


default search action
International Journal of Information Security and Privacy, Volume 11
Volume 11, Number 1, 2017
- Mohd Anwar, Peter Brusilovsky

:
Privacy and Territoriality Issues in an Online Social Learning Portal. 1-17 - Mohamed Amine Boudia

, Reda Mohamed Hamou
, Abdelmalek Amine
:
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees. 18-34 - Mukesh Kumar, Kamlesh Dutta:

Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN. 35-51 - Emmy Mugisha

, Gongxuan Zhang, Maouadj Zine El Abidine, Mutangana Eugene:
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes. 52-64
Volume 11, Number 2, 2017
- Prakash Mohan

, Saravanakumar Chelliah:
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password. 1-10 - Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi

, N. Ramasubramanian:
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation. 11-24 - Regner Sabillon

, Jordi Serra-Ruiz
, Victor Cavaller, Jeimy Cano
:
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies. 25-37 - Nandan Rao, Shubhra Srivastava, Sreekanth K. S.:

PKI Deployment Challenges and Recommendations for ICS Networks. 38-48 - Harshad Suryakant Wadkar, Arun Mishra

, Arati M. Dixit:
Framework to Secure Browser Using Configuration Analysis. 49-63
Volume 11, Number 3, 2017
- Sarvesh Tanwar

, Anil Kumar
:
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority. 1-14 - Anjali Kumawat, Anil Kumar Sharma, Sunita Kumawat:

Identification of Cryptographic Vulnerability and Malware Detection in Android. 15-28 - Deepti Vidyarthi

, S. P. Choudhary, Subrata Rakshit, C. R. Suthikshn Kumar
:
Malware Detection by Static Checking and Dynamic Analysis of Executables. 29-41 - Sunil Kumar Singh

, Prabhat Kumar, Jyoti Prakash Singh
:
Localization in Wireless Sensor Networks Using Soft Computing Approach. 42-53 - Daya Sagar Gupta

, G. P. Biswas:
A Secure Cloud Storage using ECC-Based Homomorphic Encryption. 54-62 - Saurabh Chamotra

, Rakesh Kumar Sehgal, Ram Swaroop Misra:
Honeypot Baselining for Zero Day Attack Detection. 63-74
Volume 11, Number 4, 2017
- Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.:

A Survey on Denial of Service Attacks and Preclusions. 1-15 - Monther Aldwairi

, Musaab Hasan
, Zayed Balbahaith:
Detection of Drive-by Download Attacks Using Machine Learning Approach. 16-28 - Manish Kumar, Abhinav Bhandari:

Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2. 29-46 - Chandan Kumar Behera

, D. Lalitha Bhaskari:
Malware Methodologies and Its Future: A Survey. 47-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














