default search action
Information Security Journal: A Global Perspective, Volume 31
Volume 31, Number 1, January 2022
- Yassine Sadqi, Yassine Maleh:
A systematic review and taxonomy of web applications threats. 1-27 - Shefali Arora, M. P. S. Bhatia:
Challenges and opportunities in biometric security: A survey. 28-48 - Umar Hussain Mir, Deep Singh, Parveiz Nazir Lone:
Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain. 49-63 - Mathias Reveraert, Tom Sauer:
A four-part typology to assess organizational and individual security awareness. 64-82 - Ajish S, K. S. Anil Kumar:
Secure I-voting system using QR code and biometric authentication. 83-104 - Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Charles Onuwa Uwadia:
Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep). 105-124
Volume 31, Number 2, March 2022
- Manal Mohamed Alhejazi, Rami Mustafa A. Mohammad:
Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA). 125-143 - Prabhat Kumar Panda, Sudipta Chattopadhyay:
An enhanced mutual authentication and security protocol for IoT and cloud server. 144-156 - Febina Ikbal, R. Gopikakumari:
Performance analysis of SMRT-based color image watermarking in different color spaces. 157-167 - Mohammad Pishdar, Younes Seifi, Mohammad Nasiri, Mozafar Bag-Mohammadi:
PCC-RPL: An efficient trust-based security extension for RPL. 168-178 - Kabelo Given Chuma, Mpho Ngoepe:
Security of electronic personal health information in a public hospital in South Africa. 179-195 - Mukesh Dalal, Mamta Juneja:
A secure video steganography scheme using DWT based on object tracking. 196-213 - S. Srisakthi, Gufran Ahmad Ansari:
PCSP: A Protected Cloud Storage Provider employing light weight techniques. 214-225 - Rajesh Kumar Shrivastava, Varun Natu, Chittaranjan Hota:
Code integrity verification using cache memory monitoring. 226-236 - Farah Deeba, Fayaz Ali Dharejo, Yuanchun Zhou, Parvez Ahmed Memon, Hira Memon, Saeed Ahmed Khan, Nauman Ali Larik:
Digital image watermarking in sparse domain. 237-250 - Correction. 251
Volume 31, Number 3, May 2022
- Melva M. Ratchford, Omar F. El-Gayar, Cherie Noteboom, Yong Wang:
BYOD security issues: a systematic literature review. 253-273 - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
EACS: Expressible Access Control Scheme for Secure Services and Data Delegation in Collaborative E-health System. 274-288 - Neeru Bala, Rashmi Gupta, Anil Kumar:
Multimodal biometric system based on fusion techniques: a review. 289-337 - Alexander Gregory Stone:
The role risk-management plays in reducing insider threat's in the federal Government. 338-345 - In Lee:
An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. 346-358 - Lanfranco Lopriore:
Cryptographic pointers for fine-grained file access security. 359-375
Volume 31, Number 4, July 2022
- Akanksha Bisoyi:
Ownership, liability, patentability, and creativity issues in artificial intelligence. 377-386 - Sunday Oyinlola Ogundoyin:
A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system. 387-410 - Santosh Kumar Birthriya, Ankit Kumar Jain:
A Comprehensive Survey of Phishing Email Detection and Protection Techniques. 411-440 - Xuan Dau Hoang, Xuan-Hanh Vu:
An improved model for detecting DGA botnets using random forest algorithm. 441-450 - Yogesh M. Gajmal, R. Udayakumar:
Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System. 451-465 - Vaibhav K. Anu:
Information security governance metrics: a survey and taxonomy. 466-478 - Reshma Sonar, Gandharba Swain:
A hybrid steganography technique based on RR, AQVD, and QVC. 479-498
Volume 31, Number 5, September 2022
- Md. Nazmul Hossain, Taposh Das, Tariqul Islam, Md. Alam Hossain:
Cyber security risk assessment method for SCADA system. 499-510 - Ossama Al-Maliki, Hisham Al-Assam:
A tokenization technique for improving the security of EMV contactless cards. 511-526 - Manasi Jana, Biswapati Jana:
A new DCT based robust image watermarking scheme using cellular automata. 527-543 - Yee Jian Chew, Nicholas Lee, Shih Yin Ooi, Kok-Seng Wong, Ying-Han Pang:
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. 544-565 - Chintan Patel:
IoT privacy preservation using blockchain. 566-581 - B. Venkateswarlu, V. Viswanath Shenoi:
Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection. 582-601 - Sunitha Prabhu, Nik Thompson:
A primer on insider threats in cybersecurity. 602-611 - Payal Chaudhari, Manik Lal Das:
PAC: Privacy preserving proxy re-encryption for access control in public cloud. 612-627
Volume 31, Number 6, November 2022
- Chintan Patel, Nishant Doshi:
LDA-IoT : a level dependent authentication for IoT paradigm. 629-656 - Md. Siddiqur Rahman Tanveer, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
A multi-stage chaotic encryption technique for medical image. 657-675 - Sarvesh Tanwar, Anil Kumar:
Secure key issuing scheme in ID-based cryptography with revocable ID. 676-685 - G. Umarani Srikanth, Lijetha. C. Jaffrin:
Security Issues in Cloud and Mobile cloud: A Comprehensive Survey. 686-710 - Teodor Sommestad, Hannes Holm, Daniel Steinvall:
Variables influencing the effectiveness of signature-based network intrusion detection systems. 711-728
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.