Journal: IJIPSI

Volume 5, Issue 3

173 -- 199O. Deepa, J. Suguna. An optimised QoS-based clustering with multipath secure routing protocol for wireless sensor networks
200 -- 210Himanshu Dubey, Shobha Bhatt. Comparative analysis of Autopsy and WinHex tools on data acquisition method
211 -- 226Jincy J. Fernandez, P. Nithyanandam. Biometric watermarking: an application-based review
227 -- 237Vemuri Sudarsan Rao. Security policies and trust issues in cloud computing
238 -- 249Yousuf Muhammad. Data privacy laws in the USA

Volume 5, Issue 2

93 -- 110Sarandis Mitropoulos. Conflict resolution in management policies: case study in cloud computing and internet of things
111 -- 137Geethu Mary George, L. S. Jayashree. A survey on user privacy preserving blockchain for health insurance using Ethereum smart contract
138 -- 153Matthew Kenneth Hendricks, Benedikt Hirschfelder, Pragasen Pillay. The willingness to provide personal information - a potential relationship with the usage of privacy enhancing self-sovereign identity technology
154 -- 172N. D. Patel, B. M. Mehtre, Rajeev Wankar. Novel attribute selection technique for an efficient intrusion detection system

Volume 5, Issue 1

1 -- 17Jakob Greis, Artem Yushchenko, Daniel Vogel 0004, Michael Meier 0001, Volker Steinhage. Automated identification of vulnerable devices in networks using traffic data and deep learning
18 -- 35Huanhuan Wang, Debin Cheng, Hui Peng. Phishing website detection method based on CNAIR framework
36 -- 68Halil Bisgin, Fadi Mohsen, Vincent Nwobodo, Rachael Havens. Enhancing malware detection in Android application by incorporating broadcast receivers
69 -- 91Madhuri Pagale, Richa Purohit. A review on privacy protection in the internet of things using machine learning-based solutions