IJSIA Vol. 11, No. 4, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm, Gurpreet Kour Sodhi and Gurjot Singh Gaba (pp. 1-10).
  • An Improved Dendritic Cell Algorithm Based Intrusion Detection System for Wireless Sensor Networks, Weipeng Guo and Yonghong Chen (pp. 11-26).
  • Review of Vehicular Ad Hoc Network Security, Hari Krishna and Sandeep Kumar Arora (pp. 27-44).
  • Implementation of a Two-Level Security Door Access Using Keypad and Voice Recognition, Morkat M. Yilwatda, Jonathan A. Enokela, and Nentawe Y. Goshwe (pp. 45-58).
  • Optimizing Available Transfer Capability Based on Chaos Cloud Particle Swarm Algorithm with Gold Section Criteria, Hongsheng Su and Shuangshuang Wang (pp. 59-70).
  • Steganography and Data Loss Prevention: An overlooked risk?, Juan M. Gutiérrez-Cárdenas (pp. 71-84).
  • Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach, Rizwan ur Rahman, Deepak Singh Tomar and Jijin A.V. (pp. 85-96).
  • Bibliography



 
____________________________________________