default search action
International Journal of Information Security and Privacy, Volume 16
Volume 16, Number 1, 2022
- Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang:
Privacy Disclosure in the Real World: An Experimental Study. 1-22 - Abdallah Soualmi, Adel Alti, Lamri Laouamer:
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection. 1-18 - M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka:
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics. 1-26 - Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo, Sergio Takeo Kofuji:
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments. 1-16 - Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor I. Lychkov:
Network Anomalies Detection Approach Based on Weighted Voting. 1-17 - Danish Ahamad, Md. Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom:
Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication. 1-20 - Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao:
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network. 1-24 - Mpho Ngoepe, Mfanasibili Ngwenya:
Personal Data and the Assemblage Security in Consumer Internet of Things. 1-20 - Moez Farokhnia Hamedani, Ali Dehghan:
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms. 1-16 - Liangshun Wu, Hengjin Cai, Han Li:
Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX. 1-20 - Faheem Syeed Masoodi, Iram Abrar, Alwi M. Bamhdi:
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques. 1-18 - Ankit Rajeshkumar Kharwar, Devendra V. Thakor:
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm. 1-21 - Bahubali Akiwate, Latha Parthiban:
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences. 1-18 - Boubakeur Annane, Adel Alti:
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile. 1-38 - Kapil Kant Kamal, Monit Kapoor, Padmaja Joshi:
Secure and Flexible Key Protected Identity Framework for Mobile Devices. 1-17 - Adnan Gutub:
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication. 1-18 - Faruk Arslan, Kallol Kumar Bagchi, Godwin J. Udo:
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context. 1-26 - Ping Zhao, Zhijie Fan, Zhiwei Cao, Xin Li:
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism. 1-20 - R. Balakrishnan Unny, Nityesh Bhatt:
A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems. 1-22 - Romil Rawat, Vinod Kumar Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla, Megha Kuliha:
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities. 1-14 - Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D:
A Quantitative Method for Measuring Health of Authoritative Name Servers. 1-19 - Rohit Sinha, Rittika Sur, Ruchi Sharma, Avinash K. Shrivastava:
Anomaly Detection Using System Logs: A Deep Learning Approach. 1-15 - Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane:
A Proposal Phishing Attack Detection System on Twitter. 1-27 - Pankaj Pankaj, Bharti P. K, Brajesh Kumar:
A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture. 1-25 - Kakali Chatterjee:
A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation. 1-24 - R. E. Vinodhini, P. Malathi:
Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security. 1-20 - Na Hua, Juyan Li, Kejia Zhang, Long Zhang:
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices. 1-17 - Mohammed Tayebi, Said El Kafhali:
Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution. 1-21 - Nitin O. Mathur, Chengcheng Li, Bilal Gonen, Kijung Lee:
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection. 1-32 - Divyashikha Sethia, Raj Sahu:
Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation. 1-19 - Chandra Sekhar Kolli, Uma Devi Tatavarthi:
Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank. 1-20 - Bharath M. R., K. A. Radhakrishna Rao:
Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification. 1-44 - Boris Jerson Zannou, Tahirou Djara, Antoine Vianou:
Cylindrical Curve for Contactless Fingerprint Template Securisation. 1-28 - Guoyan Li, Yihui Shang, Yi Liu, Xiangru Zhou:
A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking. 1-17 - Adnan Gutub:
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility. 1-28 - Mohammad H. Alshayeji, Mousa AlSulaimi, Sa'ed Abed, Reem Jaffal:
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine. 1-18 - H. L. Gururaj, Prithwijit Mitra, Soumyadip Koner, Sauvik Bal, Francesco Flammini, Janhavi V., Ravi Kumar V.:
Prediction of Phishing Websites Using AI Techniques. 1-14 - Garry L. White:
Infrastructure Cyber-Attack Awareness Training: Effective or Not? 1-26 - Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand:
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols. 1-24 - Xin Liu, Bin Zhang:
An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud. 1-24 - Dipali K. Shende, Yogesh Angal, S. C. Patil:
An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT. 1-24 - Monica Malik, Khushi Gandhi, Bhawna Narwal:
AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks. 1-31 - Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Anand Nayyar:
Machine Learning Interpretability to Detect Fake Accounts in Instagram. 1-25 - Sachikanta Dash, Sasmita Padhy, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro:
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques. 1-24 - Erkan Çetintas, Ikram Dastan:
Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA. 1-19 - Ritinder Kaur, Neha Gupta:
CFS-MHA: A Two-Stage Network Intrusion Detection Framework. 1-27 - Yonglei Liu, Kun Hao, Weilong Zhang, Lin Gao, Li Wang:
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes. 1-14 - Karim Ouazzane, Thekla Polykarpou, Yogesh Patel, Jun Li:
An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach. 1-17 - Chaudhari D. A., Dipalee A. Chaudhari, Umamaheswari E., E. Umamaheswari:
Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications. 1-17 - Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy:
Fractals for Internet of Things Network Structure Planning. 1-12 - El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai, Anand Nayyar:
Using Machine Learning in WSNs for Performance Prediction MAC Layer. 1-18 - Prathiba Ashok, Suyash Vardhan Srivathshav, E. Ramkumar, P. Rajkamal, V. S. Kanchana Bhaaskaran:
Lightweight VLSI Architectures for Image Encryption Applications. 1-23 - R. Lalduhsaka, Nilutpol Bora, Ajoy Kumar Khan:
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach. 1-15 - Abhaya Kumar Sahoo, Srishti Raj, Chittaranjan Pradhan, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik, Ankit Vidyarthi:
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System. 1-20 - Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty:
Deep Ensemble Model for Detecting Attacks in Industrial IoT. 1-29 - Rajamandrapu Srinivas, N. Mayur:
Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System. 1-21 - Sahana Lokesh R., H. R. Ranganatha:
An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization. 1-20 - Mini Zeng, Feng Zhu, Sandra Carpenter:
Dynamic Warnings: An Eye Gaze-Based Approach. 1-28 - Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz:
Real-Time Cyber Analytics Data Collection Framework. 1-10 - Srijita Basu, Sandip Karmakar, Debasish Bera:
Securing Cloud Virtual Machine Image Using Ethereum Blockchain. 1-22 - Faiza Benmenzer, Rachid Beghdad:
Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments. 1-20 - Meenu Jain, Manisha Jailia:
Blockchain-Based Data Sharing Approach Considering Educational Data. 1-20 - Hicham Grari, Khalid Zine-Dine, Ahmed Azouaoui, Siham Lamzabi:
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher. 1-16
Volume 16, Number 2, 2022
- Tirupathaiah Kanaparthi, S. Ramesh, Ravi Sekhar Yarrabothu:
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks. 1-18 - Hong Wei, Zhiyong Li:
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference. 1-18 - Jintao Chen, Binruo Zhu, Fang Zhao, Ruili Huang:
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking. 1-20 - Bin Fang:
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities. 1-20 - Anjana S. Chandran:
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology. 1-18 - Leelalakshmi S., K. Rameshkumar:
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN. 1-22 - Chakka S. V. V. S. N. Murty, G. P. Saradhi Varma, A. S. N. Chakravarthy:
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model. 1-19 - Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam:
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption. 1-15 - Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li:
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence. 1-19 - Santhoshkumar K., Suganthi P.:
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set. 1-17 - Abhijit Biswas, Dushyanta Dutta:
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol. 1-18 - Kimmi Kumari, Mrunalini Marlakunta:
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data. 1-13 - Kusuma S. M., Veena K. N., B. V. Varun:
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN. 1-16 - Kalluri Rama Krishna, C. V. Guru Rao:
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments. 1-15 - Xiang Ma, Zhan Li:
Balanced Scheduling Method of Network Information Resources for Cloud Storage. 1-17
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.