


default search action
Journal of Internet Services and Information Security, Volume 9
Volume 9, Number 1, February 2019
- Ilsun You:

Letter from the Editor-in-Chief. 1 - Shingo Sato

, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. 2-23 - Emre Süren

, Pelin Angin:
Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits. 24-47 - Jaemin Jung, Hyun-Jin Kim, Seong-je Cho, Sangchul Han, Kyoungwon Suh:

Efficient Android Malware Detection Using API Rank and Machine Learning. 48-59 - Yi-Chih Kao, Jui-Chun Liu, You-Hong Wang, Yu-Huang Chu, Shi-Chun Tsai, Yi-Bing Lin:

Automatic Blocking Mechanism for Information Security with SDN. 60-73
Volume 9, Number 2, May 2019
- Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, Fuhong Lin:

Survey on Blockchain for Internet of Things. 1-30 - Yuanhao Wang, Meiyan Xiao, Ying Miao, Wenbo Liu, Qiong Huang:

Signature Scheme from Trapdoor Functions. 31-41 - Hyun-Bae Park, Yongeun Kim, Jaeseok Jeon, Heeseok Moon, Samuel Woo:

Practical Methodology for In-Vehicle CAN Security Evaluation. 42-56 - Heather Craddock, Lakshmi Prasanna Konudula, Gökhan Kul:

A Survey on the Challenges of Implementing Physical Memory Pools. 57-71
Volume 9, Number 3, August 2019
- Alexander Branitskiy, Dmitry Levshun

, Natalia Krasilnikova, Elena Doynikova
, Igor V. Kotenko, Artem Tishkov
, Nina Vanchakova, Andrey Chechulin
:
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks. 1-20 - Chatchai Punriboon, Chakchai So-In

, Phet Aimtongkham, Kanokmon Rujirakul
:
A Bio-Inspired Capacitated Vehicle-Routing Problem Scheme Using Artificial Bee Colony with Crossover Optimizations. 21-40 - Noriki Uchida, Goshi Sato, Yoshitaka Shibata:

Device-to-Device Communication based DTN for Disaster Information System by using Emergent User Policy and Locational Information. 41-51 - Matthias Eckhart

, Bernhard Brenner, Andreas Ekelhart, Edgar R. Weippl:
Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. 52-73 - Chao-Tung Yang, Shuo-Tsung Chen, Wei-Hsiang Lien, Vinod Kumar Verma

:
Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies. 74-97
Volume 9, Number 4, November 2019
- Ram B. Basnet, Riad Shash, Clayton Johnson, Lucas Walgren, Tenzin Doleck:

Towards Detecting and Classifying Network Intrusion Traffic Using Deep Learning Frameworks. 1-17 - Mohammad Shahadat Hossain

, Fatema-Tuj-Johora, Karl Andersson:
A Belief Rule Based Expert System to Assess Hypertension under Uncertainty. 18-38 - Ki-Chang Kim, Eunbyeol Ko, Jinsung Kim, Jeong Hyun Yi:

Intelligent Malware Detection Based on Hybrid Learning of API and ACG on Android. 39-48 - Zhe Tu, Huachun Zhou, Kun Li, Guanglei Li:

DCTG : Degree Constrained Topology Generation Algorithm for Software-defined Satellite Network. 49-58 - Jaewoong Kang, Jongmo Kim, Mye M. Sohn:

Supervised learning-based Lifetime Extension of Wireless Sensor Network Nodes. 59-67 - Hye Lim Jeong, Sung-Kyu Ahn, Sung Hoon Baek, Ki-Woong Park:

Anomaly Detection Technology Using Potential Difference Displacement Detection of Data Bus. 68-77

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














