


default search action
Information Security Journal: A Global Perspective, Volume 30
Volume 30, Number 1, 2021
- Rasim M. Alguliyev

, Yadigar N. Imamverdiyev
, Rasim Sh. Mahmudov
, Ramiz M. Aliguliyev
:
Information security as a national security component. 1-18 - Wenchao Cui, Qiong Lu, Asif Moin Qureshi, Wei Li, Kehe Wu:

An adaptive LeNet-5 model for anomaly detection. 19-29
- Richard Charles Hornberger

:
Creating a sense of digital privacy in the private sector. 30-56
- Ibrahim F. Elashry:

Cryptanalysis of Jain-Singh's identity-based RSA encryption. 57-61
Volume 30, Number 2, 2021
- Sachin Dhawan

, Rashmi Gupta
:
Analysis of various data security techniques of steganography: A survey. 63-87
- Yegin Genc, Harpreet Kour, Hasan T. Arslan, Li-Chiou Chen:

Understanding Nigerian e-mail scams: A computational content analysis approach. 88-99 - Christian Graham

:
Fear of the unknown with healthcare IoT devices: An exploratory study. 100-110 - Jennifer Batamuliza

, Damien Hanyurwimfura
:
Identity based encryption with equality test. 111-124
Volume 30, Number 3, 2021
- Taban Habibu

, Edith Talina Luhanga, Anael Elikana Sam:
A study of users' compliance and satisfied utilization of biometric application system. 125-138 - Martti Lehto

, Jarno Limnéll:
Strategic leadership in cyber security, case Finland. 139-148 - Dyala R. Ibrahim

, Je Sen Teh
, Rosni Abdullah
:
Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization. 149-159 - Siva Reddy Sonti

, Mutchakayala Siva Ganga Prasad
:
Improved Whale Optimization Algorithm and Convolutional neural network based Cooperative Spectrum Sensing in Cognitive Radio Networks. 160-172 - Jacques Bou Abdo, Sherali Zeadally:

Neural network-based blockchain decision scheme. 173-187
Volume 30, Number 4, 2021
- Osamah M. Al-Matari, Iman M. A. Helal

, Sherif A. Mazen, Sherif Elhennawy:
Integrated framework for cybersecurity auditing. 189-204 - Tianyu Wang

, Li-Chiou Chen, Yegin Genc:
A dictionary-based method for detecting machine-generated domains. 205-218 - Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:

Fast secure matrix multiplications over ring-based homomorphic encryption. 219-234 - Ibrahim Ali Alnajjar, Massudi Mahmuddin:

Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment. 235-256
Volume 30, Number 5, 2021
- Hiten Choudhury

, Bidisha Goswami, Sameer Kumar Gurung:
CovidChain: An Anonymity Preserving Blockchain Based Framework for Protection Against Covid-19. 257-280 - Malika Bendechache

, Pintu Lohar, Guodong Xie, Rob Brennan
, Ramona Trestian, Edoardo Celeste
, Kristina Kapanova
, Evgeniia Jayasekera, Irina Tal:
Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study. 281-293 - Erik B. Korn, Douglas M. Fletcher, Erica M. Mitchell, Aryn A. Pyke, Steven M. Whitham:

Jack pandemus - Cyber incident and emergency response during a pandemic. 294-307
Volume 30, Number 6, 2021
- Shani Raj, B. Arun Kumar, G. K. D. Prasanna Venkatesan

:
A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system. 309-324 - Sreeparna Chakrabarti

, G. N. K. Suresh Babu:
The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model. 325-341 - Ziaul Haque Choudhury

, M. Munir Ahamed Rabbani
:
Facial blemishes detection and encryption with secure force algorithm into HCC2D code for biometric-passport. 342-358 - Md. Rashedul Islam

, T. R. Tanni, S. Parvin, M. J. Sultana, Ayasha Siddiqa:
A modified LSB image steganography method using filtering algorithm and stream of password. 359-370 - Suhad Muhajer Kareem, Abdul Monem S. Rahma:

New method for improving add round key in the advanced encryption standard algorithm. 371-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














