Coming Issue (Vol. 9, No. 1), 2020
GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE HandoversPages: 1-11 / DOI: http://dx.doi.org/10.17781/P002642 | |
Factors Related to Small Business Cyber-Attack Protection in the United StatesPages: 12-25 / DOI: http://dx.doi.org/10.17781/P002644 | |
Integrated Intrusion Detection Scheme using AgentsPages: 26-33 / DOI: http://dx.doi.org/10.17781/P002646 | |
A Survey of Artificial Intelligence Techniques for Cybersecurity ImprovementPages: 34-41 / DOI: http://dx.doi.org/10.17781/P002650 | |
Mobile Forensic Process and Associated Key ChallengesPages: 42-54 / DOI: http://dx.doi.org/10.17781/P002651 | |
Comparative Malware Testing Analyses for Android Mobile AppsPages: 55-70 / DOI: http://dx.doi.org/10.17781/P002652 |