


default search action
Journal of Internet Services and Information Security, Volume 15
Volume 15, Number 1, 2025
- Puspita Kencana Sari, Nurvita Trianasari

, Adhi Prasetio:
Investigating the Main Factors Affecting Healthcare Workers' Information Security Behaviors: An Empirical Study in Indonesia. 1-15 - Pericherla Satya Suryateja

, Kasukurthi Venkata Rao:
Performance Evaluation of Contemporary Block Ciphers for IoT Applications. 16-31 - Diego Gustavo Andrade Armas

, Segundo Moisés Toapanta Toapanta, Eriannys Zharayth Gómez Díaz, Janio Lincon Jadán Guerrero, Ma. Roció Maciel Arellano, María Mercedes Baño Hifóng:
Influence of Social Media and Artificial Intelligence on Cyberbullying for Decision-Making with Legal or Judicial Foundations in Ecuador. 32-50 - M. F. Al-Gailani:

AES Cipher's Candidates: Design and FPGA Implementation. 51-66 - Aseel Qasim:

Efficient Multi-Carrier Communication Systems: A Performance Evaluation of Parallel and Sequential Data Processing Models. 67-78 - Ali Mohammed Ridha, Ali Jafer Mahdi, Hussban Abood Saber, Mohammed Jamal Mohammed:

Optimal Design of a Wireless Charging System for an Implanted Hearing Device. 79-95 - Gulnoza Odilova

, Matluba Zaripova, Anora Jabbarova, Nodira Urinova, Muhayyo Davlatova, Ibrokhim Sapaev, Akbarbek Allashev, Mahina Akhrorova:
Information Security Framework for Online Language Education Using Differential Privacy and Secure Multi-Party Computation Algorithm. 96-106 - Development of CNN and YOLO Models to Detect Smoking Violations of Cadets in the Environment Politeknik Transportasi SDP Palembang. 107-129

- Firas Abdulrahman Yousif

:
Securing Cloud Data Storage through Blockchain-Enhanced Encryption. 130-152 - Nadia Ibrahim Nife, Zaidoon Khalaf Mahmood, Layth Hammood, Alaan Ghazi, Aras Al-Dawoodi

, Mustafa Albdairi:
Self-Supervised Learning Approach for Early Detection of Rare Neurological Disorders in MRI Data. 153-169 - Meenal R. Kale, Itikela Shyam Sundar, Bhuvana Jayabalan, Bineet Desai

, Akash Kumar Bhagat, Sachin S. Pund:
Revolutionizing Mobile Banking System: Novel ML-Based Approach for Securing Cloud Data. 170-181 - C. K. Sripavithra, V. B. Kirubanand:

An Energy-aware Dynamic Scheduling Algorithm for Optimizing Workflows Under Budget-constraints. 182-199 - Maysoon Khazaal Abbas Maaroof, Dalia Abdulrahim Mokheef Aljabri, Nuha Kareem Hameed Rasheed Al-Msarhed:

Enhancing Multi-Scale Retinex Algorithm Utilizing H.265/HEVC for Improved Video Compression. 200-217 - Asaad Shakir Hameed

, Haiffa Muhsan B. Alrikabi, Abeer A. Abdul-Razaq, Huda Karem Nasser, Modhi Lafta Mutar
, Hala Hilal Katea:
A Detailed Review of the Capacitated Vehicle Routing Problem: Model, Computational Complexity, Solutions, and Practical Applications. 218-235 - Mohammad Mustafa Taye, Rawan Abulail, Belal Al-Ifan, Fadi Alsuhimat:

Enhanced Sentiment Classification through Ontology-Based Sentiment Analysis with BERT. 236-256 - Rawan Nassri Abulail:

Enhanced Fitness Proportionate Selection Algorithm for Parent Selection in Genetic Algorithms. 257-270 - Jonathan Ismael Zapata Sandoval, Elian Garcés, Walter Fuertes:

Ransomware Detection with Machine Learning: Techniques, Challenges, and Future Directions - A Systematic Review. 271-287 - Toru Nakamura, Hiroshi Ito, Jeuk Kang, Takamasa Isohara, Toshihiro Yamauchi:

Ensuring Log Authenticity in System Audits with VMM-Based Evidence Collection. 288-304 - Muslihiddin Muhiddinov:

Privacy-Aware Information Security for E-Learning Platforms in History Using Attribute-Based Encryption Algorithm. 305-315 - Dipti N. Kashyap

, Kshitij Naikade, Arvind Kumar Pandey
, Nittin Sharma, Sadaf Hashmi, Sachin S. Pund:
Enhancing Credit Card Data Security Using AI-integrated Encryption and Tokenization Framework. 316-329 - Awwal Ishiaku

, Christian Bassey
:
Optimizing Synchronization and Role-Based Access Control in Double-Surgeon Telesurgery Cockpits. 330-347 - Anbarasu Aladiyan

:
Digital Safeguards: Unravelling the Complex Interplay Between Emerging Threats and Proactive Cyber Defence Strategies. 348-360 - Ensuring Data Integrity and Security in AI-Based Lung Cancer Nodule Classification and Detection in CT Imaging Systems. 361-370

- Nawaf Abdualaziz Almolhis:

Intrusion Detection Using Hybrid Random Forest and Attention Models and Explainable AI Visualization. 371-384 - Haydar Abdulameer Marhoon, Atheer Y. Oudah, Naseer Ali Hussien, Alubady Raaid:

Designing Wireless Sensor Network Data Based Machine Learning Approach for Accurate Human Activity Recognition. 385-400 - T. Yogesha, S. N. Thimmaraju:

Intelligent Web Mining: Using Text, Image, Audio, and Video Data to Gain Knowledge. 401-412 - V. Selvakumar, John Yesudas Valluri, Takveer Singh, V. Haripriya

, Shibani Borah
, Sachin S. Pund:
An Innovative ML Strategy for Identifying Email Phishing Threats in Financial Cloud Infrastructure. 413-425 - Jamila Djumabaeva

, Makhfirat Qurbonalieva, Farrukh Bakhritdinov
, Dilnavoz Mahametova, Ibrokhim Sapaev, Umida Nasirova
, Azimidin Nasirov, Shakhnoza Jalolova:
Secure Cross-Border Collaboration in Language and History Research Using Blockchain Smart Contracts. 426-436 - Adekunle Micheal Adeshina, Olayinka Adeleye, Siti Fatimah Abdul Razak

:
Predictive Model for Healthcare Software Defect Severity using Vote Ensemble Learning and Natural Language Processing. 437-450 - R. Vijaya Arjunan, Ruppikha Sree Shankar

, Manjunath G. Asuti, Nirmalkumar S. Benni, Nijaguna Gollara Siddappa
, Praveen S. Challagidad, Venkatesh Bhandage:
Deciphering Ancient Tamil Epigraphy: A Deep Learning Approach for Vatteluttu Script Recognition. 451-467 - P. S. Shruthi

, D. R. Umesh:
Hybrid Scaling in Cloud Computing for Optimizing Resource Utilization: An LSTM-Enhanced Actor-Critic Learning Model. 468-485 - R. Y. Aburasain:

Revolutionizing Traffic Flow Prediction Using a Hybrid Deep Learning Models with Kookaburra Optimization Algorithm. 486-501 - Akash Parasumanna Sridhar:

Analyzing Social Engineering Attack Patterns Using Behavioral Psychology and AI-Driven Defense Mechanisms. 502-519 - Dilrabo Bakhronova

:
Intelligent Information Security System for Language and History Education Using Machine Learning-based Intrusion Detection Algorithm. 520-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














