2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2014 2014 Volume 8, Number 5, 2014 September Verifiable Text Watermarking Detection to Improve Security, Zhangjie Fu, Xingming Sun, Jiangang Shu, Lu Zhou and Jin Wang (pp. 1-10). Weakness Cryptanalysis of Liao’s Scheme and Improved Remote User Authentication Scheme for Mobile Device, Hie Do Kim and Kwang Cheul Shin (pp. 11-20). A Scenario-Based Information Security Risk Evaluation Method, Xiaofang Ban and Xin Tong (pp. 21-30). Violent Behavior Detection Based on SVM in the Elevator, Guang Shu, Gaojing Fu, Peng Li and Haiyu Geng (pp. 31-40). Canny Edge Detection Based On Iterative Algorithm, Xumin Liu, Xiaojun Wang and Zilong Duan (pp. 41-50). A Defense Mechanism for EOLSR against DOS Attacks in Ad hoc Networks Using Trust Based System, Banothu Balaji, Mohammed Hassan Khan, T.S.N. Murthy and Tai-hoon Kim (pp. 51-64). Transformer Fault diagnosing method based on Extenics and Rough Set theory, Gefei Qiu, Zhaoxiang Xie, Sheng Huang, Yunjie Zuo and Zejiang Hu (pp. 65-74). A Cascading Neural Network Ensemble for Locating Faults of Large-scale Information Systems, Chen Zhifeng, Peng Minjing and Li Bo (pp. 75-84). Usability Analysis on Security of E-mail Accounts: Differences between Fantasy and Reality, Zara Tariq and Ramsha Arif (pp. 85-96). An Efficient Provable Data Possession based on Elliptic Curves in Cloud Storage, Hongyuan Wang, Liehuang Zhu, Feng Wang, Yijia Lilong, Yu Chen, Chang Liu (pp. 97-108). Alert Management System using K-means Based Genetic for IDS, Mohammad Masdari and Fatemeh Charlank Bakhtiari (pp. 109-118). Traffic-based Malicious Switch Detection in SDN, Xiaodong Du, Ming-Zhong Wang, Xiaoping Zhang and Liehuang Zhu (pp. 119-130). A Lightweight Trust-based Access Control Model in Cloud-Assisted Wireless Body Area Networks, Xu Wu (pp. 131-138). Watermarking Application Using Bit Plane Allocation, Gwanggil Jeon (pp. 139-148). Trust-based Access Control Model in Multi-domain Environment, Zhang Qikun, Wang Ruifang, Qu Jiaqing, Gan yong and Zheng Jun (pp. 149-160). A Novel Approach to Identify a Fraud Website Using Android Smartphone under the Collaborative Frameworks of QR Codes and GPS and Motion Parameters of the User, Soham Sengupta, Deabsree Chanda Sarkar, S. Biswas and ParthaPratim Sarkar (pp. 161-184). A Network Coding Based Privacy-Preservation Scheme for Online Service Access in VANET, Jizhao Liu and Quan Wang (pp. 185-194). Data Recovery Method for Seafood Quality Safety System Based on Rough Set Theory, Xu E, Shuang Lin and Lulu Jin (pp. 195-202). Robust Emotion Recognition Algorithm for Ambiguous Facial Expression using Optimized AAM and k-NN, Yong-Hwan Lee, Wuri Han, Youngseop Kim and Cheong-Ghil Kim (pp. 203-212). Authorization Estimation Model: An Object Oriented Design Complexity Perspective, Suhel Ahmad Khan and Raees Ahmad Khan (pp. 213-226). A SVM-based IDS Alarms Filtering Method, Yun Liu, Kun-Peng Xia and Jian-Xun Zhao (pp. 227-242). Incremental Eigenspace Model Applied to Monitoring System, Byung Joo Kim (pp. 243-252). A Block Discriminant Analysis for Face Recognition, Peng Cui (pp. 253-264). A Method to Construct Dual-Kernel Trusted Computing Environment on Embedded System, Kong Xiangying, Chen Yanhui and Chen Xuebing (pp. 265-276). One Hamming Distance Deviation Matching Approach For Iris Recognition, Lv Hanfei and Jiang Congfeng (pp. 277-290). A Blind Holographic Image Watermarking Algorithm based on Dual Transform Domains and Visual Cryptography, Xiao Luo, DaYou Jiang and De Li (pp. 291-302). A Study of Key management Protocol for Secure Communication in Personal Cloud Environment, ByungWook Jin and Keun-Wang Lee (pp. 303-310). An Effective Intrusion Detection System Based onMulti-layers Mining Methods, Ming Yao (pp. 311-322). Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace, Jung ho Eom (pp. 323-332). Improvement on Lin et al’s Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce, Caixue Zhou (pp. 333-348). A robust Optimal Zero-Watermarking Technique for Secret Watermark Sharing, Jumana Waleed, Huang Dong Jun and Saad Hameed (pp. 349-360). Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks, Reham Abdellatif Abouhogail (pp. 361-376). An efficient algorithm for image copy-move forgery detection based on DWT and SVD, Feng Liu and Hao Feng (pp. 377-390). A Novel Method for Detection of Internet Worm Malcodes using Principal Component Analysis and Multiclass Support Vector Machine, S. Divya and G. Padmavathi (pp. 391-402). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN), Abdul Fuad Abdul Rahman, Rabiah Ahmad and Madihah Zulfa Mohamad (pp. 403-420). Research on Insecure Impact of Inflation upon Capital Structure, Chunlin Li and Ming Zhang (pp. 421-426). Contextual Security with IF-MAP, Abdelmajid Lakbabi, Ghizlane Orhanou and Said El Hajji (pp. 427-438). Robust Watermarking against Geometric Attacks using Multiple Parameter Discrete Fractional Fourier Transform and Least Significant Bit Technique, Deepak Sharma, Rajiv Saxena and Narendra Singh (pp. 439-456). The Research of Secure Transport Protocol Based on Node’s Clock Characteristics for Body Area Networks, Tan Jin andWang Yijing (pp. 457-470).