Skip to content
NADIA

IJSIA Vol. 7, No. 1, 2013

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2013
2013
Volume 7, Number 1, 2013 January
    • Study on Intrusion Detection Policy for Wireless Sensor Networks, Jiang Xu, Jin Wang, Shengdong Xie, Wenliang Chen and Jeong-Uk Kim (pp. 1-6).
    • Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT, Mohammad Dabbour, Izzat Alsmadi and Emad Alsukhni (pp. 7-16).
    • Face Tampering Detection from Single Face Image using Gradient Method, Aruni Singh, Shrikant Tiwari and Sanjay Kumar Singh (pp. 17-30).
    • Secure Model for Educational Resources, Osama N. Qunoo and Hatem Hamad (pp. 31-50).
    • Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method, Nhauo Davuth and Sung-Ryul Kim (pp. 51-58).
    • A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol, Chun-Ta Li and Min-Shiang Hwang (pp. 59-70).
    • Algorithms for Automatic Analysis of SELinux Security Policy, Gaoshou Zhai, Tong Wu, Jing Bai, Tao Guo and Tianyou Li (pp. 71-84).
    • Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement, Younghwa An and Youngdo Joo (pp. 85-94).
    • Selective Timestamp-Nonce Based Authentication Scheme, Wei-Chen Wu, Horng-Twu Liaw and Yi-Ming Chen (pp. 95-104).
    • Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network, Arash Taherian and Mahdi Aliyari Sh. (pp. 105-118).
    • Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing, Jung ho Eom and Min woo Park (pp. 119-128).
    • A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks, Min Yoon, Yong-Ki Kim and Jae-Woo Chang (pp. 129-142).
    • Secure Video Transmission on Smart Phones for Mobile Intelligent Network, Seunghwan Choi, Sungju Lee, Yeonwoo Lee, Changsun Kim and Taikyeong Jeong (pp. 143-154).
    • Industrial Espionage and Police Investigation, Chang-Moo Lee (pp. 155-162).
    • A Study on Performance Evaluation for Security Test Laboratory, Ji-Yong Seo and Hangbae Chang (pp. 163-168).
    • Security Requirements for the Medical Information Used by U-Healthcare Medical Equipment, Jaebum Son, Soonseok Kim, Gilhong Park, Jihun Cha and Kijung Park (pp. 169-180).
    • A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals, Ae Chan Kim, Won Hyung Park and Dong Hoon Lee (pp. 181-188).
    • Next Generation Electronic Record Management System based on Digital Forensics, Sekie Amanuel Majore, Hyunguk Yoo and Taeshik Shon (pp. 189-194).
    • Linear Relationship between Reported Discretional Expenditure and Sales Amount – Empirical Approach with IT Related Industry, JeongYeon Kim and Youngkeun Choi (pp. 195-202).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA