Skip to content
NADIA

IJSIA Vol. 9, No. 7, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 7, 2015 July
    • A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields, Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li and Yong Peng (pp. 1-16).
    • An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment, N. Ch. S. N. Iyengar and Gopinath Ganapathy (pp. 17-36).
    • Clean Development Mechanism and Its Risk Management Policy in Urban Infrastructure Construction, Zhou Jun, Zhang Hongwei and Liu Yingjia (pp. 37-48).
    • Niederreiter Cascade Combination Cryptosystem Based on the Double Public Keys, Zhou Xue Guang, Li Zhong Yuan, Wang Hao Tian and Qv Cheng Qin (pp. 49-58).
    • A Deformed Shape Detection Scheme Using Time Series Images, Hoejung Jung and Namgi Kim (pp. 59-68).
    • Network Attack Defense Awareness based on Dynamic Game, Man Li and Jinjing Cao (pp. 69-78).
    • Multimodal Biometric Recognition System for Cloud Robots, Shuqing Tian, Sung Gyu Im and Suk Gyu Lee (pp. 79-88).
    • Dynamic Awareness Method for Network Threats based on Rough Vulnerability Relation Model, Jieyun Xu and Hongzhen Xu (pp. 89-98).
    • Collaborative Filtering Recommendation Algorithm based on Trust Propagation, Miao Duan (pp. 99-108).
    • Anomaly Recognition in Online Social Networks, Ashish Rawat, Gunjan Gugnani, Minakshi Shastri and Pardeep Kumar (pp. 109-118).
    • Research on Mobile E-business Security Model based on WPKI Technology and its Application, Yongsheng Luo (pp. 119-128).
    • E-Commerce Security in Rural Tourism based on Factor Analysis, Hui Song and Ling Wu (pp. 129-140).
    • A Study on Effectiveness using Security Routing based on Mobile Ad-hoc Networks, Cheol-seung Lee (pp. 141-152).
    • A Density-based Binary SVM Algorithm inthe Cloud Security, Mingyuan Yu, Shuhang Huang, Qing Yu, Yan Wang, and Jiaquan Gao (pp. 153-162).
    • Cultivating and Assessing an Organizational Information Security Culture; an Empirical Study, Areej Al Hogail (pp. 163-178).
    • The Study of Access Control Model Using XML, Huanming Zhang, Quanlong Guan and Weiqi Luo (pp. 179-188).
    • A Novel Safe File Sharing Method Based on Cloud Storage Structure in DHT Networks, Zhongning Lu and Gaofeng Shen (pp. 189-200).
    • Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code, Wen-Chuan Wu (pp. 201-216).
    • Secret Sharing-Based Chaotic Image Encryption, Tiejun Zhang, Aya El-Fatyany, Li Li, Mohamed Amin, Ahmed A. Abd El -Latif (pp. 217-224).
    • A Novel Fault Diagnosis Framework Based on Reliability Analysis and Arithmetic Circuit, Rongxing Duan, Du Chen and Jinghui Fan (pp. 225-240).
    • A Comparison of the 3DES and AES Encryption Standards, Noura Aleisa (pp. 241-246).
    • Load Spectrum and Fatigue Life Computer Analysis of Prestressed Concrete Bridges, Xin Qin, Dou Yuanming and Chen Wan (pp. 247-266).
    • SSTL Based Power Efficient Implementation of DES Security Algorithm on 28nm FPGA, Bishwajeet Pandey, Vandana Thind, Simran Kaur Sandhu, Tamanna Walia and Sumit Sharma (pp. 267-274).
    • An Efficient Secure DV-Hop Localization for Wireless Sensor Network, Xiaole Liu, Rui Yang and Qingmin Cui (pp. 275-284).
    • Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function, Xiangjun Xin, Xiaolin Hua, Jianpo Song and Fagen Li (pp. 285-292).
    • Wormhole Attack in Mobile Ad-hoc Network: A Survey, Akansha Shrivastava and Rajni Dubey (pp. 293-298).
    • Researching Indistinguishability of the Polymorphism Time Stamp Watermarking, Yifeng Yin, Heyu Wen and Kunpeng Fan (pp. 299-306).
    • NSPK Protocol Security Model Checking System Builder, Wang Yan and Liu Ying (pp. 307-316).
    • A Hybrid Attribute based RBAC Model, Ting Cai, Jian Zheng and Xing Du (pp. 317-328).
    • Cryptanalysis of a Certificateless Ring Signcryption Scheme, Hongzhen Du and Qiaoyan Wen (pp. 329-336).
    • Security Authentication Method of Terminal Trusted Access in Smart Grid, Yufeng Wang, Lie Wu and Yun Yang (pp. 337-346).
    • Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT, Jung ho Eom (pp. 347-356).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA