


default search action
Information Security Journal: A Global Perspective, Volume 28
Volume 28, Numbers 1-2, 2019
- Shivi Garg

, Rakesh Kumar Singh, Amar Kumar Mohapatra:
Analysis of software vulnerability classification based on different technical parameters. 1-19 - Lanfranco Lopriore:

Key management in wireless sensor networks. 20-34 - Milap J. Bhuva, Sanjay Singh

:
Symmetric key-based authenticated encryption protocol. 35-45 - Mikhail Styugin

:
Protection from reconnaissance for establishing information security systems. 46-54
Volume 28, Number 3, 2019
- Akhyari Nasir, Ruzaini Abdullah Arshah

, Mohd Rashid Ab Hamid
:
A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions. 55-80 - Filippos Giannakas

, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis
:
A comprehensive cybersecurity learning platform for elementary education. 81-106
Volume 28, Numbers 4-5, 2019
- Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi

:
Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. 107-119 - Karima Djebaili, Lamine Melkemi:

Two dimensional ElGamal public key cryptosystem. 120-126 - Rita Ismailova

, Gulshat Muhametjanova
, Tunç Durmus Medeni, Ihsan Tolga Medeni
, Demet Soylu, Omar Azimbek Dossymbekuly:
Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan. 127-135 - Paul Joseph

, Jasmine Norman:
Forensic corpus data reduction techniques for faster analysis by eliminating tedious files. 136-147
Volume 28, Number 6, 2019
- N. B. Gayathri

, Thumbur Gowri, Punugu Vasudeva Reddy
:
Secure and efficient certificateless aggregate signature scheme from bilinear pairings. 149-163 - Ashutosh Bahuguna, Raj Kishor Bisht

, Jeetendra Pande
:
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context. 164-177 - Hossain Shahriar

, Chi Zhang, Stephen Dunn, Robert Bronte, Atef Sahlan, Khaled Tarmissi:
Mobile anti-phishing: Approaches and challenges. 178-193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














