Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 22

Content of Issue 4
DOI: 10.3217/jucs-022-04
Advanced Research on Software Security Design and Applications S.A. Aljawarneh, F. Cena, A. Maatuk 453
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives A.K. Jha, W.J. Lee 459
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection V. Radhakrishna, P.V. Kumar, V. Janaki 475
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud A. Imran, S.A. Aljawarneh, K. Sakib 494
Feature Selection for Black Hole Attacks M.B. Yassein, Y. Khamayseh, M. AbuJazoh 521
An Empirical Investigation of Security Vulnerabilities within Web Applications I. Abunadi, M. Alenezi 537
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi 552
On the Analysis and Detection of Mobile Botnet Applications A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo 567
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function G.R. Kumar, N. Mangathayaru, G. Narsimha 589