A

  • A5/1 Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Alert Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Alert Correlation Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Artificial Bee Colony BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Attack Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Attack Scenario Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

B

  • Botnet Detection BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Botnet Lifecycle BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

C

  • Chaos Theory Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Chaotic Maps A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Combination of Data Hiding and Cryptography Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Command and Control Channel BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Confidence A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Confidence Estimation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Correlation Matrix Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Critical Degrees of Freedom On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

D

  • Difference Families Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Digital Evidence Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Digital Forensic Artifacts Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Digital Forensics Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Distinguishing Attacks On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Double Random Phase Encoding (DRPE) Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

E

  • Eigenvalues Analysis Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Encryption Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

F

  • Fractal Image Generation Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

G

  • Geometric Transformation SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Graph Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Graphic Design Applications Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

I

  • IDS Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Internal State Transition Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Intrusion Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Intrusion Detection BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Intrusion Detection System Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

J

  • Julia Set Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

L

  • Low-Density Parity-Check Codes Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • LSB Embedding Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

M

  • Mandolrot Set Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Mobile Ad Hoc Network BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Monte Carlo Integration BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Multi _ Chi-square Test On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

N

  • Negative Selection BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

O

  • Online Clustering BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

P

  • Precomputed Table Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Privacy Preserving Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Private Key Search Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

Q

R

  • Random Guessing SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Rao-Nam Secret Key Cryptosystem Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Rate Estimation Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Routing Attack BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

S

  • Security A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • SEIMCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Semantic Image CAPTCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Steganalysis Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

T

  • Tagging Image CAPTCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Trivium On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Trust A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Trust Aggregation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Trust Interval A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Trust Propagation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Two-Dimensional Coupled Logistic Map Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

U

  • Ultimately Periodic Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Upright Orientation SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Useless States Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]