![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Information Security Journal: A Global Perspective, Volume 34
Volume 34, Number 1, January 2025
- N. G. Nageswari Amma, T. Jayaraj, N. G. Bhuvaneswari Amma:
Towards improving the security of wireless networks using secured session keys. 1-14 - Martin Wilson, Sharon McDonald:
One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses. 15-49 - Yuki Nakamura, Tsukasa Fukuda, Xuanzhou Yang, Yoshiyasu Takefuji:
SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification. 50-62 - Heather Holden, Victor Munro, Lina Tsakiris, Alex Wilner:
"The pull to do nothing would be strong": limitations & opportunities in reporting insider threats. 63-78 - Mohamed Haddadi, Abdelhamid Khiat, Hadil Bouaoud, Hadjer Djehiche:
SPGDAD: Slow HTTP-Get denial of service attack detection using ontology. 79-87 - Deepali Bankatsingh Gothawal, S. V. Nagaraj:
Hybrid secure routing and monitoring mechanisms in IoT-based wireless sensor networks using Egret-Harris optimization. 88-113
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.