International Journal of Electronics and Information Engineering | ||
1. | The Encryption Algorithms GOST28147-89-PES16-2 and GOST28147-89-RFWKPES16-2
|
|
Gulom Tuychiev, Vol. 6, No. 1, 2017, pp. 1-11 Article Full Text PDF .bib |
||
2. | A New Muzzle Classification Model Using Decision Tree Classifier
|
|
Ibrahim El-Henawy, Hazem. M. El Bakry, Hagar M. El Hadad, Vol. 6, No. 1, 2017, pp. 12-24 Article Full Text PDF .bib |
||
3. | An Empirical Evaluation of Security tips in Phishing Prevention: A Case Study of Nigerian Banks
|
|
Abdul Abiodun Orunsolu, A. S. Sodiya, A. T. Akinwale, B. I. Olajuwon, M. A. Alaran, O. O. Bamgboye, and O. A. Afolabi, Vol. 6, No. 1, 2017, pp. 25-39 Article Full Text PDF .bib |
||
4. | A Process of Security Assurance Properties Unification for Application Logic
|
|
Faisal Nabi, Muhammad Mustafa Nabi, Vol. 6, No. 1, 2017, pp. 40-48 Article Full Text PDF .bib |
||
5. | Active Monitoring & Postmortem Forensic Analysis of Network Threats: A Survey
|
|
Anshul Tayal, Nishchol Mishra and Sanjeev Sharma, Vol. 6, No. 1, 2017, pp. 49-59 Article Full Text PDF .bib |
||
6. | Reviewer index to volume 6 (2017)
|
|