp. 107-118).
    • Image Steganography in a Karhunen-Loeve Transform Optimization Model, Li-Yangbo and Guo-Zuhua (pp. 119-128).
    • Network Information Security Situation Assessment Based on Bayesian Network, Wang Xing-zhu (pp. 129-138).
    • Evaluation of Flow and Average Entropy Based Detection Mechanism for DDoS Attacks using NS-2, Raghav Vadehra, Manjit Singh, Butta Singh, Nitika Chowdhary (pp. 139-146).
    • A New Collusion Attack Using Interpolation for Multimedia Fingerprinting, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu (pp. 147-156).
    • Effect of Anhydride Grafting Agent on Trap Levels of Low-Density Polyethylene, Lijuan He, Zhenhua Yuan, Xiong Yang, Huiqing Niu, Chao Zhu, Dawei Li,Lei Zhao and Chuntian Chen (pp. 157-164).
    • A Cybercrime Prevention Program based on Simulation and Quiz Game: Applying Item Response Theory for Effective Information Security Learning, Su Ryeon Kim, Ji Hyeon Yang and Seong Baeg Kim (pp. 165-180).
    • Research on Wormhole Attack Detection Algorithm in Space Information Networks, Yu Geng, Zhang jie, Zhang Yongfang, Ye ning, Ren Kaiya (pp. 181-192).
    • Intrusion Detection Method based on Improved BP Neural Network Research, Zhu Yuan Zhong (pp. 193-202).
    • Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm, Yong-Dal Shin (pp. 203-214).
    • Representation of Network Security Situation Elements Based on Cloud Model, Kou Guang, Yang Haopu, Wang Kun, Zhang Yuchen, Wang Shuo (pp. 215-224).
    • An Improved Random Key Predistribution Scheme for Wireless Sensor Networks Using Deployment Knowledge, Lina Zhu, Zuochang Zhang, Jianhua Li and Renjie Zhou (pp. 225-234).
    • A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS, Seong-Muk Choi, Rae-Hyung Kim, Ga-Ye Kim, Hyeon-Kyung Lee, GwangYong Gim and Jong-Bae Kim (pp. 235-242).
    • A Fast Detection and Recognition Algorithm for Pedestrian at Night Based on Entropy Weight Fast Support Vector Machine, Liang Rui, Wei Honglei, Zhu Qingxin, Liao Shujiao, Deng Hongyao (pp. 243-252).
    • Intrusion Detection in Aviation Terminal Region Petri Net with Non-arc and Unchanged Library, Song Yu, He Xiaoli, Ralf Volker Binsack (pp. 253-260).
    • Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study, Nirbhay Kumar Chaubey (pp. 261-274).
    • Simulation and Optimization Study on Layout Planning of Plant Factory Based on WITNESS, Li Ma, Meiqiong Ma, Chao Ma, Jingwen Deng, Xingluo Liu Lijun Zhao (pp. 275-282).
    • The Research of AMI Intrusion Detection Method using ELM in Smart Grid, Yuancheng Li, Chaochao Zhang, Liqun Yang (pp. 283-296).
    • Improving Analysis Phase in Network Forensics by Using Attack Intention Analysis, Mohammad Rasmi, Khaled E. Al-Qawasmi (pp. 297-308).
    • Application of Combined Positioning Algorithm of Volume Image Sequence on Mapping of Large Scale Topographical Map, Qi Jinghua (pp. 309-314).
    • Research on Intrusion Detection Systems and Unknown Malcode Detection based on Network Behavior, Xiaoyong Yu (pp. 315-326).
    • Coherent Caesar Cipher for Resource Constrained Devices, Priya Verma, Gurjot Singh Gaba (pp. 327-336).
    • Research on Risk Propensity and Decision-making Satisfaction of Narcissistic Customer Investment Products based on Network Platform Questionnaire, Shuliang Lv, Tiange Duan and Lanying Du (pp. 337-346).
    • A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme, Chunpeng Ge Jiandong Wang and Liming Fang (pp. 347-360).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA