2016
2016
Volume 10, Number 5, 2016 May
-
- A Novel Information Fusion Model for Assessment of Malware Threat, Chao Dai, Jianmin Pang, Xiaochuan Zhang, Guanghui Liang and Hong Bai (pp. 1-16).
- Achieving Secure Deduplication by Using Private Cloud and Public Cloud, Guljar P. Shaikh, S. D. Chaudhary, Priyanka Paygude, Debnath Bhattacharyya (pp. 17-26).
- Improving Unconstrained Iris Recognition Performance via Domain Adaptation Metric Learning Method, Yan Fei, Zhou Changjiu, and Tian Yantao (pp. 27-40).
- On Privacy and Anonymity in Freenet System, Tianbo Lu, Zhimin Lin, Lingling Zhao, Yang Li (pp. 41-56).
- Use of Silence as an Altered Approach for Speaker Recognition, Rupali Pawar, R. M. Jalnekar, J. S.Chitode (pp. 57-62).
- An Analysis of Internet Censorship Circumvention Techniques, Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li and WanJiang Han (pp. 63-72).
- Improving the Handoff Latency of the Wireless Mesh Networks Standar, Reham Abdellatif Abouhogail (pp. 73-86).
- An External Parameter Optimize Method for 3D Optical Measurement System, Heyao Ma, Wantao He, Xianglin Meng, Dan Li (pp. 87-94).
- A XSS Attack Detection Method based on Skip List, Shan Chun, Cui Jing, Hu ChangZhen, Xue JingFeng, Wang Hao and Mhagama Raphael (pp. 95-106).
- Digital Image Watermarking Based On Joint (DCT-DWT) and Arnold Transform, Majdi Farag Mohammed El Bireki, M. F. L. Abdullah, Ali Abdrhman M. Ukasha and Ali A. Elrowayati (pp. 107-118).
- Image Steganography in a Karhunen-Loeve Transform Optimization Model, Li-Yangbo and Guo-Zuhua (pp. 119-128).
- Network Information Security Situation Assessment Based on Bayesian Network, Wang Xing-zhu (pp. 129-138).
- Evaluation of Flow and Average Entropy Based Detection Mechanism for DDoS Attacks using NS-2, Raghav Vadehra, Manjit Singh, Butta Singh, Nitika Chowdhary (pp. 139-146).
- A New Collusion Attack Using Interpolation for Multimedia Fingerprinting, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu (pp. 147-156).
- Effect of Anhydride Grafting Agent on Trap Levels of Low-Density Polyethylene, Lijuan He, Zhenhua Yuan, Xiong Yang, Huiqing Niu, Chao Zhu, Dawei Li,Lei Zhao and Chuntian Chen (pp. 157-164).
- A Cybercrime Prevention Program based on Simulation and Quiz Game: Applying Item Response Theory for Effective Information Security Learning, Su Ryeon Kim, Ji Hyeon Yang and Seong Baeg Kim (pp. 165-180).
- Research on Wormhole Attack Detection Algorithm in Space Information Networks, Yu Geng, Zhang jie, Zhang Yongfang, Ye ning, Ren Kaiya (pp. 181-192).
- Intrusion Detection Method based on Improved BP Neural Network Research, Zhu Yuan Zhong (pp. 193-202).
- Fast Detection of Copy-Move Forgery Image using Two Step Search Algorithm, Yong-Dal Shin (pp. 203-214).
- Representation of Network Security Situation Elements Based on Cloud Model, Kou Guang, Yang Haopu, Wang Kun, Zhang Yuchen, Wang Shuo (pp. 215-224).
- An Improved Random Key Predistribution Scheme for Wireless Sensor Networks Using Deployment Knowledge, Lina Zhu, Zuochang Zhang, Jianhua Li and Renjie Zhou (pp. 225-234).
- A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS, Seong-Muk Choi, Rae-Hyung Kim, Ga-Ye Kim, Hyeon-Kyung Lee, GwangYong Gim and Jong-Bae Kim (pp. 235-242).
- A Fast Detection and Recognition Algorithm for Pedestrian at Night Based on Entropy Weight Fast Support Vector Machine, Liang Rui, Wei Honglei, Zhu Qingxin, Liao Shujiao, Deng Hongyao (pp. 243-252).
- Intrusion Detection in Aviation Terminal Region Petri Net with Non-arc and Unchanged Library, Song Yu, He Xiaoli, Ralf Volker Binsack (pp. 253-260).
- Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study, Nirbhay Kumar Chaubey (pp. 261-274).
- Simulation and Optimization Study on Layout Planning of Plant Factory Based on WITNESS, Li Ma, Meiqiong Ma, Chao Ma, Jingwen Deng, Xingluo Liu Lijun Zhao (pp. 275-282).
- The Research of AMI Intrusion Detection Method using ELM in Smart Grid, Yuancheng Li, Chaochao Zhang, Liqun Yang (pp. 283-296).
- Improving Analysis Phase in Network Forensics by Using Attack Intention Analysis, Mohammad Rasmi, Khaled E. Al-Qawasmi (pp. 297-308).
- Application of Combined Positioning Algorithm of Volume Image Sequence on Mapping of Large Scale Topographical Map, Qi Jinghua (pp. 309-314).
- Research on Intrusion Detection Systems and Unknown Malcode Detection based on Network Behavior, Xiaoyong Yu (pp. 315-326).
- Coherent Caesar Cipher for Resource Constrained Devices, Priya Verma, Gurjot Singh Gaba (pp. 327-336).
- Research on Risk Propensity and Decision-making Satisfaction of Narcissistic Customer Investment Products based on Network Platform Questionnaire, Shuliang Lv, Tiange Duan and Lanying Du (pp. 337-346).
- A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme, Chunpeng Ge Jiandong Wang and Liming Fang (pp. 347-360).