Skip to content
NADIA

IJSIA Vol. 11, No. 1, 2017

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2017
2017
Volume 11, Number 1, 2017 January
    • An BAN Logic Analysis Method Based on Yahalom Protocol, Ying Zhou, Lei Yu, Shaoming Pan, Zhibo Wang, Ying Zheng and Min Li (pp. 1-10).
      This paper has been removed because it was withdrawn by the Authors.
    • Hybrid Intrusion Detection System Using K-means and J-48, Manvir Singh and Jatinder Singh Bal (pp. 11-22).
    • Research on Defensive Strategy Selection in Network Security, Hong Li (pp. 23-34).
    • Research on Data Security Mechanism among Cloud Services based on Software Define Network, Zhao Wenbin, Fan Tongrang and Wang Hongsheng (pp. 35-44).
    • 128 Bit Hash of Variable Length in Short Message Service Security, Robbi Rahim (pp. 45-58).
    • User Identity Resolution Across Multi-Social Media, Zhibo Wang, Zhongyuan Li, Jiawen Sun, Qi Yin, Lu Gao and Xiaohui Cui (pp. 59-70).
    • A Defensive Mechanism based on PCA to Defend Denial-of-Service Attack, P. Rajesh Kanna, K. Sindhanaiselvan and M. K. Vijaymeena (pp. 71-82).
    • Analyzing the Resilience of the Employee Network in Joint-equity Commercial Banks, Shuliang Lv, Chuanchao Huang and Lanying Du (83-92).
    • Network Security Situation Prediction System Based on Neural Network and Big Data, Bowen Zhu, Yonghong Chen, Yiqiao Cai, Hui Tian and Tian Wang (pp. 93-108).
    • A Classification Scheme for Cybersecurity Models, Issa Atoum and Ahmed Otoom (pp. 109-120).
    • The Homomorphic Encryption Method for Cloud Computing Storage Security, Jun Wu and Jing Chen (pp. 121-134).
    • Greedy Modes of Data Integrity Attacks on Industrial Control Systems: A Case Study of Tennessee Eastman Process, Weize Li, Lun Xie, Yu Rong and Zhiliang Wang (pp. 135-148).
    • Video Authentication against Set of Temporal Tampering, Manish K Thakur, Vikas Saxena and J P Gupta (pp. 149-164).
    • Boomerang Analysis Method Based on Block Cipher, Fan Aiwan and Yang Zhaofeng (pp. 165-178).
    • Anonymous Authentication with Centralize Access Control of Data Storage in Cloud, Linawati, I Gede Totok Suryawan and Made Sudarma (pp. 179-192).
    • Analysis on Mechanism of Vegetation Slope Protection based on Security Perspective, Du Guangqian and Wang Shijie (pp. 193-202).
    • Multi-step Attack-oriented Assessment of Network Security Situation, Zhang Hengwei, Yang Haopu, Wang Jindong and Li Tao (pp. 203-218).
    • Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol, Rajeev Kumar Gupta, R. K. Pateriya , Ankita Patil (pp. 219-232).
    • A Study on Global Piracy Attacks’ Trends and Characteristics Based on Data Analysis, Zhongming Xiao, Zhongzhou Fan and Liangkun Xu (pp. 233-244).
    • Enhancement of Cloud Authorization System Using Predicate Logic, Sandeep Saxena, Gautam Sanyal and Shashank Srivastava (pp. 245-256).
    • A Robust and Secure Block-SVD based Embedding of Encrypted Watermark in Digital Images using RDWT, Sachin Gaur, Vinay Kumar Srivastava (pp. 257-270).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA