default search action
International Journal of Information System Modeling and Design, Volume 9
Volume 9, Number 1, 2018
- Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal:
Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks. 1-20 - Rajib Ghosh, Partha Pratim Roy, Prabhat Kumar:
Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features. 21-55 - Sumit Kumar Yadav, Kavita Sharma, Arushi Arora:
Security Integration in DDoS Attack Mitigation Using Access Control Lists. 56-76 - Nisha Rathee, Rajender Singh Chhillar:
Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm. 77-91 - Vinod Vijaykumar Kimbahune, Arvind V. Deshpande, Parikshit N. Mahalle:
A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach. 92-121
Volume 9, Number 2, 2018
- Rui Pedro Marques, Henrique Santos, Carlos Santos:
Comparison and Evaluation of Organizational Transactions for Continuous Auditing and Business Compliance. 1-23 - Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski:
Aligning Supply Chain Logistics Costs via ERP Coordination. 24-43 - Saïda Boukhedouma, Zaia Alimazighi:
An Approach Based on Hierarchical Petri Nets for the Verification of Interconnected BPEL Processes. 44-78
Volume 9, Number 3, 2018
- Boudheb Tarik, Zakaria Elberrichi:
Privacy Preserving Feature Selection for Vertically Distributed Medical Data based on Genetic Algorithms and Naïve Bayes. 1-22 - Amel Benabbou, Safia Nait Bahloul:
Automated Context Formalization for Context-aware Specification Approach. 23-47 - M. Kesavan, J. Prabhu:
A Survey, Design and Analysis of IoT Security and QoS Challenges. 48-66 - Kiran Khatter, Sapna Malik:
Ranking and Risk Factor Scheme for Malicious applications detection and Classifications. 67-84
Volume 9, Number 4, 2018
- Shamik Tiwari:
An Analysis in Tissue Classification for Colorectal Cancer Histology Using Convolution Neural Network and Colour Models. 1-19 - Meng-Hsuan Fu:
Donation Model Development Based on the Methodologies of Blockchain. 20-36 - Hradesh Kumar, Pradeep Kumar Singh:
Power Transmission Analysis in Wireless Sensor Networks Using Data Aggregation Techniques. 37-53 - Priyanka Chandani, Chetna Gupta:
Towards Risk Based Effort Estimation: A Framework to Identify, Analyze, and Classify Risk for Early Identification at Requirement Engineering Phase. 54-71
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.