researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJIPSI
Home
Index
Info
Volume
Volume
2
, Issue
4
257
--
280
Loganathan Agilandeeswari
,
Ganesan Kaliyaperumal
.
False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm
281
--
306
Kailas Patil
.
Request dependency integrity: validating web requests using dependencies in the browser environment
307
--
329
Aftab Ahmad
,
Preeti Misra
,
Frank Ono
,
Cody Priest
,
Jessica Suarez
,
Alexander Urcioli
.
The information privacy domain
330
--
352
Mohit Dayal
,
Bharti Nagpal
.
A compendious investigation of Android malware family
Volume
2
, Issue
3
177
--
196
Ha-Thanh Le
,
Peter Loh
,
Chiew Tong Lau
.
Performance evaluation of cyber reconnaissance tools
197
--
215
Jonathan Pan
.
Data farming for cyber security: an agent-based modelling approach
216
--
231
Divya Chaudhary
,
Shailender Gupta
,
Manju Kumari
.
A novel hybrid security mechanism for data communication networks
232
--
256
Zouheir Trabelsi
,
Mohammad M. Masud
.
An extended identity-based cryptography protocol based on biometric
Volume
2
, Issue
2
81
--
101
Sunil Kumar
,
Kamlesh Dutta
.
Intrusion detection technique for black hole attack in mobile ad hoc networks
102
--
137
Mohammad Badiul Islam
,
Renato Iannella
,
Jason Watson
,
Shlomo Geva
.
Privacy architectures in social networks' state-of-the-art survey
138
--
158
P. Shanthi
,
S. R. Balasundaram
.
A graph-based cloak algorithm to preserve location privacy in location-based services
159
--
175
Pallavi Vijay Chavan
,
Mohammad Atique
.
Secured approach for authentication using threshold-based hierarchical visual cryptography
Volume
2
, Issue
1
1
--
20
Justin Zhan
,
Xing Fang
.
A computational framework for detecting malicious actors in communities
21
--
36
Munene W. Kanampiu
.
Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community
37
--
55
Denise Ferebee
,
Dipankar Dasgupta
,
Qishi Wu
.
Information assurance: a cyber security storm map
56
--
78
Pietro Colombo
,
Elena Ferrari
.
A framework for privacy aware data management in relational databases