default search action
Information Security Journal: A Global Perspective, Volume 26
Volume 26, Number 1, 2017
- Indranil Jana:
Effect of ARP poisoning attacks on modern operating systems. 1-6 - Xingyuan Wang, Siwei Wang, Yingqian Zhang, Kang Guo:
A novel image encryption algorithm based on chaotic shuffling method. 7-16 - Alejandro Felix, Andrew F. Tappenden, Michael R. Smith, James Miller:
Automated policy generation for testing access control software. 17-38 - Teodor Sommestad, Hannes Holm:
Alert verification through alert correlation - An empirical test of SnIPS. 39-48 - Vijaya Kumar Kollati, Somasundaram K:
IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET. 49-60
Volume 26, Number 2, 2017
- Neha Agrawal, Shashikala Tapaswi:
Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey. 61-73 - Keith F. Joiner:
How Australia can catch up to U.S. cyber resilience by understanding that cyber survivability test and evaluation drives defense investment. 74-84 - Masaya Yasuda:
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption. 85-103
Volume 26, Number 3, 2017
- Gideon Creech:
New approach to return-oriented programming exploitation mitigation. 105-120 - S. A. Onashoga, B. A. Bamiro, A. T. Akinwale, J. A. Oguntuase:
KC-Slice: A dynamic privacy-preserving data publishing technique for multisensitive attributes. 121-135 - Caifen Wang, Chao Liu, Yahong Li, Hui Qiao, Li Chen:
Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks. 136-152
Volume 26, Number 4, 2017
- K. Anusha, E. Sathiyamoorthy:
A new trust-based mechanism for detecting intrusions in MANET. 153-165 - Myung Kang, Hossein Saiedian:
USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices. 166-185 - Ebenezer Okoh, Makame Hamza Makame, Ali Ismail Awad:
Toward online education for fingerprint recognition: A proof-of-concept web platform. 186-197 - Garima Mehta, Malay Kishore Dutta, Pyung Soo Kim:
Combinational domain-based encryption using FrWT and hyper-chaotic system for biometric data security. 198-211
Volume 26, Number 5, 2017
- Rajinder Sandhu, Amandeep Singh Sohal, Sandeep K. Sood:
Identification of malicious edge devices in fog computing environments. 213-228 - Sara Mohammadi, Hamid Mirvaziri, Mostafa Ghazizadeh Ahsaee:
Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection. 229-239 - Yugarshi Shashwat, Prashant Pandey, K. V. Arya, Smit Kumar:
A modified AODV protocol for preventing blackhole attack in MANETs. 240-248 - Onur Duman, Amr M. Youssef:
Fault analysis on Kalyna. 249-265
Volume 26, Number 6, 2017
- Ogechukwu N. Iloanusi, Celestine A. Ezema:
A quantitative impact of fingerprint distortion on recognition performance. 267-275
- Travis Duane Howard, Jose de Arimatéia da Cruz:
Stay the course: Why trump must build on obama's cybersecurity policy. 276-286 - Ismaila Adeniyi Kamil, Oladayo Olufemi Olakanmi, Sunday Oyinlola Ogundoyin:
A secure and privacy-preserving lightweight authentication protocol for wireless communications. 287-304
- P. Punithavathi, S. Geetha:
Visual cryptography: A brief survey. 305-317
- Editorial Board EOV. 318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.