default search action
International Journal of Information Privacy, Security and Integrity, Volume 2
Volume 2, Number 1, 2014
- Justin Zhan, Xing Fang:
A computational framework for detecting malicious actors in communities. 1-20 - Munene W. Kanampiu:
Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community. 21-36 - Denise Ferebee, Dipankar Dasgupta, Qishi Wu:
Information assurance: a cyber security storm map. 37-55 - Pietro Colombo, Elena Ferrari:
A framework for privacy aware data management in relational databases. 56-78
Volume 2, Number 2, 2015
- Sunil Kumar, Kamlesh Dutta:
Intrusion detection technique for black hole attack in mobile ad hoc networks. 81-101 - Mohammad Badiul Islam, Renato Iannella, Jason Watson, Shlomo Geva:
Privacy architectures in social networks' state-of-the-art survey. 102-137 - P. Shanthi, S. R. Balasundaram:
A graph-based cloak algorithm to preserve location privacy in location-based services. 138-158 - Pallavi Vijay Chavan, Mohammad Atique:
Secured approach for authentication using threshold-based hierarchical visual cryptography. 159-175
Volume 2, Number 3, 2016
- Ha-Thanh Le, Peter Loh, Chiew Tong Lau:
Performance evaluation of cyber reconnaissance tools. 177-196 - Jonathan Pan:
Data farming for cyber security: an agent-based modelling approach. 197-215 - Divya Chaudhary, Shailender Gupta, Manju Kumari:
A novel hybrid security mechanism for data communication networks. 216-231 - Zouheir Trabelsi, Mohammad M. Masud:
An extended identity-based cryptography protocol based on biometric. 232-256
Volume 2, Number 4, 2016
- Loganathan Agilandeeswari, Ganesan Kaliyaperumal:
False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm. 257-280 - Kailas Patil:
Request dependency integrity: validating web requests using dependencies in the browser environment. 281-306 - Aftab Ahmad, Preeti Misra, Frank Ono, Cody Priest, Jessica Suarez, Alexander Urcioli:
The information privacy domain. 307-329 - Mohit Dayal, Bharti Nagpal:
A compendious investigation of Android malware family. 330-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.