


default search action
International Journal of Information Security and Privacy, Volume 18
Volume 18, 2024
- Musa Ugbedeojo, Marion O. Adebiyi
, Oluwasegun Julius Aroba
, Ayodele Ariyo Adebiyi:
RSA and Elliptic Curve Encryption System: A Systematic Literature Review. 1-27 - Zhiqiang Wu
:
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion. 1-15 - Dongyan Zhang, Lili Zhang, Zhiyong Zhang
, Zhongya Zhang:
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy. 1-19 - Yashu Liu
, Xiaoyi Zhao, Xiaohua Qiu, Han-Bing Yan:
VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs. 1-21 - Yuan Tian
, Wendong Wang, Jingyuan He:
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. 1-28 - Abdulhakim Sabur
, Ahmad Showail
:
Nudging Data Privacy of Mobile Health Applications in Saudi Arabia. 1-19 - Longfei Fu, Yibin Liu, Yanjun Zhang, Ming Li:
Network Information Security Monitoring Under Artificial Intelligence Environment. 1-25 - Zhiqiang Wu
, Shuhui Wan:
An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion. 1-19 - Zhijie Fan, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng, Xin Li:
Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection. 1-26 - Yancho Basil Wiryen, Auguste Vigny Noumsi, Joseph Mvogo Ngono, Louis Aimé Fono
:
Leveraging TenSEAL: A Comparative Study of BFV and CKKS Schemes for Training ML Models on Encrypted IoT Data. 1-17 - Fares Alharbi, Gautam Siddharth Kashyap
, Budoor Ahmad Allehyani
:
Automated Ruleset Generation for "HTTPS Everywhere": Challenges, Implementation, and Insights. 1-14 - Santosh Joshi
, Alexander Perez-Pons
, Shrirang Ambaji Kulkarni, Himanshu Upadhyay:
Application of Machine Learning Models for Malware Classification With Real and Synthetic Datasets. 1-23 - Alimire Maimaiti Tuxun, Qingrui Guo:
A Network Security Transmission Model Based on Improved Sparrow Search Algorithm. 1-17 - Miaomiao Dong
:
Explaining Privacy Paradox on WeChat: Investigating the Effect of Privacy Fatigue on Personal Information Disclosure Behaviors Among SNS Users. 1-24 - Yaping Zhang:
A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection. 1-20 - Lijun Gu, Zhongye Wang:
A Multi-Scale Feature Extraction Method Based on Improved Transformer for Intrusion Detection. 1-20 - Xinyuan Liu
, Hongyang He:
Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer. 1-21 - Rafael Martínez-Peláez
, Pablo Velarde-Alvarado, Vanessa G. Felix
, Alberto M. Ochoa-Brust, Rodolfo Ostos, Luis J. Mena
:
Assessing Employee Susceptibility to Cybersecurity Risks. 1-25 - Binjing Li, Wendong Yu:
Enhancing Legal Protection of Children's Rights in the "Internet Plus". 1-17 - Zhiwei Cao, Zhijie Fan, Boan Chen, Zidong Cheng, Shijun Xu, Xin Li:
Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals. 1-27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.