default search action
International Journal of Information Security and Privacy, Volume 11
Volume 11, Number 1, 2017
- Mohd Anwar, Peter Brusilovsky:
Privacy and Territoriality Issues in an Online Social Learning Portal. 1-17 - Mohamed Amine Boudia, Reda Mohamed Hamou, Abdelmalek Amine:
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees. 18-34 - Mukesh Kumar, Kamlesh Dutta:
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN. 35-51 - Emmy Mugisha, Gongxuan Zhang, Maouadj Zine El Abidine, Mutangana Eugene:
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes. 52-64
Volume 11, Number 2, 2017
- Prakash Mohan, Saravanakumar Chelliah:
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password. 1-10 - Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi, N. Ramasubramanian:
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation. 11-24 - Regner Sabillon, Jordi Serra-Ruiz, Victor Cavaller, Jeimy Cano:
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies. 25-37 - Nandan Rao, Shubhra Srivastava, Sreekanth K. S.:
PKI Deployment Challenges and Recommendations for ICS Networks. 38-48 - Harshad Suryakant Wadkar, Arun Mishra, Arati M. Dixit:
Framework to Secure Browser Using Configuration Analysis. 49-63
Volume 11, Number 3, 2017
- Sarvesh Tanwar, Anil Kumar:
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority. 1-14 - Anjali Kumawat, Anil Kumar Sharma, Sunita Kumawat:
Identification of Cryptographic Vulnerability and Malware Detection in Android. 15-28 - Deepti Vidyarthi, S. P. Choudhary, Subrata Rakshit, C. R. Suthikshn Kumar:
Malware Detection by Static Checking and Dynamic Analysis of Executables. 29-41 - Sunil Kumar Singh, Prabhat Kumar, Jyoti Prakash Singh:
Localization in Wireless Sensor Networks Using Soft Computing Approach. 42-53 - Daya Sagar Gupta, G. P. Biswas:
A Secure Cloud Storage using ECC-Based Homomorphic Encryption. 54-62 - Saurabh Chamotra, Rakesh Kumar Sehgal, Ram Swaroop Misra:
Honeypot Baselining for Zero Day Attack Detection. 63-74
Volume 11, Number 4, 2017
- Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.:
A Survey on Denial of Service Attacks and Preclusions. 1-15 - Monther Aldwairi, Musaab Hasan, Zayed Balbahaith:
Detection of Drive-by Download Attacks Using Machine Learning Approach. 16-28 - Manish Kumar, Abhinav Bhandari:
Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2. 29-46 - Chandan Kumar Behera, D. Lalitha Bhaskari:
Malware Methodologies and Its Future: A Survey. 47-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.