2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2013 2013 Volume 7, Number 5, 2013 September An Empirical Study to Compare the Performance of some Symmetric and Asymmetric Ciphers, Najib A. Kofahi (pp. 1-16). Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks, Jianmin Zhang, Jianwei Tan and Jian Li (pp. 17-28). Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph, Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Bazara I. A. Barry (pp. 29-42). A Mutual RFID Security Protocol for Wireless Reader, He Jialiang and Xu Zhiqiang (pp. 43-52). A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs), Z. Lashkaripour and A. Ghaemi Bafghi (pp. 53-66). A New Fast and High Performance Intrusion Detection System, Ahmed Ahmim and Nacira Ghoualmi-Zine (pp. 67-80). A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic, Gagandeep Kaur, Vikas Saxena and J. P. Gupta (pp. 81-100). A Robust Behavior Modeling for Detecting Hard-coded Address Contained Shellcodes, Javad Khodaverdi and Farnaz Amin (pp. 101-112). Implementing Database Methods for Increasing the Performance of Intelligent CCTV, Yong Wan Ju and Seung Jai Yi (pp. 113-120). A Novel Method to Avoid Malicious Applications on Android, Sangho Lee and Da Young Ju (pp. 121-130). Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC, Sung-Wook Park and Im-Yeong Lee (pp. 131-138). Content Reuse Prevention Scheme to Prevent Privacy Invasion of Social Network Service, Su-Young Jung and Jin Kwak (pp. 139-146). Experimental Study of DDoS Defense System for Web Service, Namkyun Baik and Namhi Kang (pp. 147-156). Policy Direction of QoS Interworking and Management among Service Providers for Broadcast-Communication Convergent, Chin-Chol Kim, Jong-Pil Jeong and Jae-Young Choi (pp. 157-166). A Logistic Neural Network Approach to Extended Warranty Claims, Lee Sang-Hyun, Lim Jong-Han and Moon Kyung-Il (pp. 167-174). Vehicle License Plate Recognition Based on Hierarchical Approach, Dongwook Kim and Liu Zheng (pp. 175-182). Audio Watermarking by Coefficient Quantization in the DWT-DCT Dual Domain, De Li, Yingying Ji and JongWeon Ki (pp. 183-192). Intrusion Detection Ensemble Algorithm based on Bagging and Neighborhood Rough Set, Hui Zhao (pp. 193-204). Secure Communication based on a Fractional Order Chaotic System, Shuai Wang, Wei Sun, Cao-Yuan Ma, Di Wang and Zheng-Chen (pp. 205-216). Network Security Threats Situation Assessment and Analysis Technology Study, Xiangdong Cai, Yang Jingyi and Huanyu Zhang (pp. 217-224). Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication, Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng and Jeong-Uk Kim (pp. 225-236). An Improved Algorithm of Elliptic Curve Cryptograph, Kai Zhang and Tao Yan (pp. 237-248). Attack Graph Algorithm in the Application of Intrusion Detection System, Luo Zhiyong, You Bo, Xu Jiazhong, Yu Guixin and Liu Yahui (pp. 249-256). A Heuristics-based Static Analysis Approach for Detecting Packed PE Binaries, Rohit Arora, Anishka Singh, Himanshu Pareek and Usha Rani Edara (pp. 257-268). Preventing and Detecting Plagiarism in Programming Course, Wang Chunhui, Liu Zhiguo and Liu Dongsheng (pp. 269-278). An Adaptive Method for Source-end Detection of Pulsing DoS Attacks, Ming Yu (pp. 279-288). Platforms and Applications in Hardware Security: Trends and Challenges, Edward David Moreno (pp. 289-304). Access-control-based Efficient Privacy Protection Method for Social Networking Services, Yu-Jong Jang and Jin Kwak (pp. 305-314). Security Management Architecture for Secure Smartwork Center, Yun Sang Byun and Jin Kwak (pp. 315-320). Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues, Mehdi Maleknasab, Moazam Bidaki and Ali Harounabadi (pp. 321-342). A Study on Differential User Authentication Scheme based on Client in Home Network, Changhoon Lee, Woongryul Jeon, Dongho Won (pp. 343-354). A Multi-Stage Fingerprint Recognition Method for Payment Verification System, Woong-Sik Kim (pp. 355-364). Relative Importance Analysis of inter-evaluation items in Korean IS Standard Audit Checklist Using Decision making Techniques, Boo-Hyung Lee (pp. 365-376). A Novel Image Encryption Using Arnold Cat, Pan Tian-gong and Li Da-yong (pp. 377-386). An Improved Overlap-Key-Sharing Key Management Scheme for Wireless Sensor Networks, Li Lan Ying, Yi Chun Huan, Sun Jian Da and Si Tie Qiang (pp. 387-396). An Encryption Method for QR Code Image Based on ECA, Yu Xiaoyang, Song Yang, Yu Yang, Yu Shuchun, Cheng Hao and Guan Yanxia (pp. 397-406). Design of Active Frequency Selective Surfaces for the RCS Reduction, Guo hui Yang, Shuang Ma, Er chao Wang, Yuemei Qin and Xuemai Gu (pp. 407-414). Byte-index Chunking Algorithm for Data Deduplication System, Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Chuck Yoo and Young Woong Ko (pp. 415-424). Development and Analysis of an Information Security Learning Method using Situation-based Problems, Yungyeong Ko, Seonghee Lee and Seong Baeg Kim (pp. 425-434).