


default search action
International Journal of Information Security and Privacy, Volume 8
Volume 8, Number 1, 2014
- Mathew Nicho

, Shafaq Khan
:
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective. 1-18 - Mamta Juneja

:
A Covert Communication Model-Based on Image Steganography. 19-37 - Prashanta Kumar Patra

, Padma Lochan Pradhan
:
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System. 38-61 - Aymen Akremi

, Hassen Sallay
, Mohsen Rouached:
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks. 62-78
Volume 8, Number 2, 2014
- M. Poongodi

, Sundan Bose:
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks. 1-18 - Mohamed Cheikh, Salima Hacini, Zizette Boufaïda:

Classification of DOS Attacks Using Visualization Technique. 19-32 - Xiang Fang, Sooun Lee:

Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study. 33-54 - Vinay Kumar, Abhishek Bansal

, Sunil Kumar Muttoo:
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution. 55-68
Volume 8, Number 3, 2014
- Mohanad Halaweh

:
Users' Perception of Security for Mobile Communication Technology. 1-12 - Wiem Hammami, Ilhem Souissi

, Lamjed Ben Said
:
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services. 13-38 - Janakiramaiah Bonam

, Ramamohan Reddy:
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment. 39-62 - Xiaojun Wang

, Brendan Cronin:
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems. 63-76
Volume 8, Number 4, 2014
- Chikh Ramdane, Salim Chikhi:

A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. 1-25 - Hella Kaffel Ben Ayed, Asma Hamed:

Toward Proactive Mobile Tracking Management. 26-43 - Amr Ali Eldin

, Jan van den Berg, Semir Daskapan:
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems. 44-61 - Piotr Ksiazak, William Farrelly

, Kevin Curran
:
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks. 62-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














