Thank You for Your Support

Dear Authors and Readers,
Thank you for contributing to our journey by submitting and supporting our articles. Since 2022, we have ceased operations and are no longer active.
You can access all previously published articles in our Archive.

Volume 01-2012

Issue 01

Propose a Framework for Criminal Mining by Web Structure and Content Mining

  • Authors :- Javad Hosseinkhani, Suriyati Chaprut, Hamed Taherdoost and Amin Shahraki Moghaddam
  • Keywords :- Criminal Network, Crime We
  • Published Online :- 01 October 2012
View Full PDF

Definitions and Criteria of CIA Security Triangle in Electronic Voting System

  • Authors :- Saman Shojae Chaeikar, Mohammadreza Jafari, Hamed Taherdooost and Nakisa Shojae Chaei Kar
  • Keywords :- E-voting, Electronic Voting, CIA, E-Voting Confidentiality, E-Voting Integrity, E-Voting Availability.
  • Published Online :- 01 October 2012
View Full PDF

A Service Oriented Security Reference Architecture

  • Authors :- Alaeddin Kalantari, Anahita Esmaeili and Suhaimi Ibrahim
  • Keywords :- Service Oriented architecture, SOA, SOA Security, SOA Security Framework.
  • Published Online :- 01 October 2012
View Full PDF