


default search action
International Journal of Information Security and Privacy, Volume 16
Volume 16, Number 1, 2022
- Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:

Privacy Disclosure in the Real World: An Experimental Study. 1-22 - Abdallah Soualmi

, Adel Alti
, Lamri Laouamer:
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection. 1-18 - M. D. J. S. Goonetillake, Rangana Jayashanka

, S. V. Rathnayaka:
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics. 1-26 - Anderson Aparecido Alves da Silva

, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas
, Marcelo Teixeira de Azevedo
, Sergio Takeo Kofuji
:
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments. 1-16 - Sergey Sakulin

, Alexander Alfimtsev
, Konstantin Kvitchenko, Leonid Dobkacz
, Yuri Kalgin
, Igor I. Lychkov:
Network Anomalies Detection Approach Based on Weighted Voting. 1-17 - Danish Ahamad, Md. Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom

:
Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication. 1-20 - Erukala Suresh Babu

, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao
:
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network. 1-24 - Mpho Ngoepe

, Mfanasibili Ngwenya
:
Personal Data and the Assemblage Security in Consumer Internet of Things. 1-20 - Moez Farokhnia Hamedani, Ali Dehghan:

Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms. 1-16 - Liangshun Wu, Hengjin Cai, Han Li:

Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX. 1-20 - Faheem Syeed Masoodi

, Iram Abrar, Alwi M. Bamhdi
:
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques. 1-18 - Ankit Rajeshkumar Kharwar, Devendra V. Thakor

:
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm. 1-21 - Bahubali Akiwate

, Latha Parthiban
:
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences. 1-18 - Boubakeur Annane

, Adel Alti
:
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile. 1-38 - Kapil Kant Kamal

, Monit Kapoor
, Padmaja Joshi
:
Secure and Flexible Key Protected Identity Framework for Mobile Devices. 1-17 - Adnan Gutub

:
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication. 1-18 - Faruk Arslan

, Kallol Kumar Bagchi
, Godwin J. Udo:
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context. 1-26 - Ping Zhao, Zhijie Fan, Zhiwei Cao, Xin Li:

Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism. 1-20 - R. Balakrishnan Unny

, Nityesh Bhatt
:
A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems. 1-22 - Romil Rawat

, Vinod Kumar Mahor, Bhagwati Garg, Shrikant Telang
, Kiran Pachlasiya
, Anil Kumar
, Surendra Kumar Shukla
, Megha Kuliha:
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities. 1-14 - Sanjay Adiwal

, Balaji Rajendran
, Pushparaj Shetty D
:
A Quantitative Method for Measuring Health of Authoritative Name Servers. 1-19 - Rohit Sinha

, Rittika Sur, Ruchi Sharma
, Avinash K. Shrivastava
:
Anomaly Detection Using System Logs: A Deep Learning Approach. 1-15 - Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane:

A Proposal Phishing Attack Detection System on Twitter. 1-27 - Pankaj Pankaj, Bharti P. K, Brajesh Kumar:

A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture. 1-25 - Kakali Chatterjee:

A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation. 1-24 - R. E. Vinodhini, P. Malathi:

Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security. 1-20 - Na Hua, Juyan Li, Kejia Zhang, Long Zhang

:
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices. 1-17 - Mohammed Tayebi

, Said El Kafhali
:
Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution. 1-21 - Nitin O. Mathur

, Chengcheng Li, Bilal Gonen, Kijung Lee:
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection. 1-32 - Divyashikha Sethia, Raj Sahu

:
Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation. 1-19 - Chandra Sekhar Kolli

, Uma Devi Tatavarthi
:
Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank. 1-20 - Bharath M. R., K. A. Radhakrishna Rao:

Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification. 1-44 - Boris Jerson Zannou, Tahirou Djara

, Antoine Vianou:
Cylindrical Curve for Contactless Fingerprint Template Securisation. 1-28 - Guoyan Li

, Yihui Shang, Yi Liu, Xiangru Zhou:
A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking. 1-17 - Adnan Gutub

:
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility. 1-28 - Mohammad H. Alshayeji

, Mousa AlSulaimi, Sa'ed Abed
, Reem Jaffal:
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine. 1-18 - H. L. Gururaj, Prithwijit Mitra, Soumyadip Koner, Sauvik Bal

, Francesco Flammini
, Janhavi V., Ravi Kumar V.
:
Prediction of Phishing Websites Using AI Techniques. 1-14 - Garry L. White:

Infrastructure Cyber-Attack Awareness Training: Effective or Not? 1-26 - Ankush Balaram Pawar, Shashikant U. Ghumbre

, Rashmi M. Jogdand:
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols. 1-24 - Xin Liu

, Bin Zhang:
An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud. 1-24 - Dipali K. Shende, Yogesh Angal, S. C. Patil:

An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT. 1-24 - Monica Malik

, Khushi Gandhi
, Bhawna Narwal:
AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks. 1-31 - Amine Sallah

, El Arbi Abdellaoui Alaoui, Said Agoujil, Anand Nayyar
:
Machine Learning Interpretability to Detect Fake Accounts in Instagram. 1-25 - Sachikanta Dash

, Sasmita Padhy
, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro
:
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. 1-24 - Erkan Çetintas, Ikram Dastan:

Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA. 1-19 - Ritinder Kaur

, Neha Gupta
:
CFS-MHA: A Two-Stage Network Intrusion Detection Framework. 1-27 - Yonglei Liu

, Kun Hao, Weilong Zhang, Lin Gao
, Li Wang:
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes. 1-14 - Karim Ouazzane, Thekla Polykarpou, Yogesh Patel, Jun Li:

An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach. 1-17 - Chaudhari D. A., Dipalee A. Chaudhari, Umamaheswari E., E. Umamaheswari:

Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications. 1-17 - Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy

, Andrey Koucheryavy:
Fractals for Internet of Things Network Structure Planning. 1-12 - El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai

, Anand Nayyar
:
Using Machine Learning in WSNs for Performance Prediction MAC Layer. 1-18 - Prathiba Ashok, Suyash Vardhan Srivathshav, E. Ramkumar, P. Rajkamal, V. S. Kanchana Bhaaskaran

:
Lightweight VLSI Architectures for Image Encryption Applications. 1-23 - R. Lalduhsaka

, Nilutpol Bora, Ajoy Kumar Khan:
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach. 1-15 - Abhaya Kumar Sahoo, Srishti Raj

, Chittaranjan Pradhan
, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik
, Ankit Vidyarthi:
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System. 1-20 - Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty:

Deep Ensemble Model for Detecting Attacks in Industrial IoT. 1-29 - Rajamandrapu Srinivas, N. Mayur:

Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System. 1-21 - Sahana Lokesh R.

, H. R. Ranganatha:
An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization. 1-20 - Mini Zeng, Feng Zhu, Sandra Carpenter:

Dynamic Warnings: An Eye Gaze-Based Approach. 1-28 - Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz:

Real-Time Cyber Analytics Data Collection Framework. 1-10 - Srijita Basu, Sandip Karmakar, Debasish Bera:

Securing Cloud Virtual Machine Image Using Ethereum Blockchain. 1-22 - Faiza Benmenzer, Rachid Beghdad:

Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments. 1-20 - Meenu Jain, Manisha Jailia

:
Blockchain-Based Data Sharing Approach Considering Educational Data. 1-20 - Hicham Grari

, Khalid Zine-Dine
, Ahmed Azouaoui
, Siham Lamzabi:
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher. 1-16
Volume 16, Number 2, 2022
- Tirupathaiah Kanaparthi

, S. Ramesh
, Ravi Sekhar Yarrabothu:
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks. 1-18 - Hong Wei, Zhiyong Li:

Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference. 1-18 - Jintao Chen, Binruo Zhu, Fang Zhao, Ruili Huang:

Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking. 1-20 - Bin Fang:

Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities. 1-20 - Anjana S. Chandran:

Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology. 1-18 - Leelalakshmi S., K. Rameshkumar

:
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN. 1-22 - Chakka S. V. V. S. N. Murty

, G. P. Saradhi Varma, A. S. N. Chakravarthy:
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model. 1-19 - Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam:

Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption. 1-15 - Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li:

Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence. 1-19 - Santhoshkumar K., Suganthi P.:

AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set. 1-17 - Abhijit Biswas, Dushyanta Dutta:

Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol. 1-18 - Kimmi Kumari, Mrunalini Marlakunta:

A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data. 1-13 - Kusuma S. M., Veena K. N., B. V. Varun:

A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN. 1-16 - Kalluri Rama Krishna, C. V. Guru Rao

:
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments. 1-15 - (Withdrawn) Balanced Scheduling Method of Network Information Resources for Cloud Storage. 1-17


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














