HOME       POLICIES       SUBMISSION        PEOPLE        ARCHIVES         CONFERENCES        CONTACT
ARCHIVES
Volume 3, Number 1 (2008)


EDITORIAL

          Editorial Board - download PDF

          Editorial - download PDF


PAPERS

         
»» Cyber Fraud Trends and Mitigation
               By Richard Howard, Ralph Thomas, Jeff Burstein, and Roxanna Bradescu
               DOI: 10.5769/J200801001 or http://dx.doi.org/10.5769/J200801001
               To see the abstract and to download the paper, click here


         
»» A Rough Set Classification Algorithm for Detecting Attacks on Electric Power Systems and
               Other Critical Infrastructures
               By Maurício Pereira Coutinho, Germano Lambert Torres, Horst Lazarek, and Luiz Silva
               DOI: 10.5769/J200801002 or http://dx.doi.org/10.5769/J200801002
               To see the abstract and to download the paper, click here

         
»» Botnet Detection and Analysis Using Honeynet
               By  M .C. Sacchetin, A. R. A. Gregio, L.O. Duarte, and A. Montes
               DOI: 10.5769/J200801003 or http://dx.doi.org/10.5769/J200801003
               To see the abstract and to download the paper, click here

         
»» Ontology for Complex Mission Scenarios in Forensic Computing
               By José Nogueira, and Wamberto Vasconcelos
               DOI: 10.5769/J200801004 or http://dx.doi.org/10.5769/J200801004
               To see the abstract and to download the paper, click here

         
»» Mobile Positioning Methods used in Location-Based Services in GSM, WCDMA and WLAN
               Networks
               By Antonio Rosa, Daniel Barboni, and Paulo Quintiliano
               DOI: 10.5769/J200801005 or http://dx.doi.org/10.5769/J200801005
               To see the abstract and to download the paper, click here

         
»» Noise Robust Speaker Recognition using Reduced Multiconditional Gaussian Mixture Models,
               By Frederico D’Almeida, Francisco Assis Nascimento, Pedro Berger, and Lúcio Silva
               DOI: 10.5769/J200801006 or http://dx.doi.org/10.5769/J200801006
               To see the abstract and to download the paper, click here

         
»» Detecting Attacks to Computer Networks Using a Multi-layer Perceptron Artificial Neural
               Network
               By Dino Amaral, Genival Araújo, and Alexandre Romariz
               DOI: 10.5769/J200801007 or http://dx.doi.org/10.5769/J200801007
               To see the abstract and to download the paper, click here

         
»» Group Trust Yields Improved Scalabiliy and Anomaly Detection for P2P Systems,
               By Robson Albuquerque, Rafael Sousa Júnior, Lorena Bezerra, and Giselle Lima
               DOI 10.5769/J200801008 or http://dx.doi.org/10.5769/J200801008
               To see the abstract and to download the paper, click here

         
»» Improvements and Adaptations in Fingerprint Processing Techniques for the Creation of a
               High-Quality Minutiae Database
               By Mateus Fernandes, and Ricardo Puttini
               DOI 10.5769/J200801009 or http://dx.doi.org/10.5769/J200801009
               To see the abstract and to download the paper, click here

      
FULL NUMBER

          To download this IJoFCS full Number, click here

2016  Volume 11, Number 1

2015  Volume 10, Number 1

2014  Volume 9, Number 1

2013  Volume 8, Number 1
                               
2012  Volume 7, Number 1 
    
                            Number 2

2011  Volume 6, Number 1 

2010  Volume 5, Number 1 

2009  Volume 4, Number 1 

2008  Volume 3, Number 1 

2007  Volume 2, Number 1 

2006  Volume 1, Number 1