Issue 1 of Volume 81

A Formal Framework for Intrusion Detection within an Information System based on Workflow Audit

Authors: Atsa Etoundi Roger, Nkoulou Onanena Georges, Nkondock Mi Bahanag Nicolas, Mboupda Moyo Achille

Efficient Marker based Gesture Recognition Technique

Authors: Pallab Dutta, Aparna B, Sridharan B, Vipin Tyagi

Transport Layer Security Protocol for Intranet

Authors: Mohammed Adeeb Abdul Jabbar, Ali Makki Sagheer, Ayoob Abdulmonem Abdulhameed

Performance of Multiple Antennas Cognitive Relay Networks

Authors: Eman Sadik, Mona Shokair, Said Elhalafawy

Design and Analysis of a New Hash Algorithm with Key Integration

Authors: Richa Purohit, Upendra Mishra, Abhay Bansal

A Frame Work for Business Defect Predictions in Mobiles

Authors: N. Gayatri, S. Nickolas, A. V. Reddy

Continuous Phase Modulation for Digital Video Broadcasting

Authors: Khaled Ramadan, Emad S. Hassan, Xu Zhu, Mohammed Abd-Elnaby, El-Sayed M. El-Rabaie, Fathi E.Abd El-Samie