Skip to content
NADIA

IJSIA Vol. 10, No. 8, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 8, 2016 August
    • Towards an Analysis of Passive Attacks on Anonymous Communication Systems, Tianbo Lu, Pan Gao, Lingling Zhao, Yang Li and Wan Jiang Han (pp. 1-12).
    • An Empirical Study of the Military IoT Security Priorities, Seung-hoon Jung, Jae-choon An, Jin-young Park, Yong-tae Shin and Jong-bae Kim (pp. 13-22).
    • A Fast Detection and Recognition Algorithm with Construction of Fast Support Vector Machine based on Entropy Weight, Zhu Li (pp. 23-28).
    • Security Parallel Migration of the Federal Cloud Markov Chain Multi Virtual Machine, Wu Lanhua (pp. 29-38).
    • A Novel Forgery Detection Mechanism for Sensitive Data, Vikas Dhawan and Gurjot Singh Gaba (pp. 39-48).
    • Terminal Anomaly Detection System Based on Dynamic Taint Analysis Technology, Wang Yutong, Chang Chaowen and Han Peisheng (pp. 49-58).
    • Analysis of Various Cryptography Techniques: A Survey, Neha Tayal, Ritesh Bansal, Shailender Gupta and Sangeeta Dhall (pp. 59-92).
    • Forecasting on Ecological Security of Zhalong Wetland Nature Reserve based on Gray Theory, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 93-102).
    • Simulation and Analysis for Error from Satellite Tracking Segment Anti-spoofing, Liu You-ming, Feng Qi and Li Ting-jun (pp. 103-120).
    • A Group Key based Security Model for Big Data System, Heeyoul Kim (pp. 121-130).
    • Secure DNP3 Services Scheme in Smart Grid Link Layer Based on GCM-AES, Ye Lu, Tao Feng and Guohua Ma (pp. 131-144).
    • “Soft-Man” and Data Mining based Distributed Intrusion Detection System, Jun Zheng (pp. 145-150).
    • A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection, Yasir Hamid, M. Sugumaran and Ludovic Journaux (pp. 151-158).
    • Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks, Zeyu Sun, Longxing Li and Xuelun Li (pp. 159-172).
    • Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm, Andysah Putera, Utama Siahaan and Robbi Rahim (pp. 173-180).
    • Multi-level detection and Warning Model for Bandwidth Consumption Attacks, Jincui Yang, Fangjiao Zhang and Wenbo Hu (pp. 181-190).
    • The Risk Evaluation Research of Computer Network Security based on Grey Clustering, Ning Yu (pp. 191-200).
    • Worm Propagation with Differential Infectivity under Quarantine Control Strategy, Sounak Paul and Bimal Kumar Mishra (pp. 201-214).
    • Research on Smart Grid Risk Assessment Based on Matter-Element Extenics, Jing Zhou and Zhaoxi Mu (pp. 215-224).
    • Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation, Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan (pp. 225-238).
    • Flow-based Physical Security, Sabah Al-Fedaghi (pp. 239-250).
    • Applying Fuzzy Synthetic Evaluation Approach to Risk Assessment of Large-scale Activities, Zheng Jianhu and Huang Mingfang (pp. 251-262).
    • A Novel Rough Set Methodology and Machine Learning based Novel Network Intrusion Detection System: Theoretical Analysis and Applications, Yang Hui-jun (pp. 263-276).
    • A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment, Junath Naseer Ahamed and N. Ch. S. N. Iyengar (pp. 277-294).
    • Security Architecture and Requirements for Wireless Sensor Networks, Yiguang Gong, Feng Ruan, Zhiyong Fan, Jianmin Hou, Ping Mei and Tao Li (pp. 295-302).
    • Research on Complex Products based on Digital Layout Design and Simulation Modeling, Nuo Zhang, Jingjing Jiao, Hongxiu Liu and Zhen Yao (pp. 303-314).
    • Indistinguishable Executable Code Generation Method, Mikhail Styugin (pp. 315-324).
    • Large-scale Evolutionary Knowledge Network and Multiple Integration of University Ideological and Political Education Resources Based on Inference Algorithm, Chunyan Ma (pp. 325-334).
    • Developing Data Mining Techniques for Intruder Detection in Network Traffic, Amar Agrawal, Sabah Mohammed and Jinan Fiaidhi (pp. 335-342).
    • Attack Detection Research for Software Defined Network, Jianfei Zhou and Na Liu (pp. 343-352).
    • Research on Data Intrusion Detection Technology based on Fuzzy Algorithmn, Sheng Zhao, Huishan Han and Xuekui Shi (pp. 353-364).
    • A Study on the Device Authentication and Key Distribution Method for Internet of Things, Jae-young Lee and Do-Eun Cho (pp. 365-374).
    • Application of Data Mining in Fiscal Expenditure on the New Urbanization and Income Gap based on Network Big Data, Yan Liu (pp. 375-384).
    • Improved BIRCH Clustering Algorithm and Human Resource Management Efficiency: An Organizational Learning Perspective, Yingjun Han (pp. 385-394).
    • DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks, Tanvi Gupta, Sumit Kumar, Ankit Tomar and KamalKant Verma (pp. 395-406).
    • Secure Communication in Two-Way Relay Networks with Channel Estimation Errors, Yao Chenhong, Pei Changxing and Guo Jing (pp. 407-416).
    • Efficient and Fast Detection of Covert Channels using Mutation Analysis, Mohammed Ennahbaouui and Said El Hajji (pp. 417-434).
    • Network Intrusion Detection Based on Stochastic Neural Networks Method, Yunfeng Yang and Fengxian Tang (pp. 435-446).
    • Research on Anti-Spoofing and Detection Technology in Satellite Positioning Section, Liu You-ming, Feng Qi and Li Ting-jun (pp. 447-456).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA