default search action
International Journal of Information Security and Privacy, Volume 15
Volume 15, Number 1, 2021
- Peng Li, Chao Xu, He Xu:
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks. 1-23 - Dung Hoang Le, Nguyen Thanh Vu, Tuan Dinh Le:
A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network. 1-25 - Sikha Bagui, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui:
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm. 26-43 - Hatem Mahmoud Salama, Mohammed Z. Abd El-Mageed, Gouda Ismail Mohamed Salama, Khaled Mahmoud Badran:
CSMCSM: Client-Server Model for Comprehensive Security in MANETs. 44-64 - Mhamed Zineddine:
IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms. 65-98 - Sarra Namane, Nassira Ghoualmi, Mustafa Kaiiali:
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making. 99-116 - Salome James, Thumbur Gowri, Punugu Vasudeva Reddy:
Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery. 117-137 - Mohamed Abdou Souidi, Noria Taghezout:
Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System. 138-152 - Preetish Ranjan, Abhishek Vaish:
Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks. 153-172 - Rawan Baalous, Ronald Poet:
Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies. 173-189
Volume 15, Number 2, 2021
- Manisha Duevedi, Sunil Kumar Muttoo:
An Improved Separable and Reversible Steganography in Encrypted Grayscale Images. 1-28 - Shweta Kaushik, Charu Gandhi:
Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud. 29-52 - Abhishek Bansal, Vinay Kumar:
Steganography Technique Inspired by Rook. 53-67 - Sowmyarani C. N., Veena Gadad, Dayananda P.:
(p+, α, t)-Anonymity Technique Against Privacy Attacks. 68-86 - Randhir Kumar, Rakesh Tripathi:
Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain. 87-112 - V. Sandeep, Saravanan Kondappan, A. Amir Anton Jone, S. Raj Barath:
Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO). 113-130 - Redha Taguelmimt, Rachid Beghdad:
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors. 131-144 - Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine:
Detecting DDoS Attacks in IoT Environment. 145-180 - Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi:
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications. 181-195 - Suhas Bhagate, Prakash Jayanth Kulkarni:
Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization. 196-216
Volume 15, Number 3, 2021
- Hongsong Chen, Caixia Meng, Jingjiu Chen:
DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment. 1-18 - Priti Jagwani, Saroj Kaushik:
Entropy-Based Quantification of Privacy Attained Through User Profile Similarity. 19-32 - Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi:
A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies. 33-47 - Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh:
A New Combinational Technique in Image Steganography. 48-64 - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks. 65-82 - Vartika Puri, Parmeet Kaur, Shelly Sachdeva:
ADT: Anonymization of Diverse Transactional Data. 83-105 - N. Muraleedharan, B. Janet:
SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data. 106-128
Volume 15, Number 4, 2021
- Anshuman Patel, Devesh Jinwala:
A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things. 1-17 - Om Prakash Samantray, Satya Narayan Tripathy:
An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms. 18-30 - Andrew Mangle, Sandip C. Patel, Sanjay Bapna, Xingxing Zu, David Gurzick:
A Model to Improve Security Questions Through Individualized Assistance. 31-53 - Shuru Liu, Zhanlei Shang, Junwei Lei:
Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals. 54-78 - Ahmed Elmorshidy:
M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office - An Empirical Study. 79-97 - Priya C. V., K. S. Angel Viji:
Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm. 98-117 - Sadiq A. Mehdi:
Image Encryption Algorithm Based on a Novel 4D Chaotic System. 118-131
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.