Digital Library
Search: "[ keyword: Security ]" (55)
-
Bang Nguyen Van, Suk-Hwan Lee, Ki-Ryong Kwon
Vol. 13, No. 1, pp. 68-82, Feb. 2017
10.3745/JIPS.03.0059
Keywords: chaotic map, GIS Vector Map, Selective Encryption, Vector Map Security -
Nawal Sad Houari, Noria Taghezout
Vol. 12, No. 4, pp. 688-710, Dec. 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent -
Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad
Vol. 12, No. 3, pp. 525-537, Sep. 2016
10.3745/JIPS.03.0054
Keywords: Audio, Data Hiding, Modulus Function, Information Security, network security -
Sang-Yong Choi, Daehyeok Kim, Yong-Min Kim
Vol. 12, No. 3, pp. 422-435, Sep. 2016
10.3745/JIPS.03.0045
Keywords: Drive-by download, Malware Distribution Network, Webpage Link Analysis, Web security -
Jayaprakash Kar, Manoj Ranjan Mishra
Vol. 12, No. 2, pp. 226-233, Jun. 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence -
Souad Bekkouch, Kamel Mohamed Faraoun
Vol. 11, No. 3, pp. 406-420, Sep. 2015
10.3745/JIPS.02.0021
Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform -
Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
Vol. 11, No. 2, pp. 205-228, Jun. 2015
10.3745/JIPS.02.0019
Keywords: clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks -
Rasheed Hussain, Heekuck Oh
Vol. 10, No. 1, pp. 103-118, Mar. 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing -
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia, Farnoush Banaei-Kashani
Vol. 10, No. 1, pp. 1-22, Mar. 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety -
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do, Deokjai Choi
Vol. 9, No. 2, pp. 333-348, Jun. 2013
10.3745/JIPS.2013.9.2.333
Keywords: gait recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, identification, Signal Processing