2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2017 2017 Volume 11, Number 4, 2017 April DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm, Gurpreet Kour Sodhi and Gurjot Singh Gaba (pp. 1-10). An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks, Weipeng Guo and Yonghong Chen (pp. 11-26). Review of Vehicular Ad Hoc Network Security, Hari Krishna and Sandeep Kumar Arora (pp. 27-44). Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition, Morkat M. Yilwatda, Jonathan A. Enokela, and Nentawe Y. Goshwe (pp. 45-58). Optimizing Available Transfer Capability Based on Chaos Cloud Particle Swarm Algorithm with Gold Section Criteria, Hongsheng Su and Shuangshuang Wang (pp. 59-70). Steganography and Data Loss Prevention: An overlooked risk?, Juan M. Gutiérrez-Cárdenas (pp. 71-84). Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach, Rizwan ur Rahman, Deepak Singh Tomar and Jijin A.V. (pp. 85-96).