


default search action
International Journal of Information Security and Privacy, Volume 18
Volume 18, 2024
- Musa Ugbedeojo, Marion O. Adebiyi

, Oluwasegun Julius Aroba
, Ayodele Ariyo Adebiyi:
RSA and Elliptic Curve Encryption System: A Systematic Literature Review. 1-27 - Zhiqiang Wu

:
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion. 1-15 - Dongyan Zhang, Lili Zhang, Zhiyong Zhang

, Zhongya Zhang:
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy. 1-19 - Yashu Liu

, Xiaoyi Zhao, Xiaohua Qiu, Han-Bing Yan:
VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs. 1-21 - Yuan Tian

, Wendong Wang, Jingyuan He:
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. 1-28 - Abdulhakim Sabur

, Ahmad Showail
:
Nudging Data Privacy of Mobile Health Applications in Saudi Arabia. 1-19 - Longfei Fu, Yibin Liu, Yanjun Zhang, Ming Li:

Network Information Security Monitoring Under Artificial Intelligence Environment. 1-25 - Zhiqiang Wu

, Shuhui Wan:
An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion. 1-19 - Zhijie Fan, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng, Xin Li:

Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection. 1-26 - Yancho Basil Wiryen, Auguste Vigny Noumsi, Joseph Mvogo Ngono, Louis Aimé Fono

:
Leveraging TenSEAL: A Comparative Study of BFV and CKKS Schemes for Training ML Models on Encrypted IoT Data. 1-17 - Fares Alharbi, Gautam Siddharth Kashyap

, Budoor Ahmad Allehyani
:
Automated Ruleset Generation for "HTTPS Everywhere": Challenges, Implementation, and Insights. 1-14 - Santosh Joshi

, Alexander Perez-Pons
, Shrirang Ambaji Kulkarni, Himanshu Upadhyay:
Application of Machine Learning Models for Malware Classification With Real and Synthetic Datasets. 1-23 - Alimire Maimaiti Tuxun, Qingrui Guo:

A Network Security Transmission Model Based on Improved Sparrow Search Algorithm. 1-17 - Miaomiao Dong

:
Explaining Privacy Paradox on WeChat: Investigating the Effect of Privacy Fatigue on Personal Information Disclosure Behaviors Among SNS Users. 1-24 - Yaping Zhang:

A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection. 1-20 - Lijun Gu, Zhongye Wang:

A Multi-Scale Feature Extraction Method Based on Improved Transformer for Intrusion Detection. 1-20 - Xinyuan Liu

, Hongyang He:
Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer. 1-21 - Rafael Martínez-Peláez

, Pablo Velarde-Alvarado, Vanessa G. Felix
, Alberto M. Ochoa-Brust, Rodolfo Ostos, Luis J. Mena
:
Assessing Employee Susceptibility to Cybersecurity Risks. 1-25 - Binjing Li, Wendong Yu:

Enhancing Legal Protection of Children's Rights in the "Internet Plus". 1-17 - Zhiwei Cao, Zhijie Fan, Boan Chen, Zidong Cheng, Shijun Xu, Xin Li:

Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals. 1-27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














