default search action
Information Security Journal: A Global Perspective, Volume 32
Volume 32, Number 1, January 2023
- Deepali Bankatsingh Gothawal, S. V. Nagaraj:
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model. 1-20 - Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal, Lina Ben-Abdelatif, Maroua Ouaked:
Implementing a secure remote patient monitoring system. 21-38 - Faozi A. Almaqtari, Najib H. S. Farhan, Ali T. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim:
The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan. 39-57
Volume 32, Number 2, March 2023
- A. Hadj Brahim, Adda Ali-Pacha, Naima Hadj-Said:
A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. 59-75 - Dhruti Sharma:
Searchable encryption : A survey. 76-119 - Elmarie Kritzinger, Adéle da Veiga, Wynand van Staden:
Measuring organizational information security awareness in South Africa. 120-133 - Lampis Alevizos, Eliana Stavrou:
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). 134-161
Volume 32, Number 3, May 2023
- Samaneh Mashhadi:
Game-based security proofs for verifiable secret sharing schemes in the standard model. 163-172 - Bilal Akhtar, Ammar Masood:
Security analysis and enhancements of UAS architecture. 173-186 - M. Naim, A. Ali Pacha:
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. 187-211 - Naib Rabiaa, Ali Cherif Moussa, Sofiane Boukli Hacene:
A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks. 212-226
Volume 32, Number 4, July 2023
- Barnali Gupta Banik, Abhinandan Banik:
Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video. 227-251 - Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas:
A systematic review of detection and prevention techniques of SQL injection attacks. 252-265 - Ourania Koutzampasopoulou Xanthidou, Dimitrios Xanthidis, Christos Manolas, Han-I Wang:
Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman. 266-282 - Reza Hooshmand, Alireza Jafari, Gholamreza Karamali:
Id-PC: An Identification Scheme based on Polar Codes. 283-296 - Paul A. Wortman, John A. Chandy:
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk. 297-313
Volume 32, Number 5, September 2023
- Kante Ramesh, Mohanasundram R:
Analysis of web data classification methods based on semantic similarity measure. 315-330 - Sunita Usturge, T. Pavan Kumar:
DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot. 331-346 - Sabina Barakovic, Jasmina Barakovic Husic:
Cyber hygiene knowledge, awareness, and behavioral practices of university students. 347-370 - Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou:
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack. 371-382 - Nayana Hegde, Sunilkumar S. Manvi, Harjinder Singh Lallie:
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor. 383-400
Volume 32, Number 6, November 2023
- Lovi Dhamija, Urvashi Garg:
An adaptive randomized and secured approach against adversarial attacks. 401-416 - Ramadan Dervishi, Vehbi Neziri, Blerim Rexha:
Transactions privacy on blockchain using web of trust concept. 417-429 - Puvvada Nagesh, N. Srinivasu:
Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment. 430-443 - Suruchi Karnani, Harish Kumar Shakya:
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy. 444-468 - Dan Bouhnik, Achia Admoni:
"We had no homefront": another piece of the U.S part in the information warfare story. 469-480 - Mohammed Safy Elwan, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan:
Intelligent security sanitizing gate. 481-493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.