May 2013, Volume 5. Number 3

Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters [ Pdf ]
S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens Engineering College, India
An Efficient Group Authentication for Group Communications [ Pdf ]
Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China
Password Based Scheme and Group Testing for Defending DDOS Attacks [ Pdf ]
G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and 2KL University (KLU), India
Security Algorithms for WIMAX [ Pdf ]
M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State University, USA
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network [ Pdf ]
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran
HTTPI Based Web Service Security over SOAP [ Pdf ]
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India
Implementation of a Security Protocol for Bluetooth and WI-FI [ Pdf ]
U. Pavan Kumar, Amity University, India
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine [ Pdf ]
Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco and 2Hassan II University, Morocco
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks [ Pdf ]
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India

March 2013, Volume 5. Number 2

Incident Response Plan for a Small to Medium Sized Hospital[ Pdf ]
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA
Privacy Preserving Data Mining by using Implicit Function Theorem[ Pdf ]
Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India.
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems[ Pdf ]
Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of the Philippines,Philippines
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks [ Pdf ]
Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation[ Pdf ]
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago.
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)[ Pdf ]
Ahmed ElShafee, Ahram Canadian University, Egypt.
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering[ Pdf ]
S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India.
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment[ Pdf ]
Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies Pvt. Ltd., India
Code Aware Dynamic Source Routing for Distributed Sensor Network[ Pdf ]
M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India, 2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India.
Resonance Based Micromechanical Cantilever for Gas Sensing[ Pdf ]
Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India
Traceback of DOS Over Autonomous Systems [ Pdf ]
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment[ Pdf ]
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries[ Pdf ]
Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour[ Pdf ]
Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and 2Indian Institute of Science, India
E-Commerce Systems Security for Small Businesses[ Pdf ]
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.

January 2013, Volume 5. Number 1

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study [ Pdf ]
Natarajan Meghanathan, Jackson State University, USA
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers [ Pdf ]
Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study [ Pdf ]
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India
How to Find a Fixed Point in Shuffle Efficiently [ Pdf ]
Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study [ Pdf ]
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines [ Pdf ]
A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National Institute of Engineering (NIE) Mysore, India
Text Steganographic Approaches: A Comparison [ Pdf ]
Monika Agarwal, PDPM-IIITDM Jabalpur, India