


default search action
International Journal of Information Security and Privacy, Volume 15
Volume 15, Number 1, 2021
- Peng Li, Chao Xu, He Xu:

Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks. 1-23 - Dung Hoang Le, Nguyen Thanh Vu, Tuan Dinh Le:

A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network. 1-25 - Sikha Bagui

, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui:
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm. 26-43 - Hatem Mahmoud Salama

, Mohammed Z. Abd El-Mageed, Gouda Ismail Mohamed Salama, Khaled Mahmoud Badran:
CSMCSM: Client-Server Model for Comprehensive Security in MANETs. 44-64 - Mhamed Zineddine:

IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms. 65-98 - Sarra Namane

, Nassira Ghoualmi
, Mustafa Kaiiali:
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making. 99-116 - Salome James, Thumbur Gowri, Punugu Vasudeva Reddy:

Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery. 117-137 - Mohamed Abdou Souidi

, Noria Taghezout:
Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System. 138-152 - Preetish Ranjan, Abhishek Vaish

:
Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks. 153-172 - Rawan Baalous, Ronald Poet:

Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies. 173-189
Volume 15, Number 2, 2021
- Manisha Duevedi, Sunil Kumar Muttoo:

An Improved Separable and Reversible Steganography in Encrypted Grayscale Images. 1-28 - Shweta Kaushik, Charu Gandhi:

Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud. 29-52 - Abhishek Bansal

, Vinay Kumar:
Steganography Technique Inspired by Rook. 53-67 - Sowmyarani C. N.

, Veena Gadad
, Dayananda P.
:
(p+, α, t)-Anonymity Technique Against Privacy Attacks. 68-86 - Randhir Kumar

, Rakesh Tripathi:
Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain. 87-112 - V. Sandeep

, Saravanan Kondappan
, A. Amir Anton Jone, S. Raj Barath:
Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO). 113-130 - Redha Taguelmimt, Rachid Beghdad:

DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors. 131-144 - Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine

:
Detecting DDoS Attacks in IoT Environment. 145-180 - Hossain Shahriar

, Hisham M. Haddad, Maryam Farhadi:
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications. 181-195 - Suhas Bhagate

, Prakash Jayanth Kulkarni
:
Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization. 196-216
Volume 15, Number 3, 2021
- Hongsong Chen, Caixia Meng, Jingjiu Chen:

DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment. 1-18 - Priti Jagwani, Saroj Kaushik:

Entropy-Based Quantification of Privacy Attained Through User Profile Similarity. 19-32 - Nabil Kannouf

, Mohamed Labbi
, Yassine Chahid
, Mohammed Benabdellah
, Abdelmalek Azizi
:
A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies. 33-47 - Sabyasachi Pramanik

, Debabrata Samanta
, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh:
A New Combinational Technique in Image Steganography. 48-64 - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:

VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks. 65-82 - Vartika Puri

, Parmeet Kaur
, Shelly Sachdeva
:
ADT: Anonymization of Diverse Transactional Data. 83-105 - N. Muraleedharan

, B. Janet
:
SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data. 106-128
Volume 15, Number 4, 2021
- Anshuman Patel

, Devesh Jinwala
:
A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things. 1-17 - Om Prakash Samantray

, Satya Narayan Tripathy:
An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms. 18-30 - Andrew Mangle, Sandip C. Patel, Sanjay Bapna, Xingxing Zu, David Gurzick:

A Model to Improve Security Questions Through Individualized Assistance. 31-53 - Shuru Liu, Zhanlei Shang, Junwei Lei:

Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals. 54-78 - Ahmed Elmorshidy

:
M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office - An Empirical Study. 79-97 - Priya C. V.

, K. S. Angel Viji:
Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm. 98-117 - Sadiq A. Mehdi

:
Image Encryption Algorithm Based on a Novel 4D Chaotic System. 118-131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














