Journal: IJISP

Volume 14, Issue 4

1 -- 21Noureddine Aribi, Yahia Lebbah. A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols
22 -- 41S. Immaculate Shyla, S. S. Sujatha. An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System
42 -- 56Mohamed Haddadi, Rachid Beghdad. A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud
57 -- 73Charu Gupta, Rakesh Kumar Singh, Simran Kaur Bhatia, Amar Kumar Mohapatra. DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
74 -- 91Andrew Besmer, Jason Watson, M. Shane Banks. Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews
92 -- 112Sheshadri Chatterjee. Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective
113 -- 133Mary Shamala L., G. Zayaraz 0001, Vivekanandan K., V. Vijayalakshmi 0001. A Tweakable Key Alternating Lightweight Cipher for Internet of Things

Volume 14, Issue 3

1 -- 17Geetika Sarna, M. P. S. Bhatia. Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network
18 -- 37Sharmila Subudhi, Suvasini Panigrahi. Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning
38 -- 49Pranav Vyas, Bhushan Trivedi. Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application
50 -- 71Oussama Hannache, Mohamed Chaouki Batouche. Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments
72 -- 94Pooja Parameshwarappa, Zhiyuan Chen 0003, Akif Günes Koru. An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization
95 -- 114Ravi Kiran Varma Penmatsa, Akhila Kalidindi, S. Kumar Reddy Mallidi. Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets
115 -- 133J. Rene Beulah, D. Shalini Punithavathani. An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions

Volume 14, Issue 2

1 -- 19Khundrakpam Johnson Singh, Janggunlun Haokip, Usham Sanjota Chanu. A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks
20 -- 40Rui Silva, Raul Barbosa, Jorge Bernardino. Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice
41 -- 61Hania Gadouche, Farah Zoubeyr, Abdelkamel Tari. A Valid and Correct-by-Construction Formal Specification of RBAC
62 -- 82Dhruti Sharma, Devesh C. Jinwala. Aggregate Searchable Encryption With Result Privacy
83 -- 101Giridhar Maji, Sharmistha Mandal, Soumya Sen. Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain
102 -- 115Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji 0001. Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem
116 -- 142Shelendra Kumar Jain, Nishtha Kesswani. IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment

Volume 14, Issue 1

1 -- 15Amanpreet Kaur, Padam Kumar, Govind P. Gupta. Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors
16 -- 26Mamata Rath, Bibudhendu Pati, Binod Kumar Pattanayak. Manifold Surveillance Issues in Wireless Network and the Secured Protocol
27 -- 43Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh, Gunjan Chhabra. Comparison of Various DoS Algorithm
44 -- 66Neha Agarwal, Ajay Rana, Jai Prakash Pandey, Amit Agarwal. Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE
67 -- 80Partha Ghosh, Sumit Biswas, Shivam Shakti, Santanu Phadikar. An Improved Intrusion Detection System to Preserve Security in Cloud Environment