default search action
International Journal of Information Security and Privacy, Volume 14
Volume 14, Number 1, 2020
- Amanpreet Kaur, Padam Kumar, Govind P. Gupta:
Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors. 1-15 - Mamata Rath, Bibudhendu Pati, Binod Kumar Pattanayak:
Manifold Surveillance Issues in Wireless Network and the Secured Protocol. 16-26 - Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh, Gunjan Chhabra:
Comparison of Various DoS Algorithm. 27-43 - Neha Agarwal, Ajay Rana, Jai Prakash Pandey, Amit Agarwal:
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE. 44-66 - Partha Ghosh, Sumit Biswas, Shivam Shakti, Santanu Phadikar:
An Improved Intrusion Detection System to Preserve Security in Cloud Environment. 67-80
Volume 14, Number 2, 2020
- Khundrakpam Johnson Singh, Janggunlun Haokip, Usham Sanjota Chanu:
A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks. 1-19 - Rui Silva, Raul Barbosa, Jorge Bernardino:
Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice. 20-40 - Hania Gadouche, Farah Zoubeyr, Abdelkamel Tari:
A Valid and Correct-by-Construction Formal Specification of RBAC. 41-61 - Dhruti Sharma, Devesh C. Jinwala:
Aggregate Searchable Encryption With Result Privacy. 62-82 - Giridhar Maji, Sharmistha Mandal, Soumya Sen:
Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain. 83-101 - Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. 102-115 - Shelendra Kumar Jain, Nishtha Kesswani:
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment. 116-142
Volume 14, Number 3, 2020
- Geetika Sarna, Mahinder Pal Singh Bhatia:
Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network. 1-17 - Sharmila Subudhi, Suvasini Panigrahi:
Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning. 18-37 - Pranav Vyas, Bhushan Trivedi:
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application. 38-49 - Oussama Hannache, Mohamed Chaouki Batouche:
Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments. 50-71 - Pooja Parameshwarappa, Zhiyuan Chen, Akif Günes Koru:
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization. 72-94 - Ravi Kiran Varma Penmatsa, Akhila Kalidindi, S. Kumar Reddy Mallidi:
Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets. 95-114 - J. Rene Beulah, D. Shalini Punithavathani:
An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions. 115-133
Volume 14, Number 4, 2020
- Noureddine Aribi, Yahia Lebbah:
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols. 1-21 - S. Immaculate Shyla, S. S. Sujatha:
An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System. 22-41 - Mohamed Haddadi, Rachid Beghdad:
A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud. 42-56 - Charu Gupta, Rakesh Kumar Singh, Simran Kaur Bhatia, Amar Kumar Mohapatra:
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications. 57-73 - Andrew Besmer, Jason Watson, M. Shane Banks:
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews. 74-91 - Sheshadri Chatterjee:
Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. 92-112 - Mary Shamala L., G. Zayaraz, Vivekanandan K., V. Vijayalakshmi:
A Tweakable Key Alternating Lightweight Cipher for Internet of Things. 113-133
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.