Journal of Information Assurance and Security

Volume 8, Issue 4, 2013
Cover Page

  Page no.
1Threats Models On Biometric Systems a comparative study
137
Dellys Hachemi Nabil, Benatchba Karima, Koudil Mouloud, Bouridane Ahmed  
   
1An Improved Cost-Sensitive Intrusion Response Model
147
Aderonke J., Ikuomola, Adesina S., Sodiya, Adio T. Akinwale and Dada O. Aborisade  
   
   
1 Prevention of SMS against Repudiation Attack over the GSM Network
156
Neetesh Saxena, Narendra S. Chaudhari
 
   
1A Survivability Architecture for Object-Oriented Software Systems
167
Aborisade, Dada O., Sodiya Adesina S. and Ikuomola Aderonke J.  
   
   
1 Integrating Trust in Argumentation Based Recommender Systems
177
Punam Bedi, Pooja Vashisth
 
   
   
   

Copyright ©2005 - 2013, Dynamic Publishers Inc., USA



No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.