


default search action
International Journal of Information Security and Privacy, Volume 14
Volume 14, Number 1, 2020
- Amanpreet Kaur, Padam Kumar, Govind P. Gupta:

Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors. 1-15 - Mamata Rath

, Bibudhendu Pati
, Binod Kumar Pattanayak
:
Manifold Surveillance Issues in Wireless Network and the Secured Protocol. 16-26 - Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh

, Gunjan Chhabra
:
Comparison of Various DoS Algorithm. 27-43 - Neha Agarwal

, Ajay Rana
, Jai Prakash Pandey, Amit Agarwal
:
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE. 44-66 - Partha Ghosh

, Sumit Biswas, Shivam Shakti, Santanu Phadikar:
An Improved Intrusion Detection System to Preserve Security in Cloud Environment. 67-80
Volume 14, Number 2, 2020
- Khundrakpam Johnson Singh

, Janggunlun Haokip, Usham Sanjota Chanu:
A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks. 1-19 - Rui Silva, Raul Barbosa

, Jorge Bernardino
:
Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice. 20-40 - Hania Gadouche

, Farah Zoubeyr, Abdelkamel Tari:
A Valid and Correct-by-Construction Formal Specification of RBAC. 41-61 - Dhruti Sharma, Devesh C. Jinwala:

Aggregate Searchable Encryption With Result Privacy. 62-82 - Giridhar Maji

, Sharmistha Mandal
, Soumya Sen
:
Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain. 83-101 - Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:

Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. 102-115 - Shelendra Kumar Jain

, Nishtha Kesswani:
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment. 116-142
Volume 14, Number 3, 2020
- Geetika Sarna, Mahinder Pal Singh Bhatia

:
Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network. 1-17 - Sharmila Subudhi

, Suvasini Panigrahi:
Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning. 18-37 - Pranav Vyas

, Bhushan Trivedi:
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application. 38-49 - Oussama Hannache

, Mohamed Chaouki Batouche
:
Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments. 50-71 - Pooja Parameshwarappa, Zhiyuan Chen, Akif Günes Koru:

An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization. 72-94 - Ravi Kiran Varma Penmatsa

, Akhila Kalidindi, S. Kumar Reddy Mallidi
:
Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets. 95-114 - J. Rene Beulah

, D. Shalini Punithavathani:
An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions. 115-133
Volume 14, Number 4, 2020
- Noureddine Aribi

, Yahia Lebbah:
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols. 1-21 - S. Immaculate Shyla

, S. S. Sujatha:
An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System. 22-41 - Mohamed Haddadi, Rachid Beghdad:

A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud. 42-56 - Charu Gupta

, Rakesh Kumar Singh
, Simran Kaur Bhatia, Amar Kumar Mohapatra:
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications. 57-73 - Andrew Besmer, Jason Watson, M. Shane Banks:

Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews. 74-91 - Sheshadri Chatterjee

:
Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. 92-112 - Mary Shamala L

, G. Zayaraz, Vivekanandan K., V. Vijayalakshmi:
A Tweakable Key Alternating Lightweight Cipher for Internet of Things. 113-133

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














