Journal: IJISP

Volume 11, Issue 4

1 -- 15Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.. A Survey on Denial of Service Attacks and Preclusions
16 -- 28Monther Aldwairi, Musaab Hasan, Zayed Balbahaith. Detection of Drive-by Download Attacks Using Machine Learning Approach
29 -- 46Manish Kumar, Abhinav Bhandari. Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2
47 -- 64Chandan Kumar Behera, D. Lalitha Bhaskari. Malware Methodologies and Its Future: A Survey

Volume 11, Issue 3

1 -- 14Sarvesh Tanwar, Anil Kumar. A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority
15 -- 28Anjali Kumawat, Anil Kumar Sharma, Sunita Kumawat. Identification of Cryptographic Vulnerability and Malware Detection in Android
29 -- 41Deepti Vidyarthi, S. P. Choudhary, Subrata Rakshit, C. R. S. Kumar. Malware Detection by Static Checking and Dynamic Analysis of Executables
42 -- 53Sunil Kumar Singh, Prabhat Kumar, Jyoti Prakash Singh. Localization in Wireless Sensor Networks Using Soft Computing Approach
54 -- 62Daya Sagar Gupta, G. P. Biswas. A Secure Cloud Storage using ECC-Based Homomorphic Encryption
63 -- 74Saurabh Chamotra, Rakesh Kumar Sehgal, Ram Swaroop Misra. Honeypot Baselining for Zero Day Attack Detection

Volume 11, Issue 2

1 -- 10Prakash Mohan, Saravanakumar Chelliah. An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password
11 -- 24Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi, N. Ramasubramanian. Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation
25 -- 37Regner Sabillon, Jordi Serra-Ruiz, Victor Cavaller, Jeimy Cano. Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies
38 -- 48Nandan Rao, Shubhra Srivastava, Sreekanth K. S.. PKI Deployment Challenges and Recommendations for ICS Networks
49 -- 63Harshad Suryakant Wadkar, Arun Mishra, Arati Dixit. Framework to Secure Browser Using Configuration Analysis

Volume 11, Issue 1

1 -- 17Mohd Anwar, Peter Brusilovsky. Privacy and Territoriality Issues in an Online Social Learning Portal
18 -- 34Mohamed Amine Boudia, Reda Mohamed Hamou, Abdelmalek Amine. A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees
35 -- 51Mukesh Kumar, Kamlesh Dutta. Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN
52 -- 64Emmy Mugisha, Gongxuan Zhang, Maouadj Zine El Abidine, Mutangana Eugene. A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes