Abstract is missing.
- Cellular semi-systolic Montgomery Multiplier on finite fieldsKee-Won Kim, Jun-Cheol Jeon. 1-5 [doi]
- Intention awareness in cyber securityNewton Howard, Sergey Kanareykin. 6-11 [doi]
- OF-SMED: An optimal foreground detection method in surveillance system for traffic monitoringK. SuganyaDevi, N. Malmurugan, R. Sivakumar. 12-17 [doi]
- A new security mechanism for vehicular communication networksGhassan Samara, Wafaa A. H. Ali Alsalihy. 18-22 [doi]
- The new approach of Rijndael key scheduleSalasiah Sulaiman, Zaiton Muda, Julia Juremi. 23-27 [doi]
- SD-EI: A cryptographic technique to encrypt imagesSomdip Dey. 28-32 [doi]
- A novel network security algorithm based on private key encryptionAhmad Abusukhon, Mohammad Talib. 33-37 [doi]
- A proposal for improving AES S-box with rotation and key-dependentJulia Juremi, Ramlan Mahmod, Salasiah Sulaiman. 38-42 [doi]
- Combining encryption methods in multipurpose smart cardMaryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh. 43-48 [doi]
- Comparison of ECC and RSA algorithm in multipurpose smart card applicationMaryam Savari, Mohammad Montazerolzohour, Eng-Thiam Yeoh. 49-53 [doi]
- All about encryption in smart cardMaryam Savari, Mohammad Montazerolzohour. 54-59 [doi]
- Towards secure model for SCADA systemsFarid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin. 60-64 [doi]
- A study on optimization of security function for reducing vulnerabilities in SCADASung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung. 65-69 [doi]
- A propose technical security metrics model for SCADA systemsM. P. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin. 70-75 [doi]
- How secure is your smartphone: An analysis of smartphone security mechanismsSohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa. 76-81 [doi]
- Security framework for smart devicesAbdullahi Arabo, Fadi El-Moussa. 82-87 [doi]
- Investigating the accuracy of base station information for estimating cellphone locationLiam Smit, Adrie Stander, Jacques Ophoff. 88-93 [doi]
- Security metrics to improve misuse case modelAla A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir. 94-99 [doi]
- An economic model of security threats for cloud computing systemsLatifa Ben Arfa Rabai, Mouna Jouini, Marwa Nafati, Anis Ben Aissa, Ali Mili. 100-105 [doi]
- Enhancement of Asset value classification for Mobile devicesS. A. I. Yazid, M. A. Faizal, Rabiah Ahmad, S. Shahrin, Solahuddin Shamsuddin. 106-110 [doi]
- Evaluating fault tolerance in security requirements of web servicesDavoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi. 111-116 [doi]
- A transitive access control model for dynamic roles and attributesMark Evered. 117-121 [doi]
- Information security risk reduction based on genetic algorithmAlireza Tamjidyamcholo. 122-127 [doi]
- Trust model for private cloudEdna Dias Canedo, Rafael Timóteo de Sousa Júnior, Rhandy Rafhael de Carvalho, Robson de Oliveira Albuquerque. 128-132 [doi]
- Distributed Intrusion Detection trust management through integrity and expertise evaluationHadi KhorasaniZadeh, Norbik Bashah Idris, Jamalul-lail Ab Manan. 133-138 [doi]
- Leveraging Remote Attestation to enhance the Unified Trust Model for WSNsHamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan. 139-143 [doi]
- The role of Identity Management Systems in enhancing protection of user privacyAli Alkhalifah, John D'Ambra. 144-149 [doi]
- 3D body scanning technology: Privacy and ethical issuesSalah Bindahman, Nasriah Zakaria, Norsaadah Zakaria. 150-154 [doi]
- Finest authorizing member of common criteria certificationMohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha. 155-160 [doi]
- Model of trust management based on finite state machineCaiyi Zhu, Xiangkun Dai. 161-164 [doi]
- P2P dynamic trust management system based on trust networkXiangkun Dai, Caiyi Zhu, Yucui Guo. 165-170 [doi]
- Automated forensic extraction of encryption keys using behavioral analysisGareth Owen. 171-175 [doi]
- Identity crime: The challenges in the regulation of identity crimeEric Holm. 176-179 [doi]
- Copy-move forgery detection in digital images based on local dimension estimationXiaomei Quan, Hongbin Zhang. 180-185 [doi]
- Volatile memory acquisition using backup for forensic investigationFarhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin. 186-189 [doi]
- Forensics investigation challenges in cloud computing environmentsMohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin. 190-194 [doi]
- User-generated digital forensic evidence in graphic design applicationsEnos K. Mabuto, Hein S. Venter. 195-200 [doi]
- VoIP evidence model: A new forensic method for investigating VoIP malicious attacksMohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha. 201-206 [doi]
- Energy-efficient intrusion detection in Wireless Sensor NetworkSolmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir. 207-212 [doi]
- A Cloud-based Intrusion Detection Service frameworkW. Yassin, N. I. Udzir, Z. Muda, A. Abdullah, M. T. Abdullah. 213-218 [doi]
- Hierarchical secure virtualization model for cloudSina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah. 219-224 [doi]
- Multiple trusted devices authentication protocol for ubiquitous computing applicationsKamarularifin Abd. Jalil, Qatrunnada Binti Abdul Rahman. 225-229 [doi]
- A New approach using redundancy technique to improve security in cloud computingMohammed A. Alzain, Ben Soh, Eric Pardede. 230-235 [doi]
- Performance of LTE Release 8 and Release 10 in wireless communicationsM. F. L. Abdullah, A. Z. Yonis. 236-241 [doi]
- SASy username and password management on the cloudMajid Nasirinejad, Alireza Ahmadian Yazdi. 242-246 [doi]
- Simple port knocking method: Against TCP replay attack and port scanningFakariah Hani Mohd Ali, Rozita Yunos, Mohd Azuan Mohamad Alias. 247-252 [doi]
- Runtime monitors for tautology based SQL injection attacksRamya Dharam, Sajjan G. Shiva. 253-258 [doi]
- A centralized detection and prevention technique against ARP poisoningSumit Kumar, Shashikala Tapaswi. 259-264 [doi]
- An overview of attacks against digital watermarking and their respective countermeasuresMaryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim. 265-270 [doi]
- An enhanced remote authentication scheme to mitigate man-in-the-browser attacksFazli Bin Mat Nor, Kamarularifin Abd. Jalil, Jamalul-lail Ab Manan. 271-276 [doi]
- Improving keystroke dynamics authentication system via multiple feature fusion schemePin Shen Teh, Shigang Yue, Andrew Beng Jin Teoh. 277-282 [doi]
- The problem to consent to the collection, use, and disclosure of personal information in cyberspaceThilla Rajaretnam. 283-288 [doi]
- An assessment of U.S. legislation on cybersecurityAcklyn Murray, Sherali Zeadally, Angelyn Flowers. 289-294 [doi]
- Cyber military strategy for cyberspace superiority in cyber warfareJung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung. 295-299 [doi]
- Analysis of online messages for identity tracing in cybercrime investigationS. M. Nirkhi, Rajiv V. Dharaskar, V. M. Thakre. 300-305 [doi]
- Data breach on the critical information infrastructures: Lessons from the WikileaksIda Madieha Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot. 306-311 [doi]
- 2 - Featuring socio-technical cyber security warning systemsBilal Al Sabbagh, Stewart Kowalski. 312-316 [doi]
- An alert fusion model inspired by artificial immune systemMohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid. 317-322 [doi]
- Understanding cyber terrorism: The grounded theory method appliedRabiah Ahmad, Zahri Yunos, Shahrin Sahib. 323-328 [doi]
- Discovering security vulnerabilities and leaks in ASP.NET websitesHuyam Al-Amro, Eyas El-Qawasmeh. 329-333 [doi]