Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:

  About JISR
  DLINE Portal Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Paper Submission
Contact us
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)


Journal of Information Security Research
Current Issue
Volume: 5 , Issue: 4 (December 2014)
Full Text
A Multi-Stage Framework of Textual Criminal Cases Categorization: Criminal and Legal Elements Approach -
Sotarat Thammaboosadee
Page: 119-126
     Abstract | Full Text (PDF, 61KB)

A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory -
Qingbo Kang, Ke Li, Jichun Yang
Page: 127-137
     Abstract | Full Text (PDF, 846KB)

From K-Anonymity to Differential Privacy Back to K-Anonymity!-
Ddeel ANJUM, Guillame Raschia, Marc Gelgon
Page: 138-144
     Abstract | Full Text (PDF, 79KB

Book Review
Graph Mining Laws, Tools and Case Studies, Deepayan Chakrabarti and Christos Faloutsos, Morgan & Claypool Publishers, 2014 ISBN: 9781608451159
Conference Notification

• Sixth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2015)
• Fifth International Conference on Innovative Computing Technology (INTECH 2015)
• Fourth International Conference on Future Generation Communication Technologies (FGCT 2015)