Skip to content
NADIA

IJSIA Vol. 9, No. 4, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 4, 2015 April
    • Grey Relational Analysis for Route Choice Decision-making under Uncertain Information, Jianhu Zheng (pp. 1-8).
    • Proposed Method to Enhance the Performance of AOMDV under DDOS Attack, Singh Kulbir Kaur Waraich and Simar Preet Singh (pp. 9-18).
    • A Video Watermarking Algorithm based on Motion Vector, Shi Guochuan Shi, Guanyu Chen and Binhao Shi (pp. 19-24).
    • Perceived K-value Location Privacy Protection Method Based on LBS in Augmented Reality, Yang Yang (pp. 35-32).
    • Analysis on Supply and Demand Status of Information Protection of Human Resources in Korea, Seung-Woan Chai, Sang-Ho Jie and Kyoung-Sik Min (pp. 33-40).
    • Location Positioning and Privacy Preservation Methods in Location-based Service, Xu Zhang and Hae Young Bae (pp. 41-52).
    • Ontology-based Privacy Preserving Digital Forensics Framework, Xuejiao Wan, Jingsha He, Huanguang uang and Yonghao Mai (pp. 53-62).
    • A Hybrid Mitigation Technique for Malicious Network Traffic based on Active Response, EpiphaniouAyei E. Ibor and Gregory Epiphaniou (pp. 63-80).
    • Fusion Trust Relation and Rating Data Algorithm, Xiaofeng Li (pp. 81-90).
    • A Novel Lightweight Hybrid Intrusion Detection Method Using a Combination of Data Mining Techniques, Jatuphum Juanchaiyaphum, Ngamnij Arch -int, Somjit Arch-int andSaiyan Saiyod (pp. 91-106).
    • A Trust-based Stable Routing Protocol in Vehicular ad-hoc Networks, Junxia Ma and Chen Yang (pp. 107-116).
    • Low-Cost Round Encryption Method for Embedded System, Qi Yue, Luo Xinqiang and Wan Yadong (pp. 117-124).
    • Image Forgery Authentication and Classification using Hybridization of HMM and SVM Classifier, Mohammad Farukh Hashmi and Avinash G. Keskar (pp. 125-140).
    • Based on the Ant Colony Algorithm is a Distributed Intrusion Detection Method, Yiran Wang and Chunxia Wang (pp. 141-152).
    • Systems Ensuring Quality in Biometric Systems, Md. Mahbubur Rahman, Amit Karmaker, Md.Mahmudul Hasan and Samsuddin Ahmed (pp. 153-160).
    • Study on Reliability Optimization Problem of Computer Network, Liang Lei (pp. 161-174).
    • A Robust Watermarking Scheme Based on Least Significant Bit and Discrete Cosine Transform, Zhou Fu-an (pp. 175-184).
    • Clone Detection Using Enhanced EDD (EEDD) with Danger Theory in Mobile Wireless Sensor Network, L. S. Sindhuja and G. Padmavathi (pp. 185-202).
    • Blind Watermarking Scheme based on U matrix Through QSVD Transformation, Feng Liu, Hao Feng and Chao Lu (pp. 203-216).
    • A User Access Control Scheme for Reducing Authentication Keys in Cloud Systems, Seungtae Hong, Hyeongil Kim, Taehoon Kim and Jaewoo Chang (pp. 217-228).
    • Unsupervised Extraction of Signatures and Roles from Large-Scale Mail Archives, Yuan Xiaoqin (pp. 229-238).
    • Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security, R. Divya and V. Vijayalakshmi (pp. 23-246).
    • Research on Intrusion Detection Algorithm Based on BP Neural Network, Chunmin Qiu, Jie Shan (pp. 247-258).
    • ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method, Wang Xingzhu (pp. 259-270).
    • Authentication Model for Location based Queries, Roshan S. Deshmukh and D. G. Harkut (pp. 271-278).
    • Real-valued Dual Negative Selection Technique for Intrusion Detection, Niu Ling and Feng Gao Feng (pp. 279-288).
    • A Revew and Compative Analysis of various Encryption Algorithms, Rajdeep Bhanot and Rahul Hans (pp. 289-306).
    • A Wavelet Transform Based Support Vector Machine Ensemble Algorithm and Its Application in Network Intrusion Detection, Xuesen Cai and Fanhua Yu (pp. 307-316).
    • Android’s External Device Attack: Demonstration and Security Suggestions, Zhang Wei, Yang Chao and Chen Yunfang (pp. 317-326).
    • Applying a Security Architecture with Key Management Framework to the Delay/Disruption Tolerant Networks, Gideon Rajan and Gihwan Cho (pp. 327-336).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA