


default search action
International Journal of Information Security and Privacy, Volume 16
Volume 16, Number 1, 2022
- Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. 1-22 - Abdallah Soualmi
, Adel Alti
, Lamri Laouamer:
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection. 1-18 - M. D. J. S. Goonetillake, Rangana Jayashanka
, S. V. Rathnayaka:
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics. 1-26 - Anderson Aparecido Alves da Silva
, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas
, Marcelo Teixeira de Azevedo
, Sergio Takeo Kofuji
:
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments. 1-16 - Sergey Sakulin
, Alexander Alfimtsev
, Konstantin Kvitchenko, Leonid Dobkacz
, Yuri Kalgin
, Igor I. Lychkov:
Network Anomalies Detection Approach Based on Weighted Voting. 1-17 - Danish Ahamad, Md. Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom:
Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication. 1-20 - Erukala Suresh Babu
, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao
:
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network. 1-24 - Mpho Ngoepe
, Mfanasibili Ngwenya
:
Personal Data and the Assemblage Security in Consumer Internet of Things. 1-20 - Moez Farokhnia Hamedani, Ali Dehghan:
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms. 1-16 - Liangshun Wu, Hengjin Cai, Han Li:
Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX. 1-20 - Faheem Syeed Masoodi, Iram Abrar, Alwi M. Bamhdi
:
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques. 1-18 - Ankit Rajeshkumar Kharwar, Devendra V. Thakor
:
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm. 1-21 - Bahubali Akiwate
, Latha Parthiban
:
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences. 1-18 - Boubakeur Annane, Adel Alti
:
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile. 1-38 - Kapil Kant Kamal
, Monit Kapoor
, Padmaja Joshi
:
Secure and Flexible Key Protected Identity Framework for Mobile Devices. 1-17 - Adnan Gutub
:
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication. 1-18 - Faruk Arslan
, Kallol Kumar Bagchi
, Godwin J. Udo:
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context. 1-26 - Ping Zhao, Zhijie Fan, Zhiwei Cao, Xin Li:
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism. 1-20 - R. Balakrishnan Unny
, Nityesh Bhatt
:
A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems. 1-22 - Romil Rawat
, Vinod Kumar Mahor, Bhagwati Garg, Shrikant Telang
, Kiran Pachlasiya
, Anil Kumar
, Surendra Kumar Shukla
, Megha Kuliha:
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities. 1-14 - Sanjay Adiwal
, Balaji Rajendran
, Pushparaj Shetty D
:
A Quantitative Method for Measuring Health of Authoritative Name Servers. 1-19 - Rohit Sinha
, Rittika Sur, Ruchi Sharma
, Avinash K. Shrivastava
:
Anomaly Detection Using System Logs: A Deep Learning Approach. 1-15 - Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane:
A Proposal Phishing Attack Detection System on Twitter. 1-27 - Pankaj Pankaj, Bharti P. K, Brajesh Kumar:
A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture. 1-25 - Kakali Chatterjee:
A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation. 1-24 - R. E. Vinodhini, P. Malathi:
Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security. 1-20 - Na Hua, Juyan Li, Kejia Zhang, Long Zhang
:
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices. 1-17 - Mohammed Tayebi
, Said El Kafhali
:
Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution. 1-21 - Nitin O. Mathur
, Chengcheng Li, Bilal Gonen, Kijung Lee:
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection. 1-32 - Divyashikha Sethia, Raj Sahu
:
Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation. 1-19 - Chandra Sekhar Kolli
, Uma Devi Tatavarthi
:
Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank. 1-20 - Bharath M. R., K. A. Radhakrishna Rao:
Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification. 1-44 - Boris Jerson Zannou, Tahirou Djara
, Antoine Vianou:
Cylindrical Curve for Contactless Fingerprint Template Securisation. 1-28 - Guoyan Li
, Yihui Shang, Yi Liu, Xiangru Zhou:
A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking. 1-17 - Adnan Gutub
:
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility. 1-28 - Mohammad H. Alshayeji
, Mousa AlSulaimi, Sa'ed Abed
, Reem Jaffal:
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine. 1-18 - H. L. Gururaj, Prithwijit Mitra, Soumyadip Koner, Sauvik Bal
, Francesco Flammini
, Janhavi V., Ravi Kumar V.
:
Prediction of Phishing Websites Using AI Techniques. 1-14 - Garry L. White:
Infrastructure Cyber-Attack Awareness Training: Effective or Not? 1-26 - Ankush Balaram Pawar, Shashikant U. Ghumbre
, Rashmi M. Jogdand:
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols. 1-24 - Xin Liu
, Bin Zhang:
An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud. 1-24 - Dipali K. Shende, Yogesh Angal, S. C. Patil:
An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT. 1-24 - Monica Malik
, Khushi Gandhi
, Bhawna Narwal:
AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks. 1-31 - Amine Sallah
, El Arbi Abdellaoui Alaoui, Said Agoujil, Anand Nayyar
:
Machine Learning Interpretability to Detect Fake Accounts in Instagram. 1-25 - Sachikanta Dash
, Sasmita Padhy
, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro
:
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. 1-24 - Erkan Çetintas, Ikram Dastan:
Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA. 1-19 - Ritinder Kaur
, Neha Gupta
:
CFS-MHA: A Two-Stage Network Intrusion Detection Framework. 1-27 - Yonglei Liu
, Kun Hao, Weilong Zhang, Lin Gao
, Li Wang:
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes. 1-14 - Karim Ouazzane, Thekla Polykarpou, Yogesh Patel, Jun Li:
An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach. 1-17 - Chaudhari D. A., Dipalee A. Chaudhari, Umamaheswari E., E. Umamaheswari:
Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications. 1-17 - Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy
, Andrey Koucheryavy:
Fractals for Internet of Things Network Structure Planning. 1-12 - El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai
, Anand Nayyar
:
Using Machine Learning in WSNs for Performance Prediction MAC Layer. 1-18 - Prathiba Ashok, Suyash Vardhan Srivathshav, E. Ramkumar, P. Rajkamal, V. S. Kanchana Bhaaskaran
:
Lightweight VLSI Architectures for Image Encryption Applications. 1-23 - R. Lalduhsaka
, Nilutpol Bora, Ajoy Kumar Khan:
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach. 1-15 - Abhaya Kumar Sahoo, Srishti Raj
, Chittaranjan Pradhan
, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik
, Ankit Vidyarthi:
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System. 1-20 - Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty:
Deep Ensemble Model for Detecting Attacks in Industrial IoT. 1-29 - Rajamandrapu Srinivas, N. Mayur:
Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System. 1-21 - Sahana Lokesh R.
, H. R. Ranganatha:
An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization. 1-20 - Mini Zeng, Feng Zhu, Sandra Carpenter:
Dynamic Warnings: An Eye Gaze-Based Approach. 1-28 - Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz:
Real-Time Cyber Analytics Data Collection Framework. 1-10 - Srijita Basu, Sandip Karmakar, Debasish Bera:
Securing Cloud Virtual Machine Image Using Ethereum Blockchain. 1-22 - Faiza Benmenzer, Rachid Beghdad:
Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments. 1-20 - Meenu Jain, Manisha Jailia
:
Blockchain-Based Data Sharing Approach Considering Educational Data. 1-20 - Hicham Grari
, Khalid Zine-Dine
, Ahmed Azouaoui
, Siham Lamzabi:
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher. 1-16
Volume 16, Number 2, 2022
- Tirupathaiah Kanaparthi
, S. Ramesh
, Ravi Sekhar Yarrabothu:
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks. 1-18 - Hong Wei, Zhiyong Li:
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference. 1-18 - Jintao Chen, Binruo Zhu, Fang Zhao, Ruili Huang:
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking. 1-20 - Bin Fang:
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities. 1-20 - Anjana S. Chandran:
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology. 1-18 - Leelalakshmi S., K. Rameshkumar
:
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN. 1-22 - Chakka S. V. V. S. N. Murty
, G. P. Saradhi Varma, A. S. N. Chakravarthy:
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model. 1-19 - Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam:
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption. 1-15 - Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li:
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence. 1-19 - Santhoshkumar K., Suganthi P.:
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set. 1-17 - Abhijit Biswas, Dushyanta Dutta:
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol. 1-18 - Kimmi Kumari, Mrunalini Marlakunta:
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data. 1-13 - Kusuma S. M., Veena K. N., B. V. Varun:
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN. 1-16 - Kalluri Rama Krishna, C. V. Guru Rao
:
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments. 1-15 - (Withdrawn) Balanced Scheduling Method of Network Information Resources for Cloud Storage. 1-17

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.