- Archana Tiwari, Manisha Sharma. Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication. J. Information Security, 3(3):189-195, 2012.
- Alfredo Maesa, Fabio Garzia, Michele Scarpiniti, Roberto Cusani. Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models. J. Information Security, 3(4):335-340, 2012.
- Yaser Jararweh, Lo'ai Ali Tawalbeh, Hala Tawalbeh, Abidalrahman Moh'd. Hardware Performance Evaluation of SHA-3 Candidate Algorithms. J. Information Security, 3(2):69-76, 2012.
- Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff. Perception on Cyber Terrorism: A Focus Group Discussion Approach. J. Information Security, 3(3):231-237, 2012.
- Thomas Ndie Djotio, Claude Tangha, Guy Bertrand Fopak. MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents. J. Information Security, 3(4):281-294, 2012.
- Ilung Pranata, Geoff Skinner, Rukshan Athauda. A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment. J. Information Security, 3(1):25-38, 2012.
- Romany F. Mansour, W. F. Awwad, A. A. Mohammed. A Robust Method to Detect Hidden Data from Digital Images. J. Information Security, 3(2):91-95, 2012.
- Zachary Miller, Wei Hu. Data Stream Subspace Clustering for Anomalous Network Packet Detection. J. Information Security, 3(3):215-223, 2012.
- Ahmad Bakhtiyari Shahri, Zuraini Ismail. A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. J. Information Security, 3(2):169-176, 2012.
- Rasim M. Alguliev, Saadat A. Nazirova. Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem. J. Information Security, 3(1):11-17, 2012.