Journal: IJISP

Volume 15, Issue 4

1 -- 17Anshuman Patel, Devesh Jinwala. A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things
18 -- 30Om Prakash Samantray, Satya Narayan Tripathy. An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms
31 -- 53Andrew Mangle, Sandip C. Patel, Sanjay Bapna, Xingxing Zu, David Gurzick. A Model to Improve Security Questions Through Individualized Assistance
54 -- 78Shuru Liu, Zhanlei Shang, Junwei Lei. Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals
79 -- 97Ahmed Elmorshidy. M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office - An Empirical Study
98 -- 117Priya C. V., K. S. Angel Viji. Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm
118 -- 131Sadiq A. Mehdi. Image Encryption Algorithm Based on a Novel 4D Chaotic System

Volume 15, Issue 3

1 -- 18Hongsong Chen, Caixia Meng, Jingjiu Chen. DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment
19 -- 32Priti Jagwani, Saroj Kaushik. Entropy-Based Quantification of Privacy Attained Through User Profile Similarity
33 -- 47Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah, Abdelmalek Azizi. A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies
48 -- 64Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh. A New Combinational Technique in Image Steganography
65 -- 82Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi. VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks
83 -- 105Vartika Puri, Parmeet Kaur, Shelly Sachdeva. ADT: Anonymization of Diverse Transactional Data
106 -- 128N. Muraleedharan, B. Janet. SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data

Volume 15, Issue 2

1 -- 28Manisha Duevedi, Sunil Kumar Muttoo. An Improved Separable and Reversible Steganography in Encrypted Grayscale Images
29 -- 52Shweta Kaushik, Charu Gandhi. Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud
53 -- 67Abhishek Bansal, Vinay Kumar. Steganography Technique Inspired by Rook
68 -- 86Sowmyarani C. N., Veena Gadad, Dayananda P.. (p+, α, t)-Anonymity Technique Against Privacy Attacks
87 -- 112Randhir Kumar, Rakesh Tripathi. Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain
113 -- 130V. Sandeep, Saravanan Kondappan, A. Amir Anton Jone, S. Raj Barath. Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)
131 -- 144Redha Taguelmimt, Rachid Beghdad. DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors
145 -- 180Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-zine. Detecting DDoS Attacks in IoT Environment
181 -- 195Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi. Assessing HIPAA Compliance of Open Source Electronic Health Record Applications
196 -- 216Suhas Bhagate, Prakash Jayanth Kulkarni. Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization

Volume 15, Issue 1

1 -- 25Dung Hoang Le, Nguyen Thanh Vu, Tuan Dinh Le. A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network
1 -- 23Peng Li 0011, Chao Xu, He Xu. Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
26 -- 43Sikha Bagui, Keenal M. Shah, Yizhi Hu, Subhash C. Bagui. Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm
44 -- 64Hatem Mahmoud Salama, Mohammed Z. Abd El-Mageed, Gouda Ismail Mohamed Salama, Khaled Mahmoud Badran. CSMCSM: Client-Server Model for Comprehensive Security in MANETs
65 -- 98Mhamed Zineddine. IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms
99 -- 116Sara Namane, Nassira Ghoualmi, Mustafa Kaiiali. Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making
117 -- 137Salome James, Thumbur Gowri, Punugu Vasudeva Reddy. Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery
138 -- 152Mohamed Abdou Souidi, Noria Taghezout. Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System
153 -- 172Preetish Ranjan, Abhishek Vaish. Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks
173 -- 189Rawan Baalous, Ronald Poet. Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies