IJSIA Vol. 12, No. 2, 2018
                                                IJSIA Vol. 12, No. 2, 2018
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017
Vol.11, No.12, 2017
Vol.12, No.1, 2018
Vol.12, No.2, 2018
Vol.12, No.3, 2018
Vol.12, No.4, 2018

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • An Invisible Image Watermarking Based On Modified Particle Swarm Optimization (PSO) Algorithm, Atheer Bassel, Md Jan Nordin and Mohammed B. Abdulkareem (pp. 1-8).
  • Classification of Malware Analytics Techniques: A Systematic Literature Review, Nur Farhana Hordri, Noor Azurati Ahmad, Siti Sophiayati Yuhaniz, Shamsul Sahibuddin, Aswami Fadillah Mohd Ariffin, NurAfifahMohdSaupi, NazriAhmad Zamani, Yasmin Jeffry and Mohamad Firham Efendy Md Senan (pp. 9-18).
  • Novel Approach for E-passport Authentication using Elgamal Cryptosystem, Anurag Singh Tomar, Sumit Kumar, Sandip K Chaurasiya and Vanshika Shrivastava (pp. 19-28).
  • Query-Dependency-Aware Location Privacy Protection for Road Networks, Hui Chen and Xiaolin Qin (pp. 29-44).
  • Towards a More Secured Solution in RDP: On-Demand Desktop Local Admin Rights, Manal Al-Sharrah and Mohammad Alkandari (pp. 45-58).
  • Rabin-Karp Elaboration in Comparing Pattern Based on Hash Data, Andysah Putera Utama Siahaan (pp. 59-66).
  • A Detailed Review on Mobile Ad Hoc Networks: Protocols, Security Issues and Challenges, N. Thirupathi Rao, Pilla Srinivas, Debnath Bhattacharyya and Tai-hoon Kim (pp. 67-78).
  • Bibliography



 
____________________________________________