Volume 2

December 2013, Volume 2, Number 6

Analysis of Elementary Cellular Automata Chaotic Rules Behavior
K. Salman, Middle Tennessee State University, U.S.A

A Novel Service Oriented Architecture (SOA) to Secure Services in E-City
Sajjad Hashemi1, Seyyed Yasser Hashemi1 and Khalil Monfaredi2, 1Islamic Azad University, Iran and 2Azarbaijan Shahid
Madani University, Iran

October 2013, Volume 2, Number 5

Cloud Computing Technology: Security and Trust Challenges
Sajjad Hashemi, Islamic Azad University, Iran

Security System with Face Recognition, Sms Alert and Embedded Network Video Monitoring Terminal
J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan, SRM Easwari Engineering College, India

A Novel Multifactor Authentication System Ensuring Usability and Security
Gloriya Mathew and Shiney Thomas, Amal Jyothi College of Engineerng, India

Malicious Pdf Document Detection Based on Feature Extraction and Entropy
Himanshu Pareek, Center for Development of Advanced Computing, India

August 2013, Volume 2, Number 4

Data Storage Security Challenges in Cloud Computing
Sajjad Hashemi, Islamic Azad University, Iran

YourPrivacyProtector: A Recommender System for Privacy Settings in Social Networks
Kambiz Ghazinour1,2, Stan Matwin1,2,4 and Marina Sokolova1,2,3, 1School of Electrical Engineering and Computer Science
University of Ottawa, 2CHEO Research Institute, Canada, 3University of Ottawa, Canada and 4Dalhousie University, Canada

Performance Evaluation of Message Security Using Fractal Sieve with MMD
Ch. Rupa, Vasireddy Venkatadri Institute of Technology, India

June 2013, Volume 2, Number 3

A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia

PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
Bhuvaneshwari .k and A. Francis Saviour Devaraj, Oxford College of Engineering, India

MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
Vandana C.P and A. Francis Saviour Devaraj, Oxford College of Engineering, India

April 2013, Volume 2, Number 2

Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices
Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia

Managing the Intertwining Among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model
Shih-Chien Chou, National Dong Hwa University, Hualien, Taiwan

An Evaluation of Energy Efficient Source Authentication Methods for False Data Filtering in WSN
Syama M and Deepti C, The Oxford College of Engineering, India

A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India

February 2013, Volume 2, Number 1

Design and Development of an Ultrasonic Motion Detector
Adamu Murtala Zungeru, University of Nottingham, Malaysia

Automated Control for Risk Assessment on Unix Operating System - I
Prashant Kumar Patra1 & Padma Lochan Pradhan2, 1College of Engineering & Technology, BPUT,India and 2Sikha 'O'
Anusandhan University, India

An electronic digital combination lock: a Precise and reliable security system
Adamu Murtala Zungeru, University of Nottingham, Malaysia

An Approach for Broader Range of Security in Cloud Computing
R.Bala chandar, M.S.Kavitha and K.Seenivasan, Sri Shakthi Institute of Engineering and Technology, India