default search action
Journal of Internet Services and Information Security, Volume 12
Volume 12, Number 1, February 2022
- Ilsun You:
2022 Letter from the Editor-in-Chief. 1 - Jianhua Yang, Lixin Wang, Suhev Shakya:
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions. 2-25 - Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. 26-43 - Ajung Im, Sandi Rahmadika, Yong-Hwan Lee, Bonam Kim, Ilsun You:
A Note on Enactment of Blockchain for HACCP-based Cooperative Model. 44-56 - Ozan Akin, Umut Can Gulmez, Ozan Sazak, Osman Ufuk Yagmur, Pelin Angin:
GreenSlice: An Energy-Efficient Secure Network Slicing Framework. 57-71 - Jongmo Kim, Kunyoung Kim, Gi-Yoon Jeon, Mye M. Sohn:
Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogeneous Networks. 72-82
Volume 12, Number 2, May 2022
- Minhye Seo:
Authentication for V2X Communication in an Open-Source Plug-and-Play Platform. 1-20 - Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragoni:
Emerging Cyber Security Challenges after COVID Pandemic: A Survey. 21-50 - Mumtahina Ahmed, Mohammad Shahadat Hossain, Raihan Ul Islam, Karl Andersson:
Explainable Text Classification Model for COVID-19 Fake News Detection. 51-69 - Pierre-Henri Thevenon, Sébastien Riou, Duc-Minh Tran, Maxime Puys, Nikolaos Foivos Polychronou, Mustapha El-Majihi, Camille Sivelle:
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems. 70-94 - Alexander N. Ndife, Yodthong Mensin, Wattanapong Rakwichian, Paisarn Muneesawang:
Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning. 95-114 - Ye Neung Kim, Seok Min Ko, TaeGuen Kim:
Hidden Markov Model based Anomaly Detection Method for In-vehicle Network. 115-125
Volume 12, Number 3, August 2022
- Md. Amiruzzaman, Mahnaz Rafia Islam, Md. Rajibul Islam, Rizal Mohd Nor:
Analysis of COVID-19: An infectious disease spread. 1-15 - Jose-Luis Cabra, Carlos Parra, Luis Trujillo:
Earprint touchscreen sensoring comparison between hand-crafted features and transfer learning for smartphone authentication. 16-29 - Mi Hyeon Jeon, Sang Uk Shin:
Blockchain-based fair and secure protocol for decentralized data trading. 30-48 - Jaewon Choi, Xiuping Zhang:
Classifications of restricted web streaming contents based on convolutional neural network and long short-term memory (CNN-LSTM). 49-62 - Anthony Cheuk Tung Lai, Ping Fan Ke, Kelvin Chan, Siu Ming Yiu, Dongsun Kim, Wai Kin Wong, Shuai Wang, Joseph Muppala, Alan Ho:
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks. 63-75 - Yousik Lee, Samuel Woo:
Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics. 76-86
Volume 12, Number 4, November 2022
- V. Hemasree, K. Sundeep Kumar:
Facial Skin Texture and Distributed Dynamic Kernel Support Vector Machine (DDKSVM) Classifier for Age Estimation in Facial Wrinkles. 84-101 - Nana Kwame Gyamfi, Nikolaj Goranin, Dainius Ceponis, Antanas Cenys:
Malware Detection Using Convolutional Neural Network, A Deep Learning Framework: Comparative Analysis. 102-115 - Saahira Ahamed, Ebtesam Shadadi, Latifah Alamer, Mousa Khubrani:
Deep Anomaly Net: Detecting Moving Object Abnormal Activity Using Tensor Flow. 116-125 - Margret Anouncia Savarimuthu, Renita Raymond:
Transformation Requirement Pattern for Capturing Data-Intensive Applications Requirements. 126-138 - Raúl A. Sánchez-Ancajima, Sarajane Marques Peres, Javier A. López-Céspedes, José L. Saly-Rosas-Solano, Ronald M. Hernández, Miguel A. Saavedra-López:
Gesture Phase Segmentation Dataset: An Extension for Development of Gesture Analysis Models. 139-155 - P. Vijayan, P. Anbalagan, Selvakumar S:
An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection. 156-163 - Musaddak M. Abdul Zahra, Laith A. Abdul-Rahaim:
Performance of RoF-MMW-WDM Backhaul System based on Hybrid Optical OFDM Transportation Enabling 128-QAM Format for B5G Communication Networks. 164-176 - A. Radhika, M. Syed Masood:
Crop Yield Prediction by Integrating Et-DP Dimensionality Reduction and ABP-XGBOOST Technique. 177-196 - Fata Nidaul Khasanah, Dhian Tyas Untari, David Nurmanto, Budi Satria, Tulus Sukreni, Timorora Sandha Perdhana:
Beta Testing Techniques in Non-Functional Testing of Gamified Learning Applications for Lecture Learning Media During the Covid-19 Pandemic. 197-203 - R. Suganthi, K. Prabha:
An Adaptive Density Peak Clustering with Swarm Intelligence Algorithm for Detection of Overlapping Communities in Social Networks. 204-223 - Manvitha Gali, Aditya Mahamkali:
A Distributed Deep Meta Learning based Task Offloading Framework for Smart City Internet of Things with Edge-Cloud Computing. 224-237 - Sherin Eliyas, P. Ranjana:
Gamification: Is E-next Learning's Big Thing. 238-245 - A. Sonya:
A Data Integrity and Security Approach for Health Care Data in Cloud Environment. 246-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.