Journal: J. Internet Serv. Inf. Secur.

Volume 9, Issue 4

1 -- 17Ram B. Basnet, Riad Shash, Clayton Johnson, Lucas Walgren, Tenzin Doleck. Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks
18 -- 38Mohammad Shahadat Hossain, Fatema-Tuj-Johora, Karl Andersson 0001. A Belief Rule Based Expert System to Assess Hypertension under Uncertainty
39 -- 48Ki-Chang Kim, Eunbyeol Ko, Jinsung Kim, Jeong Hyun Yi. Intelligent Malware Detection Based on Hybrid Learning of API and ACG on Android
49 -- 58Zhe Tu, Huachun Zhou, Kun Li, Guanglei Li. DCTG : Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network
59 -- 67Jaewoong Kang, Jongmo Kim, Mye M. Sohn. Supervised learning-based Lifetime Extension of Wireless Sensor Network Nodes
68 -- 77Hye Lim Jeong, Sung K. Ahn, Sung Hoon Baek, Ki-Woong Park. Anomaly Detection Technology Using Potential Difference Displacement Detection of Data Bus

Volume 9, Issue 3

1 -- 20Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor V. Kotenko, Artem Tishkov, Nina Vanchakova, Andrey Chechulin. Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks
21 -- 40Chatchai Punriboon, Chakchai So-In, Phet Aimtongkham, Kanokmon Rujirakul. A Bio-Inspired Capacitated Vehicle-Routing Problem Scheme Using Artificial Bee Colony with Crossover Optimizations
41 -- 51Noriki Uchida, Goshi Sato, Yoshitaka Shibata. Device-to-Device Communication based DTN for Disaster Information System by using Emergent User Policy and Locational Information
52 -- 73Matthias Eckhart, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl. Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges
74 -- 97Chao-Tung Yang, Shuo-Tsung Chen, Wei-Hsiang Lien, Vinod Kumar Verma. Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies

Volume 9, Issue 2

1 -- 30Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, Fuhong Lin. Survey on Blockchain for Internet of Things
31 -- 41Yuanhao Wang, Meiyan Xiao, Ying Miao, Wenbo Liu, Qiong Huang. Signature Scheme from Trapdoor Functions
42 -- 56Hyun-Bae Park, Yongeun Kim, Jaeseok Jeon, Heeseok Moon, Samuel Woo. Practical Methodology for In-Vehicle CAN Security Evaluation
57 -- 71Heather Craddock, Lakshmi Prasanna Konudula, Gökhan Kul. A Survey on the Challenges of Implementing Physical Memory Pools

Volume 9, Issue 1

1 -- 0Ilsun You. Letter from the Editor-in-Chief
2 -- 23Shingo Sato, Shoichi Hirose, Junji Shikata. Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality
24 -- 47Emre Suren, Pelin Angin. Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits
48 -- 59Jaemin Jung, Hyun-Jin Kim, Seong Je Cho, Sangchul Han, Kyoungwon Suh. Efficient Android Malware Detection Using API Rank and Machine Learning
60 -- 73Yi-Chih Kao, Jui-Chun Liu, You-Hong Wang, Yu-Huang Chu, Shi-Chun Tsai, Yi-Bing Lin. Automatic Blocking Mechanism for Information Security with SDN