


default search action
Information Security Journal: A Global Perspective, Volume 33
Volume 33, Number 1, January 2024
- Rajesh Bingu

, S. Jothilakshmi, N. Srinivasu:
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment. 1-15 - Tulsi Pawan Fowdur, Shuaïb Hosenally:

A real-time machine learning application for browser extension security monitoring. 16-41 - Farid Javani

, Alan T. Sherman
:
BVOT: self-tallying boardroom voting with oblivious transfer. 42-53 - Nelson Russo

, Leonilde Reis
, Maria Clara Silveira
, Henrique S. Mamede
:
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. 54-72 - Savitha M. M

, Basarkod P. I:
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms. 73-95
Volume 33, Number 2, March 2024
- Payal Sharma

, B. R. Purushothama
:
A lightweight group key management scheme with constant rekeying cost and public bulletin size. 97-120 - Joakim Kävrestad, Steven Furnell, Marcus Nohlberg:

User perception of Context-Based Micro-Training - a method for cybersecurity training. 121-137 - Thierry Mefenza, Damien Vergnaud

:
Lattice attacks on pairing-based signatures. 138-157 - Salifu Yusif

, Abdul Hafeez-Baig
, Charles Anachanser:
Internet governance and cyber-security: a systematic literature review. 158-171 - Divya V. L., Job P. A., K. Preetha Mathew:

Secure query processing and optimization in cloud environment: a review. 172-191
Volume 33, Number 3, May 2024
- Asia Othman Aljahdali

, Shoroq Banafee, Thana Aljohani:
URL filtering using machine learning algorithms. 193-203 - Benjamin F. Madnick, Keman Huang

, Stuart E. Madnick
:
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process. 204-225 - B. Rahul

, K. Kuppusamy, A. Senthilrajan:
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm. 226-250 - Kazi Zakia Sultana, Vaibhav K. Anu

, Tai-Yin Chong:
Using software metrics for predicting vulnerable classes in java and python based systems. 251-267 - Mojtaba Goodarzi, Ziba Eslami, Nasrollah Pakniat

:
Certificateless directed signature scheme without bilinear pairing. 268-284 - Mikko Suorsa

, Petri T. Helo
:
Information security failures identified and measured - ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis. 285-306 - Alec Wells, Aminu Bello Usman

:
Privacy and biometrics for smart healthcare systems: attacks, and techniques. 307-331 - Shubha Pankaj, Mohit Dua

:
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis. 332-358
Volume 33, Number 4, July 2024
- Basil C. E. Oguguo

, Christopher A. Ocheni
:
Cybersecurity: a tool for curbing examination breaches and improvement of the quality of large-scale educational assessments. 359-373 - Govindasamy Chinnaraj, Arokiasamy Antonidoss:

Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology. 374-393 - Kudakwashe Maguraushe

, Adéle da Veiga
, Nico Martins
:
A personal information privacy perceptions model for university students. 394-424 - Sambhrant Maurya, Anand Handa, Nitesh Kumar, Sandeep K. Shukla:

Adversarially robust and real-time DDoS detection and classification framework using AutoML. 425-442 - Leki Chom Thungon, Subhas Chandra Sahana, Md. Iftekhar Hussain:

"A lightweight authentication scheme for 6LoWPAN-based Internet-of -things". 443-453
Volume 33, Number 5, September 2024
- Ziaul Haque Choudhury

:
Biometric passport security based on face recognition and biometric encryption using secure force algorithm into the HCC2D code. 455-472 - Rasheed Gbenga Jimoh, Joseph Bamidele Awotunde

, Roseline Oluwaseun Ogundokun, Damilola Silas Adeoti:
A randomized encryption algorithm for the MPEG-DASH digital rights management. 473-485 - Maria Leitner

, Florian Skopik
, Timea Pahi
:
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries. 486-507 - Mayssa Tayachi, Laurent Nana, Anca Pascu, Faouzi Benzarti

:
A zero-watermarking approach for DICOM images authentication based on Jacobian model. 508-527 - Anwer Mbiriki, Chaker Katar, Ahmed Badreddine:

A new early warning system based on metaheuristics in CPS architecture. 528-545 - Shail Saharan, Vishal Gupta:

Prevention of DDoS attacks: a comprehensive review and future directions. 546-578 - Mila Malekolkalami, Leila Jabbari

, Hassan Mantegh:
Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University. 579-592 - Ninmoy Debnath, Ankit Kumar Jain

:
A comprehensive survey on mobile browser security issues, challenges and solutions. 593-612
Volume 33, Number 6, November 2024
- Asha Varma Songa, Ganesh Reddy Karri

:
An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment. 613-625 - Garry L. White:

Security literacy model for strategic, tactical, & operational management levels. 626-634 - Mohamed Chawki

:
An effective cloud computing model enhancing privacy in cloud computing. 635-658 - Wasim A. Ali

, Michele Roccotelli, Gennaro Boggia, Maria Pia Fanti:
Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques. 659-677 - Florence U. Rashidi

, Mustafa Habibu Mohsini
, Bakari Mega:
A framework for security improvement on usage of mobile money application based on iris biometric authentication method. 678-690

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














