Coming Issue (Vol. 5, No. 2), 2016
Enhancing Performance of Intrusion Detection System Against KDD99 Dataset Using Evidence TheoryPages: 106-114 / DOI: http://dx.doi.org/10.17781/P002067 | |
Identifying the Mechanisms of Information Security Incidents through Corporate Culture Variables and SamplingPages: 61-74 / DOI: http://dx.doi.org/10.17781/P002025 | |
Building Ontologies for Digital Forensic TerminologiesPages: 75-82 / DOI: http://dx.doi.org/10.17781/P002032 | |
Performance Measures for Evaluating the Dynamic Authentication TechniquesPages: 83-93 / DOI: http://dx.doi.org/10.17781/P002052 | |
RegForensicTool: Evidence Collection and Analysis of Windows RegistryPages: 94-105 / DOI: http://dx.doi.org/10.17781/P002064 |