IJSIA Vol. 11, No. 5, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • A Coalesce of SNE-Wavelet-SVM Technique for Network Intrusion Detection, Yasir Hamid, Ludovic Journax, Firdous A. Shah and M. Sugumaran (pp. 1-14).
  • A Conceptual Model for Exploring the Factors Influencing Information Security Culture, Amjad Mahfuth, Salman Yussof, Asmidar abu bakar, Nor'ashikin Bte. Ali and Waleed Abdallah (pp. 15-26).
  • Mobile App User Licensing with Little or No Backend Server, Anis Prasla, Sabah Mohammad and Jinan Fiaidhi (pp. 27-38).
  • A Survey on Impersonation Attack in Wireless Networks, R. Regan and J. Martin Leo Manickam (pp. 39-48).
  • An Algorithm to Secure Virtual Machine Image in Cloud Environment, Preeti Thakur and Devesh Kumar Srivastava (pp. 49-58).
  • E-Voting System using Homomorphic Encryption in a Cloud Based Environment, Rachna Jain, Sushila Madan, Bindu Garg, Yogeesh Kapila and Abhishek Gupta (pp. 59-68).
  • A Secure and Efficient Message Delivery Scheme for VANET, Huaijin Liu, Yonghong Chen and Dharma P. Agrawal (pp. 69-78).
  • Bibliography



 
____________________________________________