IJSIA Vol. 11, No. 9, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Vernam Conjugated Manipulation of Bit-plane Complexity Segmentation, Andysah Putera Utama Siahaan (pp. 1-12).
  • Cryptography Protocol: A Novel Multilingual Adaptive Encryption Technique with Phonetic Based Ciphering, Ahmed Mokhtar A. Mansour and Mona A. M. Fouad (pp. 13-22).
  • A Monitor System for Software Version Request in Offline Environments, Shin-Yan Chiou and Chia-Chun Lin (pp. 23-40).
  • Design of a Secure Dynamic Identity Authentication Scheme for Health Internet of Things, Chengqi Wang, Xiao Zhang, Lijia Xie and Zhiming Zheng (pp. 41-58).
  • Improved Detecting Host Based Intrusions Based On Hybrid SVM Using Grey Wolf Optimizer, Vidhya Sathish and P.Sheik Abdul Khader (pp. 59-72).
  • A stream cipher method for RGB image encryption using PSO base key generation, Sepideh Bahri-Laleh, Mohammad Ali Balafar and Mohammad-Reza Feizi-Derakhshi (pp. 73-94).
  • Information Security in Healthcare Organizations using Low-Interaction Honeypot Intrusion Detection System, Aastha Yadav, Sarthak Raisurana, H.Balaji, P. Lalitha, Ronnie D. Caytiles and N. Ch. S. N. Iyengar (pp. 95-108).
  • Bibliography



 
____________________________________________