| International Journal of Electronics and Information Engineering | ||
| 1. | The Encryption Algorithms GOST28147-89-PES16-2 and GOST28147-89-RFWKPES16-2
|
|
| Gulom Tuychiev, Vol. 6, No. 1, 2017, pp. 1-11 Article Full Text PDF .bib |
||
| 2. | A New Muzzle Classification Model Using Decision Tree Classifier
|
|
| Ibrahim El-Henawy, Hazem. M. El Bakry, Hagar M. El Hadad, Vol. 6, No. 1, 2017, pp. 12-24 Article Full Text PDF .bib |
||
| 3. | An Empirical Evaluation of Security tips in Phishing Prevention: A Case Study of Nigerian Banks
|
|
| Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, M. A. Alaran, O. O. Bamgboye, and O. A. Afolabi, Vol. 6, No. 1, 2017, pp. 25-39 Article Full Text PDF .bib |
||
| 4. | A Process of Security Assurance Properties Unification for Application Logic
|
|
| Faisal Nabi, Muhammad Mustafa Nabi, Vol. 6, No. 1, 2017, pp. 40-48 Article Full Text PDF .bib |
||
| 5. | Active Monitoring & Postmortem Forensic Analysis of Network Threats: A Survey
|
|
| Anshul Tayal, Nishchol Mishra and Sanjeev Sharma, Vol. 6, No. 1, 2017, pp. 49-59 Article Full Text PDF .bib |
||
| 6. | Reviewer index to volume 6 (2017)
|
|