Journal: IJISP

Volume 5, Issue 4

8 -- 30O. T. Arogundade, A. T. Akinwale, Z. Jin, X. G. Yang. A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
31 -- 46Benjamin Ngugi, Jafar Mana, Lydia Segal. Evaluating the Quality and Usefulness of Data Breach Information Systems
47 -- 58Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad. Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework