default search action
Information Security Journal: A Global Perspective, Volume 30
Volume 30, Number 1, 2021
- Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Rasim Sh. Mahmudov, Ramiz M. Aliguliyev:
Information security as a national security component. 1-18 - Wenchao Cui, Qiong Lu, Asif Moin Qureshi, Wei Li, Kehe Wu:
An adaptive LeNet-5 model for anomaly detection. 19-29
- Richard Charles Hornberger:
Creating a sense of digital privacy in the private sector. 30-56
- Ibrahim F. Elashry:
Cryptanalysis of Jain-Singh's identity-based RSA encryption. 57-61
Volume 30, Number 2, 2021
- Sachin Dhawan, Rashmi Gupta:
Analysis of various data security techniques of steganography: A survey. 63-87
- Yegin Genc, Harpreet Kour, Hasan T. Arslan, Li-Chiou Chen:
Understanding Nigerian e-mail scams: A computational content analysis approach. 88-99 - Christian Graham:
Fear of the unknown with healthcare IoT devices: An exploratory study. 100-110 - Jennifer Batamuliza, Damien Hanyurwimfura:
Identity based encryption with equality test. 111-124
Volume 30, Number 3, 2021
- Taban Habibu, Edith Talina Luhanga, Anael Elikana Sam:
A study of users' compliance and satisfied utilization of biometric application system. 125-138 - Martti Lehto, Jarno Limnéll:
Strategic leadership in cyber security, case Finland. 139-148 - Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah:
Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization. 149-159 - Siva Reddy Sonti, Mutchakayala Siva Ganga Prasad:
Improved Whale Optimization Algorithm and Convolutional neural network based Cooperative Spectrum Sensing in Cognitive Radio Networks. 160-172 - Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. 173-187
Volume 30, Number 4, 2021
- Osamah M. Al-Matari, Iman M. A. Helal, Sherif A. Mazen, Sherif Elhennawy:
Integrated framework for cybersecurity auditing. 189-204 - Tianyu Wang, Li-Chiou Chen, Yegin Genc:
A dictionary-based method for detecting machine-generated domains. 205-218 - Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:
Fast secure matrix multiplications over ring-based homomorphic encryption. 219-234 - Ibrahim Ali Alnajjar, Massudi Mahmuddin:
Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment. 235-256
Volume 30, Number 5, 2021
- Hiten Choudhury, Bidisha Goswami, Sameer Kumar Gurung:
CovidChain: An Anonymity Preserving Blockchain Based Framework for Protection Against Covid-19. 257-280 - Malika Bendechache, Pintu Lohar, Guodong Xie, Rob Brennan, Ramona Trestian, Edoardo Celeste, Kristina Kapanova, Evgeniia Jayasekera, Irina Tal:
Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study. 281-293 - Erik B. Korn, Douglas M. Fletcher, Erica M. Mitchell, Aryn A. Pyke, Steven M. Whitham:
Jack pandemus - Cyber incident and emergency response during a pandemic. 294-307
Volume 30, Number 6, 2021
- Shani Raj, B. Arun Kumar, G. K. D. Prasanna Venkatesan:
A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system. 309-324 - Sreeparna Chakrabarti, G. N. K. Suresh Babu:
The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model. 325-341 - Ziaul Haque Choudhury, M. Munir Ahamed Rabbani:
Facial blemishes detection and encryption with secure force algorithm into HCC2D code for biometric-passport. 342-358 - Md. Rashedul Islam, T. R. Tanni, S. Parvin, M. J. Sultana, Ayasha Siddiqa:
A modified LSB image steganography method using filtering algorithm and stream of password. 359-370 - Suhad Muhajer Kareem, Abdul Monem S. Rahma:
New method for improving add round key in the advanced encryption standard algorithm. 371-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.