Journal: IJIPSI

Volume 2, Issue 4

257 -- 280Loganathan Agilandeeswari, Ganesan Kaliyaperumal. False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm
281 -- 306Kailas Patil. Request dependency integrity: validating web requests using dependencies in the browser environment
307 -- 329Aftab Ahmad, Preeti Misra, Frank Ono, Cody Priest, Jessica Suarez, Alexander Urcioli. The information privacy domain
330 -- 352Mohit Dayal, Bharti Nagpal. A compendious investigation of Android malware family

Volume 2, Issue 3

177 -- 196Ha-Thanh Le, Peter Loh, Chiew Tong Lau. Performance evaluation of cyber reconnaissance tools
197 -- 215Jonathan Pan. Data farming for cyber security: an agent-based modelling approach
216 -- 231Divya Chaudhary, Shailender Gupta, Manju Kumari. A novel hybrid security mechanism for data communication networks
232 -- 256Zouheir Trabelsi, Mohammad M. Masud. An extended identity-based cryptography protocol based on biometric

Volume 2, Issue 2

81 -- 101Sunil Kumar, Kamlesh Dutta. Intrusion detection technique for black hole attack in mobile ad hoc networks
102 -- 137Mohammad Badiul Islam, Renato Iannella, Jason Watson, Shlomo Geva. Privacy architectures in social networks' state-of-the-art survey
138 -- 158P. Shanthi, S. R. Balasundaram. A graph-based cloak algorithm to preserve location privacy in location-based services
159 -- 175Pallavi Vijay Chavan, Mohammad Atique. Secured approach for authentication using threshold-based hierarchical visual cryptography

Volume 2, Issue 1

1 -- 20Justin Zhan, Xing Fang. A computational framework for detecting malicious actors in communities
21 -- 36Munene W. Kanampiu. Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community
37 -- 55Denise Ferebee, Dipankar Dasgupta, Qishi Wu. Information assurance: a cyber security storm map
56 -- 78Pietro Colombo, Elena Ferrari. A framework for privacy aware data management in relational databases