|
|
|
Journal of Information
Security Research |
/td>
|
Current Issue
|
|
|
Volume: 3 , Issue: 4
(December 2012) |
|
Balancing Distribution of Intrusion Detection Data Using Sample Selection-
Ikram Chaïri, Souad Alaoui, Abdelouahid Lyhyaoui
Page: 153-163
Abstract | Full Text (PDF,
173KB)
|
Safe Algorithm for Firewall Policy Deployment-
F. Bezzazi, A.Kartit, M. El Marraki, D. Aboutajdine
Page: 164-170
Abstract | Full Text (PDF,
253KB)
|
Towards Minizing Human Factors in End-User Information Security-
Taurayi Rupere, Mary Muhonde
Page: 171-183
Abstract | Full Text (PDF,
228KB)
|
Security Analysis of Biometric Cryptosystems: Case Study of Fuzzy Vault Approach-
Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine
Page: 184-199
Abstract | Full Text (PDF,
424KB)
|
An Investigation of the Information Security Strategies Implementation in Further Education and Training Colleges in Limpopo: A Case Study-
Mohlabeng M.R, Mokwena S.N, Osunmakinde I.O
Page: 200-211
Abstract | Full Text (PDF,
840KB)
|
Book Review |
|
Conference
Notification |
• The Fifth International Conference on the Applications of Digital Information and Web Technologies
(ICADIWT 2013)
• The Eighth International Conference on Digital Information Management (ICDIM 2013)
|
|
|
|