Vol 6, No 2 (2014)

Table of Contents

Vol 6, No 2 (2014)

Articles

Application Layer Intrusion Detection with Combination of Explicit-rule-based and Machine Learning Algorithms and Deployment in Cyber-Defence Program
Amal Saha, Sugata Sanyal
 Vol 6, No 2 (2014), Pagination: 2202-2208
ABSTRACT |  PDF Abstract Views: 176  |  PDF Views: 0
Investigation and Application of Personalizing Recommender Systems based on ALIDATA DISCOVERY
Tang Zhi-Hang
 Vol 6, No 2 (2014), Pagination: 2209-2213
ABSTRACT |  PDF Abstract Views: 155  |  PDF Views: 0
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms and Messenger Environments
Jatinderkumar R. Saini
 Vol 6, No 2 (2014), Pagination: 2214-2221
ABSTRACT |  PDF Abstract Views: 160  |  PDF Views: 0
Applying Content-Based Image Retrieval Techniques to Provide New Services for Tourism Industry
Zobeir Raisi, Farahnaz Mohanna, Mehdi Rezaei
 Vol 6, No 2 (2014), Pagination: 2222-2232
ABSTRACT |  PDF Abstract Views: 168  |  PDF Views: 0
Software Defined Networking: A Concept and Related Issues
Deepak Kumar, Manu Sood
 Vol 6, No 2 (2014), Pagination: 2233-2239
ABSTRACT |  PDF Abstract Views: 161  |  PDF Views: 2
Security Issues in Cloud Computing - A Review
Irfan Hussain, Imran Ashraf
 Vol 6, No 2 (2014), Pagination: 2240-2243
ABSTRACT |  PDF Abstract Views: 173  |  PDF Views: 0
A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of Varsha - A Global Circulation Model Software
T. Venkatesh, U. N. Sinha
 Vol 6, No 2 (2014), Pagination: 2244-2252
ABSTRACT |  PDF Abstract Views: 184  |  PDF Views: 0
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
P. V. Siva Kumar, Rajasekhara Rao Kurra, Appala Naidu Tentu, G. Padmavathi
 Vol 6, No 2 (2014), Pagination: 2253-2261
ABSTRACT |  PDF Abstract Views: 166  |  PDF Views: 4
Securing Cloud from Cloud Drain
Niva Das, Tanmoy Sarkar
 Vol 6, No 2 (2014), Pagination: 2262-2265
ABSTRACT |  PDF Abstract Views: 162  |  PDF Views: 0
Survey on Host and Network Based Intrusion Detection System
Niva Das, Tanmoy Sarkar
 Vol 6, No 2 (2014), Pagination: 2266-2269
ABSTRACT |  PDF Abstract Views: 176  |  PDF Views: 0
The Management of Information Systems and its Impact on the Quality of Services (From the Perspective of Students: A Case Study)
Hiyam S. Ensour, Tareg M. Lafi Alinizi
 Vol 6, No 2 (2014), Pagination: 2270-2284
ABSTRACT |  PDF Abstract Views: 167  |  PDF Views: 1
Analysis of Applicability of ISO 9564 Pin Based Authentication to Closed-Loop Mobile Payment Systems
Amal Saha, Sugata Sanyal
 Vol 6, No 2 (2014), Pagination: 2285-2290
ABSTRACT |  PDF Abstract Views: 158  |  PDF Views: 5