Content of Issue 4
DOI: 10.3217/jucs-022-04
|
Advanced Research on Software Security Design and Applications |
S.A. Aljawarneh, F. Cena, A. Maatuk |
453 |
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives |
A.K. Jha, W.J. Lee |
459 |
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection |
V. Radhakrishna, P.V. Kumar, V. Janaki |
475 |
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud |
A. Imran, S.A. Aljawarneh, K. Sakib |
494 |
Feature Selection for Black Hole Attacks |
M.B. Yassein, Y. Khamayseh, M. AbuJazoh |
521 |
An Empirical Investigation of Security Vulnerabilities within Web Applications |
I. Abunadi, M. Alenezi |
537 |
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves |
O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi |
552 |
On the Analysis and Detection of Mobile Botnet Applications |
A. Karim, R. Salleh, M.K. Khan, A. Siddiqa, K.-K.R. Choo |
567 |
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function |
G.R. Kumar, N. Mangathayaru, G. Narsimha |
589 |