Abstract is missing.
- Impact of Finger Type in Fingerprint AuthenticationDavrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch. 1-7 [doi]
- Using Arabic CAPTCHA for Cyber SecurityBilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz AlAjaji. 8-17 [doi]
- Information Assurance in Saudi Organizations - An Empirical StudySyed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar. 18-28 [doi]
- Emerging Biometric Modalities: Challenges and OpportunitiesDavrondzhon Gafurov. 29-38 [doi]
- On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLPJu-Sung Kang, Okyeon Yi. 39-46 [doi]
- Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in PakistanSyed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar. 47-56 [doi]
- Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMONKenji Yamamoto, Toshihiro Yamauchi. 57-67 [doi]
- Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded DeviceBo-Heung Chung, Jung-nye Kim. 68-73 [doi]
- Secure OSGi Platform against Service InjectionIntae Kim, Keewook Rim, Junghyun Lee. 74-83 [doi]
- A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU AbuseToshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi. 84-93 [doi]
- Probabilistic Route Selection Algorithm for IP TracebackHong-bin Yim, Jae-Il Jung. 94-103 [doi]
- An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright ProtectionPranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong Myon Kim. 104-113 [doi]
- Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic ModelPranab Kumar Dhar, Cheol Hong Kim, Jong Myon Kim. 114-125 [doi]
- Histogram-Based Reversible Data Hiding with Quadtree ConceptsHsiang-Cheh Huang, Ting-Hsuan Wang, Wai-Chi Fang. 126-133 [doi]
- MAS: Malware Analysis System Based on Hardware-Assisted Virtualization TechnologyTaehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom. 134-141 [doi]
- Performance Analysis of Cyber Security Awareness Delivery MethodsJemal H. Abawajy, Tai-Hoon Kim. 142-148 [doi]
- Proxy Re-encryption with Keyword Search: New Definitions and AlgorithmsWei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi. 149-160 [doi]
- One-Time Password System with Infinite Nested Hash ChainsMohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar. 161-170 [doi]
- Optimal Intelligent Supervisory Control System in Cyber-Physical IntelligenceHoon Ko, Zita Vale. 171-178 [doi]
- Improved Hip-Based Individual Recognition Using Wearable Motion Recording SensorDavrondzhon Gafurov, Patrick Bours. 179-186 [doi]
- Fusion of Moving and Static Facial Features for Robust Face RecognitionDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing. 187-196 [doi]
- Human Authentication Based on ECG Waves Using Radon TransformChetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 197-206 [doi]
- Wireless Network Security Vulnerabilities and ConcernsMushtaq Ahmad. 207-219 [doi]
- Figment Authentication Scheme in Wireless Sensor NetworkNagaraj Ambika, G. T. Raju. 220-223 [doi]
- Issues of Security and Network Load in Presence - A SurveyZeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid. 224-230 [doi]
- Discovering the Botnet Detection TechniquesAneel Rahim, Fahad Bin Muhaya. 231-235 [doi]
- Contactless Biometrics in Wireless Sensor Network: A SurveyMuhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar. 236-243 [doi]
- A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I SystemsAbdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, Khalid Al-Nafjan. 244-249 [doi]
- Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau. 250-258 [doi]
- Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT ModelWei Huang, Arthur Mynnet. 259-268 [doi]
- Internet SCADA Utilizing API's as Data SourceRosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim. 269-275 [doi]
- Insecure Information System's Solution Using Isolation MethodMaricel O. Balitanas, Tai-Hoon Kim. 276-281 [doi]
- Communication Security for Control Systems in Smart GridRosslin John Robles, Tai-Hoon Kim. 282-289 [doi]
- NMACA Approach Used to Build a Secure Message Authentication CodeRaed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy. 290-298 [doi]