


default search action
Information Security Journal: A Global Perspective, Volume 28
Volume 28, Numbers 1-2, 2019
- Shivi Garg
, Rakesh Kumar Singh, Amar Kumar Mohapatra:
Analysis of software vulnerability classification based on different technical parameters. 1-19 - Lanfranco Lopriore:
Key management in wireless sensor networks. 20-34 - Milap J. Bhuva, Sanjay Singh
:
Symmetric key-based authenticated encryption protocol. 35-45 - Mikhail Styugin
:
Protection from reconnaissance for establishing information security systems. 46-54
Volume 28, Number 3, 2019
- Akhyari Nasir, Ruzaini Abdullah Arshah
, Mohd Rashid Ab Hamid
:
A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions. 55-80 - Filippos Giannakas
, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis
:
A comprehensive cybersecurity learning platform for elementary education. 81-106
Volume 28, Numbers 4-5, 2019
- Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi
:
Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. 107-119 - Karima Djebaili, Lamine Melkemi:
Two dimensional ElGamal public key cryptosystem. 120-126 - Rita Ismailova
, Gulshat Muhametjanova
, Tunç Durmus Medeni, Ihsan Tolga Medeni
, Demet Soylu, Omar Azimbek Dossymbekuly:
Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan. 127-135 - Paul Joseph
, Jasmine Norman:
Forensic corpus data reduction techniques for faster analysis by eliminating tedious files. 136-147
Volume 28, Number 6, 2019
- N. B. Gayathri
, Thumbur Gowri, Punugu Vasudeva Reddy
:
Secure and efficient certificateless aggregate signature scheme from bilinear pairings. 149-163 - Ashutosh Bahuguna, Raj Kishor Bisht
, Jeetendra Pande
:
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context. 164-177 - Hossain Shahriar
, Chi Zhang, Stephen Dunn, Robert Bronte, Atef Sahlan, Khaled Tarmissi:
Mobile anti-phishing: Approaches and challenges. 178-193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.