Skip to content
NADIA

IJSIA Vol. 9, No. 2, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 2, 2015 February
    • A Novel Location Privacy Preservation Method for Moving Object, Xu Zhang, Ying Xia and HaeYoung Bae (pp. 1-12).
    • An International Comparative Study on Cyber Security Strategy, Kyoung-Sik Min, Seung-Woan Chai and Mijeong Han (pp. 13-20).
    • The Improvement of Mean-Shift Algorithm in Target Tracking, Danping Jia, Lifeng Zhang and Chunhua Li (pp. 21-28).
    • Research on Improved ECC Algorithm in Network and Information Security, Xianmin Wei and Peng Zhang (pp. 29-36).
    • Implementation of Graphic Based Network Intrusion Detection System for Server Operation, Jun-Ho Huh, Donghoon Lee and Kyungryong Seo (pp. 37-48).
    • Analysis on Chaotic Characteristics of Software Project Risk System, Ying Qu and He Wang (pp. 49-60).
    • Selective Encryption Algorithm for GIS Vector Map Using Geometric Objects, Giao Pham Ngoc, Suk-Hwan Lee and Ki-Ryong Kwon (pp. 61-72).
    • Information Systems Security Assessment Based on System Dynamics, Liu Wei, Cui Yong-feng and Li Ya (pp. 73-84).
    • A Study on the Algorithm of Supply Chain Protection Based on Zero-sequence Compensation, JiangJun Yuan (pp. 85-96).
    • S3 (Secure Ship-to-Ship) Information Sharing Scheme using Ship Authentication in the e-Navigation, Seung-hee Oh, Daehee Seo and Byunggil Lee (pp. 97-110).
    • A Proof of Constructions for Balanced Boolean Function with Optimum Algebraic Immunity, Yindong Chen, Wei Tian and Ya-nan Zhang (pp. 111-122).
    • Analysis of Port Hopping for Proactive Cyber Defense, Yue-Bin Luo, Bao-Sheng Wang, Gui-Lin Cai (pp. 123-134).
    • Security Model of Stadium Evacuation Combined with Multi-agent and Cellular Automata, Xuesong Bai and Yingqi Qian (pp. 135-148).
    • Similarity Distance Noise Reduction of Entropy Based on Lifting KNN Classification Performance, Liu Jin-sheng, Guoxi Sun, Qinghua Zhang and He jun (pp. 149-158).
    • Security Protection Technology of Cyber-Physical Systems, Hong Ye (pp. 159-168).
    • Research and Improvement of Ordered Multisignature Algorithm in Random Oracle Model, Yonglong Tang (pp. 169-178).
    • Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography, Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Ishrat Batool and Muhammad Arif (pp. 179-188).
    • An efficient ID-based Beta Cryptosystem, Chandrashekhar Meshram (pp. 189-202).
    • An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach, Md. Syeful Islam (pp. 203-214).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA