Skip to content
NADIA

IJSIA Vol. 10, No. 6, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 6, 2016 June
    • F-Crowds: An Anonymity Scheme for P2P File-Sharing, Tianbo Lu, Xinyuan Zhang, Xiaofeng Du and Yang Li (pp. 1-12).
    • A First Step Towards Security for Internet of Small Things, Namhi Kang (pp. 13-22).
    • Ecological Security Evaluation of Zhalong Wetland Nature Reserve based Composite Index Evaluation Method, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 23-28).
    • User Identity Authentication Based on the Combination of Mouse and Keyboard Behavior, Haitao Tang and Wang Mantao (pp. 29-36).
    • User Revocation Mechanism for Service Oriented Wireless Adhoc Networks, Reddi Prasadu, M. Jeevan Babu, Sk. Mohammed Gouse, Debnath Bhattacharyya and Tai-hoon Kim (pp. 37-46).
    • Research for Classification Method of Battery Based on State of Health, Yu Zhilong and Li Ran (pp. 47-54).
    • More Reliable Approach for Detecting Data Alterations in Communication Networks, Vikas Dhawan, Gurjot Singh Gaba (pp. 55-64).
    • Research on the Network Marketing Channel Strategy in Sports Life: an Empirical Analysis based on College Students, Yadong Ren (pp. 65-74).
    • A Detection Framework of Malicious Code Based on Multi-Classifiers Ensemble, Chao Dai, Jianmin Pang, Feng Yue, Pingfei Cui, Di Sun and Liang Zhu (pp. 75-86).
    • A Study on Responding to DDoS Architecture in Smart Phone Environment, Mi-Ran Han, Young-Chul Oh and Jong-Bae Kim (pp. 87-98).
    • Research on an Improved RFID Anti-collision Algorithm in the Internet of Things, Jiangang Jin (pp. 99-106).
    • Shellix: An Efficient Approach for Shellcode Detection, Mo Chen, Changzhen Hu, Donghai Tian, Xin Wang, Yuan Liu and Ning Li (pp. 107-122).
    • A Study on Control Item of ISMS in the Financial Industry, Yong-Sik Kim, Gyoocheol Lee, Yongtae Shin, Younglak Choi, Jin-Ho Park and Jong-Bae Kim (pp. 123-134).
    • An Automatic Identification Authentic Work Anti-counterfeiting Algorithm Based on DWT-DCT, Yue Zhang and Jingbing Li (pp. 135-144).
    • Adaption of Integrated Secure Guide for Secure Software Development Lifecycle, Ki-Hyun Lee, Young. B Park (pp. 145-154).
    • A Target-Oriented Path Generation Method based on Concolic Testing, Zhang Xuzhou, Gong Yunzhan, Wang Yawen and Xing Ying (pp. 155-170).
    • Research on Digital Watermark Algorithm based on Compression Perception, Junkai Zhang (pp. 171-180).
    • Forensic Analysis of MERS Smishing Hacking Attacks and Prevention, Soon-ho Moon, Dea-woo Park (pp. 181-192).
    • The Research of Network Security Based on Cognitive Radio, Ruihui Mu and Junwei Li (pp. 193-204).
    • The Research based on SSL and WPKI of Mobile E-commerce, Jijun Xing (pp. 205-214).
    • On Resolving Key Escrow Problem in HIBE and HIBS, Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan (pp. 215-228).
    • EEE-GSM: End-to-End Encryption Scheme over GSM System, Mohammed Ramadan, Guohong Du, Fagen Li, Chun Xiang Xu (pp. 229-240).
    • Simulation Analysis of Stereo Garage Control Algorithm based on ADRC, Yongde Zhang, Tongning Shi, Lei Wang, Jingguo He and Daifu Tian (pp. 241-248).
    • Research on Probabilistic Model based Services Composition Compatibility Focusing on Structural Behaviors Modeling, Honghao Gao, Yucong Duan and Yonghua Zhu (pp. 249-260).
    • A Study on Vulnerability Assessment Technique of People-Oriented Security through Pattern Analysis, Choon Park and Dae-Sik Ko (pp. 261-268).
    • Banknote Image Defect Recognition Method Based on Convolution Neural Network, Wang Ke, Wang Huiqin, Shu Yue, Mao Li and Qiu Fengyan (pp. 269-280).
    • Analysis on Influence Domain of Control Flow Modification in Regression Testing based on FCP, Mingjue Hu, Yongmin Mu and Aiping Xu (pp. 281-294).
    • A Research Survey of Ring Signature Scheme and Implementation Issues, F. A. Alahmari, Turki. A. Alqarni and Jayaprakash Kar (pp. 295-304).
    • An Intelligent Application Platform for Campus Life Based on Mobile Internet, Guanlin Chen, Peng Niu and Hui Yao (pp. 305-314).
    • A Novel Face Template Protection Algorithm Based on the Fusion of Chaos Theory and RSA Encryption, Liu Yunan, Zhao Fudong, Xu Yanli and Cao Yu (pp. 315-330).
    • Cryptographic Encapsulation in the New ENC-DNSSEC Protocol, Kaouthar Chetioui, Ghizlane Orhanou and Said El Hajji (pp. 331-340).
    • Analyzing the Impact of the Internet on Higher Education, Renjie Zhou, Dongchen Xia, Yuyu Yin, Jilin Zhang, Wei Zhang and Jin Feng (pp. 341-350).
    • An Analysis Modeling Architecture for Supporting Physical Layer Security of Wireless Networks under Hardware Impairments, Kyusung Shim, Nhu Tri Do and Beongku An (pp. 351-362).
    • Research on Security Assessment of Highway Slope Protection by using NURBS modeling: an Ecological Perspective, Hongxiu Liu and Bohang Sun (pp. 363-374).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA