


default search action
Information Security Journal: A Global Perspective, Volume 31
Volume 31, Number 1, January 2022
- Yassine Sadqi

, Yassine Maleh
:
A systematic review and taxonomy of web applications threats. 1-27 - Shefali Arora

, M. P. S. Bhatia:
Challenges and opportunities in biometric security: A survey. 28-48 - Umar Hussain Mir

, Deep Singh
, Parveiz Nazir Lone
:
Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain. 49-63 - Mathias Reveraert

, Tom Sauer
:
A four-part typology to assess organizational and individual security awareness. 64-82 - Ajish S

, K. S. Anil Kumar:
Secure I-voting system using QR code and biometric authentication. 83-104 - Ayei E. Ibor

, Florence A. Oladeji, Olusoji B. Okunoye, Charles Onuwa Uwadia:
Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep). 105-124
Volume 31, Number 2, March 2022
- Manal Mohamed Alhejazi

, Rami Mustafa A. Mohammad
:
Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA). 125-143 - Prabhat Kumar Panda

, Sudipta Chattopadhyay:
An enhanced mutual authentication and security protocol for IoT and cloud server. 144-156 - Febina Ikbal

, R. Gopikakumari:
Performance analysis of SMRT-based color image watermarking in different color spaces. 157-167 - Mohammad Pishdar, Younes Seifi, Mohammad Nasiri, Mozafar Bag-Mohammadi

:
PCC-RPL: An efficient trust-based security extension for RPL. 168-178 - Kabelo Given Chuma

, Mpho Ngoepe
:
Security of electronic personal health information in a public hospital in South Africa. 179-195 - Mukesh Dalal

, Mamta Juneja:
A secure video steganography scheme using DWT based on object tracking. 196-213 - S. Srisakthi, Gufran Ahmad Ansari:

PCSP: A Protected Cloud Storage Provider employing light weight techniques. 214-225 - Rajesh Kumar Shrivastava

, Varun Natu, Chittaranjan Hota
:
Code integrity verification using cache memory monitoring. 226-236 - Farah Deeba

, Fayaz Ali Dharejo
, Yuanchun Zhou, Parvez Ahmed Memon, Hira Memon, Saeed Ahmed Khan
, Nauman Ali Larik:
Digital image watermarking in sparse domain. 237-250 - Correction. 251

Volume 31, Number 3, May 2022
- Melva M. Ratchford, Omar F. El-Gayar

, Cherie Noteboom, Yong Wang:
BYOD security issues: a systematic literature review. 253-273 - Oladayo Olufemi Olakanmi

, Kehinde Oluwasesan Odeyemi:
EACS: Expressible Access Control Scheme for Secure Services and Data Delegation in Collaborative E-health System. 274-288 - Neeru Bala

, Rashmi Gupta
, Anil Kumar:
Multimodal biometric system based on fusion techniques: a review. 289-337 - Alexander Gregory Stone

:
The role risk-management plays in reducing insider threat's in the federal Government. 338-345 - In Lee:

An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling. 346-358 - Lanfranco Lopriore:

Cryptographic pointers for fine-grained file access security. 359-375
Volume 31, Number 4, July 2022
- Akanksha Bisoyi

:
Ownership, liability, patentability, and creativity issues in artificial intelligence. 377-386 - Sunday Oyinlola Ogundoyin

:
A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system. 387-410 - Santosh Kumar Birthriya, Ankit Kumar Jain

:
A Comprehensive Survey of Phishing Email Detection and Protection Techniques. 411-440 - Xuan Dau Hoang

, Xuan-Hanh Vu:
An improved model for detecting DGA botnets using random forest algorithm. 441-450 - Yogesh M. Gajmal

, R. Udayakumar:
Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System. 451-465 - Vaibhav K. Anu

:
Information security governance metrics: a survey and taxonomy. 466-478 - Reshma Sonar, Gandharba Swain:

A hybrid steganography technique based on RR, AQVD, and QVC. 479-498
Volume 31, Number 5, September 2022
- Md. Nazmul Hossain, Taposh Das, Tariqul Islam, Md. Alam Hossain:

Cyber security risk assessment method for SCADA system. 499-510 - Ossama Al-Maliki, Hisham Al-Assam:

A tokenization technique for improving the security of EMV contactless cards. 511-526 - Manasi Jana, Biswapati Jana

:
A new DCT based robust image watermarking scheme using cellular automata. 527-543 - Yee Jian Chew

, Nicholas Lee, Shih Yin Ooi, Kok-Seng Wong
, Ying-Han Pang
:
Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. 544-565 - Chintan Patel

:
IoT privacy preservation using blockchain. 566-581 - B. Venkateswarlu, V. Viswanath Shenoi:

Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection. 582-601 - Sunitha Prabhu

, Nik Thompson
:
A primer on insider threats in cybersecurity. 602-611 - Payal Chaudhari

, Manik Lal Das:
PAC: Privacy preserving proxy re-encryption for access control in public cloud. 612-627
Volume 31, Number 6, November 2022
- Chintan Patel

, Nishant Doshi
:
LDA-IoT : a level dependent authentication for IoT paradigm. 629-656 - Md. Siddiqur Rahman Tanveer, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:

A multi-stage chaotic encryption technique for medical image. 657-675 - Sarvesh Tanwar

, Anil Kumar
:
Secure key issuing scheme in ID-based cryptography with revocable ID. 676-685 - G. Umarani Srikanth

, Lijetha C. Jaffrin
:
Security Issues in Cloud and Mobile cloud: A Comprehensive Survey. 686-710 - Teodor Sommestad, Hannes Holm

, Daniel Steinvall:
Variables influencing the effectiveness of signature-based network intrusion detection systems. 711-728

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














