IJSIA Vol. 11, No. 1, 2017





        Conference Calendar

        Conference Gallery


        Organizer Tools

        Conference Support



ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017
Vol.11, No.12, 2017
Vol.12, No.1, 2018
Vol.12, No.2, 2018
Vol.12, No.3, 2018
Vol.12, No.4, 2018



  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • An BAN Logic Analysis Method Based on Yahalom Protocol, Ying Zhou, Lei Yu, Shaoming Pan, Zhibo Wang, Ying Zheng and Min Li (pp. 1-10).
    This paper has been removed because it was withdrawn by the Authors.
  • Hybrid Intrusion Detection System Using K-means and J-48, Manvir Singh and Jatinder Singh Bal (pp. 11-22).
  • Research on Defensive Strategy Selection in Network Security, Hong Li (pp. 23-34).
  • Research on Data Security Mechanism among Cloud Services based on Software Define Network, Zhao Wenbin, Fan Tongrang and Wang Hongsheng (pp. 35-44).
  • 128 Bit Hash of Variable Length in Short Message Service Security, Robbi Rahim (pp. 45-58).
  • User Identity Resolution Across Multi-Social Media, Zhibo Wang, Zhongyuan Li, Jiawen Sun, Qi Yin, Lu Gao and Xiaohui Cui (pp. 59-70).
  • A Defensive Mechanism based on PCA to Defend Denial-of-Service Attack, P. Rajesh Kanna, K. Sindhanaiselvan and M. K. Vijaymeena (pp. 71-82).
  • Analyzing the Resilience of the Employee Network in Joint-equity Commercial Banks, Shuliang Lv, Chuanchao Huang and Lanying Du (83-92).
  • Network Security Situation Prediction System Based on Neural Network and Big Data, Bowen Zhu, Yonghong Chen, Yiqiao Cai, Hui Tian and Tian Wang (pp. 93-108).
  • A Classification Scheme for Cybersecurity Models, Issa Atoum and Ahmed Otoom (pp. 109-120).
  • The Homomorphic Encryption Method for Cloud Computing Storage Security, Jun Wu and Jing Chen (pp. 121-134).
  • Greedy Modes of Data Integrity Attacks on Industrial Control Systems: A Case Study of Tennessee Eastman Process, Weize Li, Lun Xie, Yu Rong and Zhiliang Wang (pp. 135-148).
  • Video Authentication against Set of Temporal Tampering, Manish K Thakur, Vikas Saxena and J P Gupta (pp. 149-164).
  • Boomerang Analysis Method Based on Block Cipher, Fan Aiwan and Yang Zhaofeng (pp. 165-178).
  • Anonymous Authentication with Centralize Access Control of Data Storage in Cloud, Linawati, I Gede Totok Suryawan and Made Sudarma (pp. 179-192).
  • Analysis on Mechanism of Vegetation Slope Protection based on Security Perspective, Du Guangqian and Wang Shijie (pp. 193-202).
  • Multi-step Attack-oriented Assessment of Network Security Situation, Zhang Hengwei, Yang Haopu, Wang Jindong and Li Tao (pp. 203-218).
  • Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol, Rajeev Kumar Gupta, R. K. Pateriya , Ankita Patil (pp. 219-232).
  • A Study on Global Piracy Attacks’ Trends and Characteristics Based on Data Analysis, Zhongming Xiao, Zhongzhou Fan and Liangkun Xu (pp. 233-244).
  • Enhancement of Cloud Authorization System Using Predicate Logic, Sandeep Saxena, Gautam Sanyal and Shashank Srivastava (pp. 245-256).
  • A Robust and Secure Block-SVD based Embedding of Encrypted Watermark in Digital Images using RDWT, Sachin Gaur, Vinay Kumar Srivastava (pp. 257-270).
  • Bibliography