Skip to content
NADIA

IJSIA Vol. 10, No. 9, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 9, 2016 September
    • High-speed Encryption & Decryption System Based on SM4 Algorithm, Lv Qian, Li Li and Cao Yan-yan (pp. 1-8).
    • Memory Saving Architecture of Number Theoretic Transform for Lattice Cryptography, Sangook Moon (pp. 9-18).
    • Detecting Fraudulent Financial Information of a Company Using Hidden Markov Model, Ruicheng Yang, Ailing Zuo and Qing Shen (pp. 19-28).
    • Personalized Trusted Service Recommendation Method based on Social Work, Du Ruizhong, Pei Zhi and Tian Junfeng (pp. 29-38).
    • Mobile Botnet Detection Model based on Retrospective Pattern Recognition, Meisam Eslahi, Moslem Yousefi, Maryam Var Naseri, Y. M. Yussof, N. M. Tahir and H. Hashim (pp. 39-44).
    • Implementation of Bad Information Filtering System Based on SVM Algorithm, Xiao-Lan Xie and Zhen Long (pp. 45-54).
    • NoSQL Injection: Data Security on Web Vulnerability, Hemn B. Abdalla, Guoquang Li, Jinzhao Lin and Mustafa A. Alazeez (pp. 55-64).
    • Sorting Research of Ocean Engineering Enterprise Informatization Projects based on Risk Assessment, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 65-76).
    • Evaluation Model of Cloud Storage Security Level with the Fusion Analytic Hierarchy Process, Cheng Cheng and Zhuo Enyi (pp. 77-86).
    • Chi-Square Statistical based Technique for Intrusion Detection, Sheenam and Abhinav Bhandari (pp. 87-98).
    • Location Fingerprint Positioning Technology using Bat Algorithm, Song Lixin, Zhou Chuanbin and Pei Heng (pp. 99-108).
    • Fast Hardware Implementations of Inversions in Small Finite Fields for Special Irreducible Polynomials on FPGAs, Haibo Yi, Weijian Li and Zhe Nie (pp. 109-120).
    • Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks, R. Regan, E. Dhivyadarsani, B. Nandhini and A. Priya (pp. 121-128).
    • E-commerce Supply Chain Security and Influencing Factors of Logistics Industry Development based on VAR Model, Fang Wang and Qian Li (pp. 129-140).
    • Dynamic Security Policy Enforcement on Android, Matúš Vančo and Lukáš Aron (pp. 141-148).
    • Mechanisms of E-business Security and Enterprise Employee Voice Behavior Impacts on Team Creativity: A Cognitive Perspective, Shaozhong Yu, Le Zhang and Jinzhao Deng (pp. 149-164).
    • Identifying and Analyzing Security Risks in Android Application Components, Ming Zhang (pp. 165-174).
    • Blind Audio Watermarking Technique Based on Two Dimensional Cellular Automata, Hazem Hiary, Abdel Latif Abu Dalhoum, Alia Madain, Alfonso Ortega and Manuel Alfonseca (pp. 175-184).
    • RFID Tag Dynamic Ownership Transfer Protocol based on Lagrange of Multi-owner with Different Weights, Gan Yong, Yang Zong-qin, He Lei, Du Chao (pp. 185-192).
    • A Provably-Correct Micro-Dalvik Bytecode Verifier, Jiang Nan, He Yanxiang, Zhang Xiaotong, Liu Rui and Shen Yunfei (pp. 193-210).
    • MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA), Anass Khannous, Fatiha Elouaai, Anass Rghioui and Mohammed Bouhorma (pp. 211-228).
    • The Evaluation Analysis of Computer Network Information Security based on FAHP, Qian Wu (pp. 229-242).
    • Simulation and Analysis for Error from Satellite Capture Segment Anti-spoofing, Liu You-ming, Feng Qi and LIiTing-jun (pp. 243-256).
    • A Secure Content Delivery Service in CPS Environments, Jin-Mook Kim, Jeong-Kyung Moon and You-Jin Song (pp. 257-264).
    • An Image Spatial Domain Steganography Algorithm with High Payload, Commendable Perceptual Quality and High Statistical Un-detectability, Hao Huang and Zhiping Zhou (pp. 265-274).
    • Lightweight Key Distribution Protocol for Streaming Media DRM, Hao Li, Tang Xuyue, Jiayin Tian, Jianbo Liu and Cheng Yang (pp. 275-284).
    • TEAM: Virtual Synchronized File-based Transparent and Privacy-Enhanced Storage System, Hye-Lim Jeong and Ki-Woong Park (pp. 285-294).
    • User Behaviour Profiling in Cloud using One Class SVM: A Review, Vijaya Lakshmi Paruchuri, S. Suresh Babu, P S V S Sridhar, Debnath Bhattacharyya and Hye-Jin Kim (pp. 295-300).
    • Research on Network Security Situation Prediction Based on Markov Game Theory”, Wang Yong (pp. 301-308).
    • Coverless Multi-keywords Information Hiding Method Based on Text, Zhili Zhou, Yan Mu, Ching-Nung Yang and Ningsheng Zhao (pp. 309-320).
    • Parallel Encryption Method on Brain Wave for a Person Authentication, Jung-Sook Kim and Jang-Young Chung (pp. 320-330).
    • Study on Security Risk Propagation of Immune Mechanism under Complex Network Background, Lu Cailin (pp. 331-342).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA