Table of Contents
|
Vlado Glavinić
|
i-ii
|
Special Issue on Network Security
|
Hong Zhao, Kevin Kwiat
|
iii-iv
|
|
Ziqian (Cecilia) Dong, Randolph Espejo, Yu Wan, Wenjie Zhuang
|
283-293
|
|
Ping Huang, Haibing Mu, Fei Zeng
|
295-302
|
|
Xiaoyuan Liang, Jie Tian, Xiaoning Ding, Guiling Wang
|
303-315
|
|
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
|
317-328
|
|
Charles McGuffey, Chen Liu, Stephanie Schuckers
|
329-340
|
|
Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu
|
341-355
|
|
Author Index: CIT Vol. 23 (2015), No 1–4
|
357-359
|
|
Subject Index: CIT Vol. 23 (2015), No 1–4
|
361-362
|
|
List of Referees for Submissions Processed in 2015
|
363-366
|
|
List of Invited Section Editors for Submissions Processed in 2015
|
367
|
|
Impressum
|
|
Journal of Computing and Information Technology

