


default search action
Information Security Journal: A Global Perspective, Volume 25
Volume 25, Numbers 1-3, 2016
- Tsung-Yi Chen, Hsiao-Chuan Shen:

A network behavior evaluation method for improving interactive security in virtual network worlds. 1-17 - Nour Moustafa

, Jill Slay
:
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. 18-31 - Rita Ismailova

, Gulshat Muhametjanova:
Cyber crime risk awareness in Kyrgyz Republic. 32-38 - Sanjay Sareen, Sandeep K. Sood

, Sunil Kumar Gupta
:
Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. 39-53 - Marcus A. Thompson, Michael J. Ryan, Jill Slay

, Alan C. McLucas:
Harmonized taxonomies for security and resilience. 54-67 - Zouheir Trabelsi:

Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network. 68-82 - Jeyasingam Nivethan, Mauricio Papa

:
On the use of open-source firewalls in ICS/SCADA systems. 83-93 - Hussain Alsaiari, Maria Papadaki

, Paul Dowland
, Steven Furnell
:
Graphical One-Time Password (GOTPass): A usability evaluation. 94-108 - Vedrana Krivokuca

, Waleed H. Abdulla
:
Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern. 109-123 - Maged H. Wafy

:
Visibility enhancements of gray and color images with size invariant visual cryptography. 124-135 - Junaid Latief Shah

:
A novel approach for securing IPv6 link local communication. 136-150
Volume 25, Numbers 4-6, 2016
- George Hatzivasilis

, George Floros, Ioannis Papaefstathiou
, Charalampos Manifavas:
Lightweight authenticated encryption for embedded on-chip systems. 151-161 - Rafik Hamza

, Faiza Titouna:
A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. 162-179 - Vishnu Venukumar

, Vinod Pathari
:
A survey of applications of threshold cryptography - proposed and practiced. 180-190 - Milad Taleby Ahvanooey

, Hassan Dana Mazraeh, Seyed Hashem Tabasi
:
An innovative technique for web text watermarking (AITW). 191-196 - Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam

:
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. 197-212 - Deep Chandra Mishra, R. K. Sharma:

An approach for security of color image data in coordinate, geometric, and frequency domains. 213-234 - R. Ranjith Kumar

, S. Jayasudha, S. Pradeep:
Efficient and secure data hiding in encrypted images: A new approach using chaos. 235-246 - Davneet Kaur, Sheetal Kalra

:
Five-tier barrier anti-phishing scheme using hybrid approach. 247-260 - Vedrana Krivokuca

, Waleed H. Abdulla
:
Noninvertible fingerprint transforms: Categorization of design mechanisms and discussion of evaluation techniques. 261-279 - Zhiying Wang, Nianxin Wang

, Xiang Su, Shilun Ge:
Differentiated management strategies on cloud computing data security driven by data value. 280-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














