Journal: IJISP

Volume 15, Issue 3

1 -- 18Hongsong Chen, Caixia Meng, Jingjiu Chen. DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment
19 -- 32Priti Jagwani, Saroj Kaushik. Entropy-Based Quantification of Privacy Attained Through User Profile Similarity
33 -- 47Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi. A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies
48 -- 64Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh. A New Combinational Technique in Image Steganography
65 -- 82Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi. VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks
83 -- 105Vartika Puri, Parmeet Kaur, Shelly Sachdeva. ADT: Anonymization of Diverse Transactional Data
106 -- 128N. Muraleedharan, B. Janet. SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data