default search action
Information Security Journal: A Global Perspective, Volume 33
Volume 33, Number 1, January 2024
- Rajesh Bingu, S. Jothilakshmi, N. Srinivasu:
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment. 1-15 - Tulsi Pawan Fowdur, Shuaïb Hosenally:
A real-time machine learning application for browser extension security monitoring. 16-41 - Farid Javani, Alan T. Sherman:
BVOT: self-tallying boardroom voting with oblivious transfer. 42-53 - Nelson Russo, Leonilde Reis, Maria Clara Silveira, Henrique S. Mamede:
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. 54-72 - Savitha M. M, Basarkod P. I:
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms. 73-95
Volume 33, Number 2, March 2024
- Payal Sharma, B. R. Purushothama:
A lightweight group key management scheme with constant rekeying cost and public bulletin size. 97-120 - Joakim Kävrestad, Steven Furnell, Marcus Nohlberg:
User perception of Context-Based Micro-Training - a method for cybersecurity training. 121-137 - Thierry Mefenza, Damien Vergnaud:
Lattice attacks on pairing-based signatures. 138-157 - Salifu Yusif, Abdul Hafeez-Baig, Charles Anachanser:
Internet governance and cyber-security: a systematic literature review. 158-171 - Divya V. L., Job P. A., K. Preetha Mathew:
Secure query processing and optimization in cloud environment: a review. 172-191
Volume 33, Number 3, May 2024
- Asia Othman Aljahdali, Shoroq Banafee, Thana Aljohani:
URL filtering using machine learning algorithms. 193-203 - Benjamin F. Madnick, Keman Huang, Stuart E. Madnick:
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process. 204-225 - B. Rahul, K. Kuppusamy, A. Senthilrajan:
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm. 226-250 - Kazi Zakia Sultana, Vaibhav K. Anu, Tai-Yin Chong:
Using software metrics for predicting vulnerable classes in java and python based systems. 251-267 - Mojtaba Goodarzi, Ziba Eslami, Nasrollah Pakniat:
Certificateless directed signature scheme without bilinear pairing. 268-284 - Mikko Suorsa, Petri T. Helo:
Information security failures identified and measured - ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis. 285-306 - Alec Wells, Aminu Bello Usman:
Privacy and biometrics for smart healthcare systems: attacks, and techniques. 307-331 - Shubha Pankaj, Mohit Dua:
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis. 332-358
Volume 33, Number 4, July 2024
- Basil C. E. Oguguo, Christopher A. Ocheni:
Cybersecurity: a tool for curbing examination breaches and improvement of the quality of large-scale educational assessments. 359-373 - Govindasamy Chinnaraj, Arokiasamy Antonidoss:
Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology. 374-393 - Kudakwashe Maguraushe, Adéle da Veiga, Nico Martins:
A personal information privacy perceptions model for university students. 394-424 - Sambhrant Maurya, Anand Handa, Nitesh Kumar, Sandeep K. Shukla:
Adversarially robust and real-time DDoS detection and classification framework using AutoML. 425-442 - Leki Chom Thungon, Subhas Chandra Sahana, Md. Iftekhar Hussain:
"A lightweight authentication scheme for 6LoWPAN-based Internet-of -things". 443-453
Volume 33, Number 5, September 2024
- Ziaul Haque Choudhury:
Biometric passport security based on face recognition and biometric encryption using secure force algorithm into the HCC2D code. 455-472 - Rasheed Gbenga Jimoh, Joseph Bamidele Awotunde, Roseline Oluwaseun Ogundokun, Damilola Silas Adeoti:
A randomized encryption algorithm for the MPEG-DASH digital rights management. 473-485 - Maria Leitner, Florian Skopik, Timea Pahi:
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries. 486-507 - Mayssa Tayachi, Laurent Nana, Anca Pascu, Faouzi Benzarti:
A zero-watermarking approach for DICOM images authentication based on Jacobian model. 508-527 - Anwer Mbiriki, Chaker Katar, Ahmed Badreddine:
A new early warning system based on metaheuristics in CPS architecture. 528-545 - Shail Saharan, Vishal Gupta:
Prevention of DDoS attacks: a comprehensive review and future directions. 546-578 - Mila Malekolkalami, Leila Jabbari, Hassan Mantegh:
Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University. 579-592 - Ninmoy Debnath, Ankit Kumar Jain:
A comprehensive survey on mobile browser security issues, challenges and solutions. 593-612
Volume 33, Number 6, November 2024
- Asha Varma Songa, Ganesh Reddy Karri:
An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment. 613-625 - Garry L. White:
Security literacy model for strategic, tactical, & operational management levels. 626-634 - Mohamed Chawki:
An effective cloud computing model enhancing privacy in cloud computing. 635-658 - Wasim A. Ali, Michele Roccotelli, Gennaro Boggia, Maria Pia Fanti:
Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques. 659-677 - Florence U. Rashidi, Mustafa Habibu Mohsini, Bakari Mega:
A framework for security improvement on usage of mobile money application based on iris biometric authentication method. 678-690
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.