Stop the war!
Остановите войну!
for scientists:
default search action
Information Security Journal: A Global Perspective, Volume 33
Volume 33, Number 1, January 2024
- Rajesh Bingu, S. Jothilakshmi, N. Srinivasu:
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment. 1-15 - Tulsi Pawan Fowdur, Shuaïb Hosenally:
A real-time machine learning application for browser extension security monitoring. 16-41 - Farid Javani, Alan T. Sherman:
BVOT: self-tallying boardroom voting with oblivious transfer. 42-53 - Nelson Russo, Leonilde Reis, Maria Clara Silveira, Henrique S. Mamede:
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. 54-72 - Savitha M. M, Basarkod P. I:
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms. 73-95
Volume 33, Number 2, March 2024
- Payal Sharma, B. R. Purushothama:
A lightweight group key management scheme with constant rekeying cost and public bulletin size. 97-120 - Joakim Kävrestad, Steven Furnell, Marcus Nohlberg:
User perception of Context-Based Micro-Training - a method for cybersecurity training. 121-137 - Thierry Mefenza, Damien Vergnaud:
Lattice attacks on pairing-based signatures. 138-157 - Salifu Yusif, Abdul Hafeez-Baig, Charles Anachanser:
Internet governance and cyber-security: a systematic literature review. 158-171 - Divya V. L., Job P. A., K. Preetha Mathew:
Secure query processing and optimization in cloud environment: a review. 172-191
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.