Issue Title
Vol 26, No 1 (2017) Data Security in Cloud Computing with Elliptic Curve Cryptography Abstract  PDF
Abdulkadir Abdullahi Ibrahim, Dr. Wilson Cheruiyot, Dr. Michael W. Kimwele
Vol 21, No 1 (2016) Scalable Packet Behaviour Based Firewall Vulnerability Analysis Tools Review Abstract
k. Indumathi
Vol 21, No 1 (2016) In the Cloud Storage Market How Users are Using it without Hesitation (Report 2016) Abstract  PDF
A. Rob Md. Rayhan Hossain, G. M. Israfil Islam, Md. Shahinurzzaman, Md. Alam Hossain
Vol 21, No 1 (2016) Hough Transform and Chi-Square-Based Iris Recognition Abstract  PDF
Olabode Olatubosun, Iwasokun Gabriel Babatunde, Oluwadare Samuel Adebayo, Adeniyi Tunde Taiwo
Vol 30, No 1 (2018) Responding to and Preventing Threats to Cybersecurity When Utilizing the Internet of Things Abstract  PDF
Jaipratap Singh Grewal
Vol 29, No 1 (2018) Performance and Security of Group Signature in Wireless Networks Abstract  PDF
Joshua J. Tom, Prof Boniface. K. Alese, Dr. Aderonke F. Thompson, Dr. Nlerum P. Anebo
Vol 17, No 1 (2015) The Role of Data Mining in Information Security Abstract  PDF
Osman Mohamed Abbas, Mohamed Elhafiz Mustafa, Siddig Balal Ibrahim
Vol 27, No 1 (2017) Cyber Security Challenges to Mobile Banking in SACCOs in Kenya Abstract  PDF
Nambiro Alice Wechuli, Wabwoba Franklin, Wasike Jotham
Vol 15, No 1 (2014) Attack Classification Based On Data Mining Abstract
Shih Cheng
Vol 26, No 1 (2017) A Framework for Improving Computer-based Information Systems Auditing Abstract  PDF
Yusuf Sheikh Khalif Abdirahman
Vol 18, No 1 (2015) Ensuring Data Security in Cloud Computing Using Huffman Encryption Abstract
Karmen Biswas
Vol 26, No 1 (2017) Securing the IP Multimedia Subsystem with IPsec and HTTP Digest Abstract  PDF
Mohammed Ibrahim Omar, Dr. Cheruiyot W. Kipruto, Dr. Michael W. Kimwele
Vol 9, No 1 (2013) Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform Abstract  PDF
Vol 26, No 1 (2017) Development of a Secure Mobile E-Banking System Abstract  PDF
Raphael Olufemi Akinyede, Odoseiye Aidohelen Esese
Vol 8, No 1 (2013) Ensuring Data Security in Cloud Computing Using encryption Abstract
Karmen Biswas
Vol 10, No 1 (2013) Data Mining: A Survey Abstract
Shih Cheng
Vol 18, No 1 (2015) Resource management improvement in cloud computing Abstract
G. Jayasurya
Vol 6, No 1 (2012) Attack Classification Based On Data Mining: Two Methods Comparison Abstract
Shih Cheng
Vol 33, No 1 (2019) Review on Blockchain Technology for Healthcare Records Abstract  PDF
Ekram Ahmed Ali Mirdah, Sokchoo Ng, Khiam Ping Chih
Vol 6, No 1 (2012) Securing Web Applications and Databases against SQL Injection Attacks Abstract
Surepeddi Gowtham
Vol 31, No 1 (2018) The Least Significant Two-bit Substitution Algorithm for Image Steganography Abstract  PDF
Serdar Solak, Umut Altinişik
Vol 31, No 1 (2018) Holistic Approach to Big Data Definition using Analysis of Facts Abstract  PDF
Akande Oyebola, Osofisan Adenike, Adekola Olubukola
Vol 17, No 1 (2015) A Comparison of Window 8 and Linux Operating System (Android) Security for Mobile Computing Abstract  PDF
Sumat Nazeer, Faisal Bahadur, Arif Iqbal, Ghazala Ashraf, Shahid Hussain
1 - 23 of 23 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"