


default search action
Information Security Journal: A Global Perspective, Volume 32
Volume 32, Number 1, January 2023
- Deepali Bankatsingh Gothawal

, S. V. Nagaraj:
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model. 1-20 - Othmane Nait Hamoud, Tayeb Kenaza

, Yacine Challal
, Lina Ben-Abdelatif, Maroua Ouaked:
Implementing a secure remote patient monitoring system. 21-38 - Faozi A. Almaqtari

, Najib H. S. Farhan
, Ali T. Yahya
, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim:
The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan. 39-57
Volume 32, Number 2, March 2023
- A. Hadj Brahim

, Adda Ali-Pacha
, Naima Hadj-Said:
A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. 59-75 - Dhruti Sharma:

Searchable encryption : A survey. 76-119 - Elmarie Kritzinger

, Adéle da Veiga
, Wynand van Staden
:
Measuring organizational information security awareness in South Africa. 120-133 - Lampis Alevizos

, Eliana Stavrou
:
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). 134-161
Volume 32, Number 3, May 2023
- Samaneh Mashhadi

:
Game-based security proofs for verifiable secret sharing schemes in the standard model. 163-172 - Bilal Akhtar, Ammar Masood:

Security analysis and enhancements of UAS architecture. 173-186 - Mohammed Naim

, Adda Ali Pacha
:
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. 187-211 - Naib Rabiaa, Ali Cherif Moussa, Sofiane Boukli Hacene

:
A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks. 212-226
Volume 32, Number 4, July 2023
- Barnali Gupta Banik

, Abhinandan Banik
:
Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video. 227-251 - Mohammed Nasereddin

, Ashaar ALKhamaiseh
, Malik Qasaimeh, Raad S. Al-Qassas
:
A systematic review of detection and prevention techniques of SQL injection attacks. 252-265 - Ourania Koutzampasopoulou Xanthidou

, Dimitrios Xanthidis
, Christos Manolas
, Han-I Wang
:
Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman. 266-282 - Reza Hooshmand, Alireza Jafari, Gholamreza Karamali:

Id-PC: An Identification Scheme based on Polar Codes. 283-296 - Paul A. Wortman

, John A. Chandy
:
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk. 297-313
Volume 32, Number 5, September 2023
- Kante Ramesh

, Mohanasundram R:
Analysis of web data classification methods based on semantic similarity measure. 315-330 - Sunita Usturge

, T. Pavan Kumar:
DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot. 331-346 - Sabina Barakovic

, Jasmina Barakovic Husic
:
Cyber hygiene knowledge, awareness, and behavioral practices of university students. 347-370 - Filippos Giannakas

, Christos Troussas
, Akrivi Krouska
, Ioannis Voyiatzis
, Cleo Sgouropoulou
:
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. 371-382 - Nayana Hegde

, Sunilkumar S. Manvi, Harjinder Singh Lallie:
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor. 383-400
Volume 32, Number 6, November 2023
- Lovi Dhamija, Urvashi Garg

:
An adaptive randomized and secured approach against adversarial attacks. 401-416 - Ramadan Dervishi

, Vehbi Neziri
, Blerim Rexha
:
Transactions privacy on blockchain using web of trust concept. 417-429 - Puvvada Nagesh

, N. Srinivasu:
Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment. 430-443 - Suruchi Karnani

, Harish Kumar Shakya:
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy. 444-468 - Dan Bouhnik

, Achia Admoni
:
"We had no homefront": another piece of the U.S part in the information warfare story. 469-480 - Mohammed Safy Elwan

, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan:
Intelligent security sanitizing gate. 481-493

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














