


default search action
International Journal of Information Security and Privacy, Volume 17
Volume 17, Number 1, 2023
- Suman Thapaliya, Pawan Kumar Sharma:

Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures. 1-22 - Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas

, José Luis Arias-Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj:
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing. 1-25 - Mallanagouda Biradar

, Basavaraj Mathapathi:
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN. 1-18 - Zhen Gu

, Guoyin Zhang:
Trajectory Data Publication Based on Differential Privacy. 1-15 - Sabrine Ennaji

, Nabil El Akkad, Khalid Haddouch:
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. 1-17 - Ali Alibeigi, Munir Abu Bakar, Adeleh Asemi:

Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies. 1-25 - Sangita Baruah

, Dhruba Jyoti Borah
, Vaskar Deka
:
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm. 1-16 - Mohamed Guendouz

, Abdelmalek Amine
:
A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques. 1-18 - Mathew Nicho, Christopher D. McDermott

, Hussein Fakhry, Shini Girija
:
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors. 1-23 - Zhijie Fan, Zhiwei Cao, Xin Li, Chunmei Wang, Bo Jin, Qianjin Tang:

Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features. 1-18 - Chuyi Yan, Haixia Xu, Peili Li:

"Every Dog Has His Day": Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption. 1-27 - Jinhai Song, Zhiyong Zhang

, Kejing Zhao, Qinhai Xue, Brij B. Gupta:
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet. 1-18 - Alec Wells, Aminu Bello Usman

:
Trust and Voice Biometrics Authentication for Internet of Things. 1-28 - Xinqiang Wang, Wenhuan Lu:

Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks. 1-14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














