2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2015 2015 Volume 9, Number 11, 2015 November Research on Modification and Optimization of Network Topology and Internet Security based on Neural Network Structure and Mathematical Optimization, Gaoli Zhao, Junping Song and Wei Chen (pp. 1-12). Achieve Fairness in Rational Secret Sharing Protocol, Wang Jie (pp. 13-22). Secured Data Sharing based on Information Centric Trust in the Internet of Vehicles, Eun-Kyu Lee and Ki Young Lee (pp. 23-34). Optimization of Dynamic Programming to the Multimedia Packets Processing Method for Network Intrusion Detection System, Xu Zhao, Jin Jiang and Max Stinnett (pp. 35-46). Malicious Processor Detection based on the Security Agent, Seong-Muk Choi, Yeol-Joo Ryou, Hoo-Ki Lee, Hee-Hoon Cho and Jong-Bae Kim (pp. 47-54). A New MAC Protocol PB-TDMA for WSNs Based on Event-driven, Hui Wang, Xuefeng Li, Yunfeng Wang (pp. 55-62). Evaluation and Prediction of Driver’s Bad Driving Behavior Based on the Moving Vehicle Attitude, Huaikun Xiang, Shaopeng Yang, Shi An and Shaoyun Ren (pp. 63-76). Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication, Shafiq Ul Rehman and Selvakumar Manickam (pp. 77-86). Research on Operating Performance and E-business Marketing Strategy in Retail Enterprises based on Online Shopping, Yongqiang Zhang, Yanlei Gao, Xiang Li and Duchun Wang (pp. 87-96). Botnet Detection Based on Genetic Neural Network, Chunyong Yin, Ardalan Husin Awlla, Zhichao Yin and Jin Wang (pp. 97-104). Draft of National Cybersecurity Act, Dea-woo Park (pp. 105-112). The RAS Scheduling Algorithm Based on 802.11n WIFI Router, Meng Han,Wenyu Chen, Wei Pi, Wen Li and Ru Zeng (pp. 113-124). Hybrid Key Management Scheme for Wireless Sensor Networks, R.Sharmila and V.Vijayalakshmi (pp. 125-132). Approaches of Collaborative Cloud Process Service: Constructing Service-Oriented Architecture, Chen Wang, Wu Zhao, Jie Wang and Ling Chen (pp. 133-144). Identification of Software NFR based on the Fuzzy-QFD Model, Shucheng Xiao, Jiafeng Wu, Erhua He and Zhendong Yang (pp. 145-154). Ensuring Data Confidentiality and Authentication through Encryption at Application Layer, Kaleem Ullah, M.N.A. Khan (pp. 155-166). The Invulnerability Studies on Data Center Network, Kai Peng and Binbin Huang (pp. 167-186). State of the Art of finite GMM Based Biometrics Face Authentication Systems, Soltane Mohamed (pp. 187-200). Machining Surface Quality Analysis of Aluminum Alloy Thin-Walled Parts in Aerospace, Dai Bing, Yu Guang-bin, Guan Yan-qi, Shao Jun-peng,Guan Yan-qi, Wu Xue-mei, Liu Yu-xin (pp. 201-208). Chinese Word Sense Disambiguation Based on Beam Search, Zhang Chun-Xiang, He Shan, Gao Xue-Yao and Lu Zhi-Mao (pp. 209-216). Implementation of Schnorr Signcryption Algorithm on DSP, Aya Elshobaky, Mohamed Rasslan and Shawkat Guirguis (pp. 217-230). Improved Subgraph estimation PageRank Algorithm for Web Page Rank, Lanying Li, Qiuli Zhou, Yin Kong and Yiming Dong (pp. 231-238). Network Intrusion Detection Model With Clustering Ensemble Method, Liang-Wei Chen (pp. 239-250). Network Security and Metrology: A Survey, Reham Abdellatif Abouhogail (pp. 251-270). A Trust-based Immune Strategy for File Pollution in P2P Networks, Xianwei Xu (pp. 271-280). A Novel Image Encryption Method Based On Couple Mapped Lattice and Two-Stage Diffusion, Yunsheng Zhong and Xu Xu (pp. 281-292). A Modular-Arithmetic-Based Encryption Scheme, Odule, Tola John, Awodele O. (pp. 293-302). A Security DV-Hop Localization Algorithm Resist Spoofing Attack, Wanli Zhang, Qixiang Song (pp. 303-312). A Key Pre-distribution Scheme Based on Deployment Information, Shulan Xia, Jilin Wang, Ru-gang Wang (pp. 313-322). Cryptography Based Dynamic Multi-Keyword Ranked Search Using ECC/B+TRE, Prasanna B T, C B Akki (pp. 323-336). Research on College Students’ English Learning Based on Network Language Differences between Chinese and English, Jun Liu (pp. 337-346). Reversing Bytecode of Obfuscated Java Based Smart Card Using Side Chanel Analysis, Mohammed Amine Kasmi, Mostafa Azizi and Jean-Louis Lanet (pp. 347-356). The Dynamic Effects of Psychological Contract to College Physical Education Teachers: an Network Organization Perspective, Yuan Xiaozhi, Wan Ping, Zhou Hang and Li Zhenliang (pp. 357-366). An Improved Decision-Making Model for Multimedia Teaching and College Students’ Physical Health: an Empirical Analysis of Wushu Education, Wei Dongyi, Zhang Yan and Ruan Xiaojuan (pp. 367-376). Optimization of Rao-Blackwellized Particle Filter in Activity Pedestrian Simultaneously Localization and Mapping (SLAM): An Initial Proposal, Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad and Raja Zahilah Raja Mohd Radzi (pp. 377-390). A Stealthy Attack Against Tor Guard Selection, Quangang Li, Peipeng Liu and Zhiguang Qin (pp. 391-402). Mechanism on Computer Access Permission Management Based on the Proposed Dynamic Password Algorithm, Jiujun Cheng, Yang Yang, Jianyu Shao, Jingxue Liao (pp. 403-418). Anonymous Password-based Authenticated Key Agreement Scheme with Non-tamper Resistant Smart Cards, Yunghee Lee, Hyunsung Kim (pp. 419-428). Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol, Daming Hu, Deyun Chen, Yuanxu Zhang and Shujun Pei (pp. 429-438).