Skip to content
NADIA

IJSIA Vol. 9, No. 11, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 11, 2015 November
    • Research on Modification and Optimization of Network Topology and Internet Security based on Neural Network Structure and Mathematical Optimization, Gaoli Zhao, Junping Song and Wei Chen (pp. 1-12).
    • Achieve Fairness in Rational Secret Sharing Protocol, Wang Jie (pp. 13-22).
    • Secured Data Sharing based on Information Centric Trust in the Internet of Vehicles, Eun-Kyu Lee and Ki Young Lee (pp. 23-34).
    • Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System, Xu Zhao, Jin Jiang and Max Stinnett (pp. 35-46).
    • Malicious Processor Detection based on the Security Agent, Seong-Muk Choi, Yeol-Joo Ryou, Hoo-Ki Lee, Hee-Hoon Cho and Jong-Bae Kim (pp. 47-54).
    • A New MAC Protocol PB-TDMA for WSNs Based on Event-driven, Hui Wang, Xuefeng Li, Yunfeng Wang (pp. 55-62).
    • Evaluation and Prediction of Driver’s Bad Driving Behavior Based on the Moving Vehicle Attitude, Huaikun Xiang, Shaopeng Yang, Shi An and Shaoyun Ren (pp. 63-76).
    • Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication, Shafiq Ul Rehman and Selvakumar Manickam (pp. 77-86).
    • Research on Operating Performance and E-business Marketing Strategy in Retail Enterprises based on Online Shopping, Yongqiang Zhang, Yanlei Gao, Xiang Li and Duchun Wang (pp. 87-96).
    • Botnet Detection Based on Genetic Neural Network, Chunyong Yin, Ardalan Husin Awlla, Zhichao Yin and Jin Wang (pp. 97-104).
    • Draft of National Cybersecurity Act, Dea-woo Park (pp. 105-112).
    • The RAS Scheduling Algorithm Based on 802.11n WIFI Router, Meng Han,Wenyu Chen, Wei Pi, Wen Li and Ru Zeng (pp. 113-124).
    • Hybrid Key Management Scheme for Wireless Sensor Networks, R.Sharmila and V.Vijayalakshmi (pp. 125-132).
    • Approaches of Collaborative Cloud Process Service: Constructing Service-Oriented Architecture, Chen Wang, Wu Zhao, Jie Wang and Ling Chen (pp. 133-144).
    • Identification of Software NFR based on the Fuzzy-QFD Model, Shucheng Xiao, Jiafeng Wu, Erhua He and Zhendong Yang (pp. 145-154).
    • Ensuring Data Confidentiality and Authentication through Encryption at Application Layer, Kaleem Ullah, M.N.A. Khan (pp. 155-166).
    • The Invulnerability Studies on Data Center Network, Kai Peng and Binbin Huang (pp. 167-186).
    • State of the Art of finite GMM Based Biometrics Face Authentication Systems, Soltane Mohamed (pp. 187-200).
    • Machining Surface Quality Analysis of Aluminum Alloy Thin-Walled Parts in Aerospace, Dai Bing, Yu Guang-bin, Guan Yan-qi, Shao Jun-peng,Guan Yan-qi, Wu Xue-mei, Liu Yu-xin (pp. 201-208).
    • Chinese Word Sense Disambiguation Based on Beam Search, Zhang Chun-Xiang, He Shan, Gao Xue-Yao and Lu Zhi-Mao (pp. 209-216).
    • Implementation of Schnorr Signcryption Algorithm on DSP, Aya Elshobaky, Mohamed Rasslan and Shawkat Guirguis (pp. 217-230).
    • Improved Subgraph estimation PageRank Algorithm for Web Page Rank, Lanying Li, Qiuli Zhou, Yin Kong and Yiming Dong (pp. 231-238).
    • Network Intrusion Detection Model With Clustering Ensemble Method, Liang-Wei Chen (pp. 239-250).
    • Network Security and Metrology: A Survey, Reham Abdellatif Abouhogail (pp. 251-270).
    • A Trust-based Immune Strategy for File Pollution in P2P Networks, Xianwei Xu (pp. 271-280).
    • A Novel Image Encryption Method Based On Couple Mapped Lattice and Two-Stage Diffusion, Yunsheng Zhong and Xu Xu (pp. 281-292).
    • A Modular-Arithmetic-Based Encryption Scheme, Odule, Tola John, Awodele O. (pp. 293-302).
    • A Security DV-Hop Localization Algorithm Resist Spoofing Attack, Wanli Zhang, Qixiang Song (pp. 303-312).
    • A Key Pre-distribution Scheme Based on Deployment Information, Shulan Xia, Jilin Wang, Ru-gang Wang (pp. 313-322).
    • Cryptography Based Dynamic Multi-Keyword Ranked Search Using ECC/B+TRE, Prasanna B T, C B Akki (pp. 323-336).
    • Research on College Students’ English Learning Based on Network Language Differences between Chinese and English, Jun Liu (pp. 337-346).
    • Reversing Bytecode of Obfuscated Java Based Smart Card Using Side Chanel Analysis, Mohammed Amine Kasmi, Mostafa Azizi and Jean-Louis Lanet (pp. 347-356).
    • The Dynamic Effects of Psychological Contract to College Physical Education Teachers: an Network Organization Perspective, Yuan Xiaozhi, Wan Ping, Zhou Hang and Li Zhenliang (pp. 357-366).
    • An Improved Decision-Making Model for Multimedia Teaching and College Students’ Physical Health: an Empirical Analysis of Wushu Education, Wei Dongyi, Zhang Yan and Ruan Xiaojuan (pp. 367-376).
    • Optimization of Rao-Blackwellized Particle Filter in Activity Pedestrian Simultaneously Localization and Mapping (SLAM): An Initial Proposal, Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad and Raja Zahilah Raja Mohd Radzi (pp. 377-390).
    • A Stealthy Attack Against Tor Guard Selection, Quangang Li, Peipeng Liu and Zhiguang Qin (pp. 391-402).
    • Mechanism on Computer Access Permission Management Based on the Proposed Dynamic Password Algorithm, Jiujun Cheng, Yang Yang, Jianyu Shao, Jingxue Liao (pp. 403-418).
    • Anonymous Password-based Authenticated Key Agreement Scheme with Non-tamper Resistant Smart Cards, Yunghee Lee, Hyunsung Kim (pp. 419-428).
    • Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol, Daming Hu, Deyun Chen, Yuanxu Zhang and Shujun Pei (pp. 429-438).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA