default search action
Journal of Internet Services and Information Security, Volume 11
Volume 11, Number 1, February 2021
- Ilsun You:
2021 Letter from the Editor-in-Chief. 1 - Geunha You, Gyoosik Kim, Seong-je Cho, Hyoil Han:
A Comparative Study on Optimization, Obfuscation, and Deobfuscation tools in Android. 2-15 - Mikhail V. Buinevich, Konstantin E. Izrailov, Igor V. Kotenko, Pavel A. Kurta:
Method and algorithms of visual audit of program interaction. 16-43 - Clayton Johnson, Bishal Khadka, Ethan Ruiz, James Halladay, Tenzin Doleck, Ram B. Basnet:
Application of Deep Learning on the Characterization of Tor Traffic using Time based Features. 44-63 - Eunalili Maye Culpa, Jes Ian Mendoza, Jasper Gabriel Ramirez, Aldrine Lennart Yap, Elline Fabian, Philip Virgil Astillo:
A Cloud-Linked Ambient Air Quality Monitoring Apparatus for Gaseous Pollutants in Urban Areas. 64-79 - Oxana Verkholyak, Anastasia Dvoynikova, Alexey Karpov:
A Bimodal Approach for Speech Emotion Recognition using Audio and Text. 80-96
Volume 11, Number 2, May 2021
- Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing. 1-21 - Daehyeon Bae, JaeCheol Ha:
Performance Metric for Differential Deep Learning Analysis. 22-33 - Vikas Sihag, Manu Vardhan, Pradeep Singh, Gaurav Choudhary, Seiil Son:
De-LADY: Deep learning based Android malware detection using Dynamic features. 34-45 - Eihab Bashier, Taoufik Ben Jabeur:
An efficient secure image encryption algorithm based on total shuffling, integer chaotic maps and median filter. 46-77 - Hanan Alhindi, Issa Traoré, Isaac Woungang:
Preventing Data Loss by Harnessing Semantic Similarity and Relevance. 78-99
Volume 11, Number 3, August 2021
- Hiroaki Anada, Yoshifumi Ueshige:
Anonymous Deniable Predicate Authentication Scheme with Revocability. 1-15 - Yunyoung Lee, Bumho Son, Seongwan Park, Jaewook Lee, Huisu Jang:
A Survey on Security and Privacy in Blockchain-based Central Bank Digital Currencies. 16-29 - Sara Narteni, Ivan Vaccari, Maurizio Mongelli, Maurizio Aiello, Enrico Cambiaso:
Evaluating the Possibility to Perpetrate Tunneling Attacks Exploiting Short-Message-Service. 30-46 - Benjamin Aziz:
A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications. 47-57 - Myeongjoo Kang:
Examining the Impact of ICT Access and ICT Use on Trade in Services: Focused on Selected Service Categories. 58-75
Volume 11, Number 4, November 2021
- Sandi Rahmadika, Muhammad Firdaus, Yong-Hwan Lee, Kyung-Hyune Rhee:
An Investigation of Pseudonymization Techniques in Decentralized Transactions. 1-18 - Ziga Kodric, Simon Vrhovec, Luka Jelovcan:
Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review. 19-32 - Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione:
Deep Adversarial Learning on Google Home devices. 33-43 - Mohammad Arfizurrahmanl, Ahmad, Mohammad Shahadat Hossain, Mohammad Ahsanul Haque, Karl Andersson:
Real-Time Non-Intrusive Driver Fatigue Detection System using Belief Rule-Based Expert System. 44-60 - Mohamed Elshrkawey, Marwa Alalfi, Hassan Al-Mahdi:
An Enhanced Intrusion Detection System Based on Multi-Layer Feature Reduction for Probe and DoS Attacks. 61-78
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.