IJSIA Vol. 12, No. 1, 2018
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017
Vol.11, No.12, 2017
Vol.12, No.1, 2018

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Cyber Defense Budget Assessment in Smart Grid Based on Reliability Evaluation Considering Practical Data of HV Substation, Noorollah Fardad, Soodabeh Soleymani and Faramarz Faghihi (pp. 1-20).
  • Cover Selection for More Secure Steganography, Reza Esfahani, Zynolabedin Norozi and Gholamreza Jandaghi (pp. 21-36).
  • Mitigation Strategies for Unintentional Insider Threats on Information Leaks, Wan Basri Wan Ismail and Maryati Yusof (pp. 37-46).
  • Efficiency of Two Versions of SNOW against Guess & Determine Attack, Muhammad Tahir, Ghulam Mujtaba, Saood Zia and Tarranum Naz (pp. 47-58).
  • Secure Identity-Based Cryptographic Approach for Vehicular Ah-hoc Networks, Sadiq Ali Khan, Fozia Hanif Khan, Farheen Qazi, Dur-e-shawar Agha and Bhagwan Das (pp. 59-68).
  • A Qualitative Analysis of Information Privacy Concerns among Healthcare Employees, Fiza Abdul Rahim, Gopinath Muruti, Zuraini Ismail and Ganthan Narayana Samy (pp. 69-78).
  • Bibliography



 
____________________________________________