Skip to content
NADIA

IJSIA Vol. 7, No. 5, 2013

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2013
2013
Volume 7, Number 5, 2013 September
    • An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers, Najib A. Kofahi (pp. 1-16).
    • Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks, Jianmin Zhang, Jianwei Tan and Jian Li (pp. 17-28).
    • Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph, Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Bazara I. A. Barry (pp. 29-42).
    • A Mutual RFID Security Protocol for Wireless Reader, He Jialiang and Xu Zhiqiang (pp. 43-52).
    • A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs), Z. Lashkaripour and A. Ghaemi Bafghi (pp. 53-66).
    • A New Fast and High Performance Intrusion Detection System, Ahmed Ahmim and Nacira Ghoualmi-Zine (pp. 67-80).
    • A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic, Gagandeep Kaur, Vikas Saxena and J. P. Gupta (pp. 81-100).
    • A Robust Behavior Modeling for Detecting Hard-coded Address Contained Shellcodes, Javad Khodaverdi and Farnaz Amin (pp. 101-112).
    • Implementing Database Methods for Increasing the Performance of Intelligent CCTV, Yong Wan Ju and Seung Jai Yi (pp. 113-120).
    • A Novel Method to Avoid Malicious Applications on Android, Sangho Lee and Da Young Ju (pp. 121-130).
    • Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC, Sung-Wook Park and Im-Yeong Lee (pp. 131-138).
    • Content Reuse Prevention Scheme to Prevent Privacy Invasion of Social Network Service, Su-Young Jung and Jin Kwak (pp. 139-146).
    • Experimental Study of DDoS Defense System for Web Service, Namkyun Baik and Namhi Kang (pp. 147-156).
    • Policy Direction of QoS Interworking and Management among Service Providers for Broadcast-Communication Convergent, Chin-Chol Kim, Jong-Pil Jeong and Jae-Young Choi (pp. 157-166).
    • A Logistic Neural Network Approach to Extended Warranty Claims, Lee Sang-Hyun, Lim Jong-Han and Moon Kyung-Il (pp. 167-174).
    • Vehicle License Plate Recognition Based on Hierarchical Approach, Dongwook Kim and Liu Zheng (pp. 175-182).
    • Audio Watermarking by Coefficient Quantization in the DWT-DCT Dual Domain, De Li, Yingying Ji and JongWeon Ki (pp. 183-192).
    • Intrusion Detection Ensemble Algorithm based on Bagging and Neighborhood Rough Set, Hui Zhao (pp. 193-204).
    • Secure Communication based on a Fractional Order Chaotic System, Shuai Wang, Wei Sun, Cao-Yuan Ma, Di Wang and Zheng-Chen (pp. 205-216).
    • Network Security Threats Situation Assessment and Analysis Technology Study, Xiangdong Cai, Yang Jingyi and Huanyu Zhang (pp. 217-224).
    • Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng and Jeong-Uk Kim (pp. 225-236).
    • An Improved Algorithm of Elliptic Curve Cryptograph, Kai Zhang and Tao Yan (pp. 237-248).
    • Attack Graph Algorithm in the Application of Intrusion Detection System, Luo Zhiyong, You Bo, Xu Jiazhong, Yu Guixin and Liu Yahui (pp. 249-256).
    • A Heuristics-based Static Analysis Approach for Detecting Packed PE Binaries, Rohit Arora, Anishka Singh, Himanshu Pareek and Usha Rani Edara (pp. 257-268).
    • Preventing and Detecting Plagiarism in Programming Course, Wang Chunhui, Liu Zhiguo and Liu Dongsheng (pp. 269-278).
    • An Adaptive Method for Source-end Detection of Pulsing DoS Attacks, Ming Yu (pp. 279-288).
    • Platforms and Applications in Hardware Security: Trends and Challenges, Edward David Moreno (pp. 289-304).
    • Access-control-based Efficient Privacy Protection Method for Social Networking Services, Yu-Jong Jang and Jin Kwak (pp. 305-314).
    • Security Management Architecture for Secure Smartwork Center, Yun Sang Byun and Jin Kwak (pp. 315-320).
    • Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues, Mehdi Maleknasab, Moazam Bidaki and Ali Harounabadi (pp. 321-342).
    • A Study on Differential User Authentication Scheme based on Client in Home Network, Changhoon Lee, Woongryul Jeon, Dongho Won (pp. 343-354).
    • A Multi-Stage Fingerprint Recognition Method for Payment Verification System, Woong-Sik Kim (pp. 355-364).
    • Relative Importance Analysis of inter-evaluation items in Korean IS Standard Audit Checklist Using Decision making Techniques, Boo-Hyung Lee (pp. 365-376).
    • A Novel Image Encryption Using Arnold Cat, Pan Tian-gong and Li Da-yong (pp. 377-386).
    • An Improved Overlap-Key-Sharing Key Management Scheme for Wireless Sensor Networks, Li Lan Ying, Yi Chun Huan, Sun Jian Da and Si Tie Qiang (pp. 387-396).
    • An Encryption Method for QR Code Image Based on ECA, Yu Xiaoyang, Song Yang, Yu Yang, Yu Shuchun, Cheng Hao and Guan Yanxia (pp. 397-406).
    • Design of Active Frequency Selective Surfaces for the RCS Reduction, Guo hui Yang, Shuang Ma, Er chao Wang, Yuemei Qin and Xuemai Gu (pp. 407-414).
    • Byte-index Chunking Algorithm for Data Deduplication System, Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Chuck Yoo and Young Woong Ko (pp. 415-424).
    • Development and Analysis of an Information Security Learning Method using Situation-based Problems, Yungyeong Ko, Seonghee Lee and Seong Baeg Kim (pp. 425-434).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA