2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2016 2016 Volume 10, Number 8, 2016 August Towards an Analysis of Passive Attacks on Anonymous Communication Systems, Tianbo Lu, Pan Gao, Lingling Zhao, Yang Li and Wan Jiang Han (pp. 1-12). An Empirical Study of the Military IoT Security Priorities, Seung-hoon Jung, Jae-choon An, Jin-young Park, Yong-tae Shin and Jong-bae Kim (pp. 13-22). A Fast Detection and Recognition Algorithm with Construction of Fast Support Vector Machine based on Entropy Weight, Zhu Li (pp. 23-28). Security Parallel Migration of the Federal Cloud Markov Chain Multi Virtual Machine, Wu Lanhua (pp. 29-38). A Novel Forgery Detection Mechanism for Sensitive Data, Vikas Dhawan and Gurjot Singh Gaba (pp. 39-48). Terminal Anomaly Detection System Based on Dynamic Taint Analysis Technology, Wang Yutong, Chang Chaowen and Han Peisheng (pp. 49-58). Analysis of Various Cryptography Techniques: A Survey, Neha Tayal, Ritesh Bansal, Shailender Gupta and Sangeeta Dhall (pp. 59-92). Forecasting on Ecological Security of Zhalong Wetland Nature Reserve based on Gray Theory, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 93-102). Simulation and Analysis for Error from Satellite Tracking Segment Anti-spoofing, Liu You-ming, Feng Qi and Li Ting-jun (pp. 103-120). A Group Key based Security Model for Big Data System, Heeyoul Kim (pp. 121-130). Secure DNP3 Services Scheme in Smart Grid Link Layer Based on GCM-AES, Ye Lu, Tao Feng and Guohua Ma (pp. 131-144). “Soft-Man” and Data Mining based Distributed Intrusion Detection System, Jun Zheng (pp. 145-150). A Fusion of Feature Extraction and Feature Selection Technique for Network Intrusion Detection, Yasir Hamid, M. Sugumaran and Ludovic Journaux (pp. 151-158). Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks, Zeyu Sun, Longxing Li and Xuelun Li (pp. 159-172). Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm, Andysah Putera, Utama Siahaan and Robbi Rahim (pp. 173-180). Multi-level detection and Warning Model for Bandwidth Consumption Attacks, Jincui Yang, Fangjiao Zhang and Wenbo Hu (pp. 181-190). The Risk Evaluation Research of Computer Network Security based on Grey Clustering, Ning Yu (pp. 191-200). Worm Propagation with Differential Infectivity under Quarantine Control Strategy, Sounak Paul and Bimal Kumar Mishra (pp. 201-214). Research on Smart Grid Risk Assessment Based on Matter-Element Extenics, Jing Zhou and Zhaoxi Mu (pp. 215-224). Differentiating Technique: Constructing Efficient HIBE with Constant Size Ciphertext and Authorized Delegation, Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan (pp. 225-238). Flow-based Physical Security, Sabah Al-Fedaghi (pp. 239-250). Applying Fuzzy Synthetic Evaluation Approach to Risk Assessment of Large-scale Activities, Zheng Jianhu and Huang Mingfang (pp. 251-262). A Novel Rough Set Methodology and Machine Learning based Novel Network Intrusion Detection System: Theoretical Analysis and Applications, Yang Hui-jun (pp. 263-276). A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment, Junath Naseer Ahamed and N. Ch. S. N. Iyengar (pp. 277-294). Security Architecture and Requirements for Wireless Sensor Networks, Yiguang Gong, Feng Ruan, Zhiyong Fan, Jianmin Hou, Ping Mei and Tao Li (pp. 295-302). Research on Complex Products based on Digital Layout Design and Simulation Modeling, Nuo Zhang, Jingjing Jiao, Hongxiu Liu and Zhen Yao (pp. 303-314). Indistinguishable Executable Code Generation Method, Mikhail Styugin (pp. 315-324). Large-scale Evolutionary Knowledge Network and Multiple Integration of University Ideological and Political Education Resources Based on Inference Algorithm, Chunyan Ma (pp. 325-334). Developing Data Mining Techniques for Intruder Detection in Network Traffic, Amar Agrawal, Sabah Mohammed and Jinan Fiaidhi (pp. 335-342). Attack Detection Research for Software Defined Network, Jianfei Zhou and Na Liu (pp. 343-352). Research on Data Intrusion Detection Technology based on Fuzzy Algorithmn, Sheng Zhao, Huishan Han and Xuekui Shi (pp. 353-364). A Study on the Device Authentication and Key Distribution Method for Internet of Things, Jae-young Lee and Do-Eun Cho (pp. 365-374). Application of Data Mining in Fiscal Expenditure on the New Urbanization and Income Gap based on Network Big Data, Yan Liu (pp. 375-384). Improved BIRCH Clustering Algorithm and Human Resource Management Efficiency: An Organizational Learning Perspective, Yingjun Han (pp. 385-394). DNS Prevention Using 64-Bit Time Synchronized Public Key Encryption to Isolate Phishing Attacks, Tanvi Gupta, Sumit Kumar, Ankit Tomar and KamalKant Verma (pp. 395-406). Secure Communication in Two-Way Relay Networks with Channel Estimation Errors, Yao Chenhong, Pei Changxing and Guo Jing (pp. 407-416). Efficient and Fast Detection of Covert Channels using Mutation Analysis, Mohammed Ennahbaouui and Said El Hajji (pp. 417-434). Network Intrusion Detection Based on Stochastic Neural Networks Method, Yunfeng Yang and Fengxian Tang (pp. 435-446). Research on Anti-Spoofing and Detection Technology in Satellite Positioning Section, Liu You-ming, Feng Qi and Li Ting-jun (pp. 447-456).