2013
2013
Volume 7, Number 1, 2013 January
-
- Study on Intrusion Detection Policy for Wireless Sensor Networks, Jiang Xu, Jin Wang, Shengdong Xie, Wenliang Chen and Jeong-Uk Kim (pp. 1-6).
- Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT, Mohammad Dabbour, Izzat Alsmadi and Emad Alsukhni (pp. 7-16).
- Face Tampering Detection from Single Face Image using Gradient Method, Aruni Singh, Shrikant Tiwari and Sanjay Kumar Singh (pp. 17-30).
- Secure Model for Educational Resources, Osama N. Qunoo and Hatem Hamad (pp. 31-50).
- Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method, Nhauo Davuth and Sung-Ryul Kim (pp. 51-58).
- A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol, Chun-Ta Li and Min-Shiang Hwang (pp. 59-70).
- Algorithms for Automatic Analysis of SELinux Security Policy, Gaoshou Zhai, Tong Wu, Jing Bai, Tao Guo and Tianyou Li (pp. 71-84).
- Security Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement, Younghwa An and Youngdo Joo (pp. 85-94).
- Selective Timestamp-Nonce Based Authentication Scheme, Wei-Chen Wu, Horng-Twu Liaw and Yi-Ming Chen (pp. 95-104).
- Noise Resistant Identification of Human Iris Patterns Using Fuzzy ARTMAP Neural Network, Arash Taherian and Mahdi Aliyari Sh. (pp. 105-118).
- Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing, Jung ho Eom and Min woo Park (pp. 119-128).
- A New Data Aggregation Scheme to Support Energy Efficiency and Privacy Preservation for Wireless Sensor Networks, Min Yoon, Yong-Ki Kim and Jae-Woo Chang (pp. 129-142).
- Secure Video Transmission on Smart Phones for Mobile Intelligent Network, Seunghwan Choi, Sungju Lee, Yeonwoo Lee, Changsun Kim and Taikyeong Jeong (pp. 143-154).
- Industrial Espionage and Police Investigation, Chang-Moo Lee (pp. 155-162).
- A Study on Performance Evaluation for Security Test Laboratory, Ji-Yong Seo and Hangbae Chang (pp. 163-168).
- Security Requirements for the Medical Information Used by U-Healthcare Medical Equipment, Jaebum Son, Soonseok Kim, Gilhong Park, Jihun Cha and Kijung Park (pp. 169-180).
- A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals, Ae Chan Kim, Won Hyung Park and Dong Hoon Lee (pp. 181-188).
- Next Generation Electronic Record Management System based on Digital Forensics, Sekie Amanuel Majore, Hyunguk Yoo and Taeshik Shon (pp. 189-194).
- Linear Relationship between Reported Discretional Expenditure and Sales Amount – Empirical Approach with IT Related Industry, JeongYeon Kim and Youngkeun Choi (pp. 195-202).