Journal: IJISP

Volume 16, Issue 2

1 -- 13Kimmi Kumari, Mrunalini Marlakunta. A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data
1 -- 18Tirupathaiah Kanaparthi, Ramesh S., Ravi Sekhar Yarrabothu. K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks
1 -- 18Anjana S. Chandran. Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
1 -- 22Leelalakshmi S., K. Rameshkumar. Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN
1 -- 16Kusuma S. M., Veena K. N., B. V. Varun. A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN
1 -- 15Priyadharshini Kaliyamoorthy, Aroul Canessane Ramalingam. Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption
1 -- 15Kalluri Rama Krishna, C. V. Guru Rao. ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments
1 -- 19Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li. Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence
1 -- 20Jintao Chen, Binruo Zhu, Fang Zhao, Ruili Huang. Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking
1 -- 20Bin Fang. Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities
1 -- 18Hong Wei, Zhiyong Li. Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference
1 -- 17Santhoshkumar K., Suganthi P.. AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set
1 -- 18Abhijit Biswas, Dushyanta Dutta. Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol
1 -- 19Chakka S. V. V. S. N. Murty, G. P. Saradhi Varma, A. S. N. Chakravarthy. Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model
1 -- 17Xiang Ma, Zhan Li. Balanced Scheduling Method of Network Information Resources for Cloud Storage

Volume 16, Issue 1

1 -- 17Guoyan Li, Yihui Shang, Yi Liu, Xiangru Zhou. A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking
1 -- 20Mpho Ngoepe, Mfanasibili Ngwenya. Personal Data and the Assemblage Security in Consumer Internet of Things
1 -- 20Faiza Benmenzer, Rachid Beghdad. Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
1 -- 17Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin, Igor I. Lychkov. Network Anomalies Detection Approach Based on Weighted Voting
1 -- 26Faruk Arslan, Kallol Kumar Bagchi, Godwin J. Udo. What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context
1 -- 21Ankit Rajeshkumar Kharwar, Devendra V. Thakor. An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm
1 -- 23Prathiba Ashok, Suyash Vardhan Srivathshav, E. Ramkumar, P. Rajkamal, V. S. Kanchana Bhaaskaran. Lightweight VLSI Architectures for Image Encryption Applications
1 -- 18Bahubali Akiwate, Latha Parthiban. Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
1 -- 18Abdallah Soualmi, Adel Alti, Lamri Laouamer. An Imperceptible Watermarking Scheme for Medical Image Tamper Detection
1 -- 26M. D. J. S. Goonetillake, Rangana Jayashanka, S. V. Rathnayaka. Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics
1 -- 19Divyashikha Sethia, Raj Sahu. Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation
1 -- 14Gururaj H. L., Prithwijit Mitra, Soumyadip Koner, Sauvik Bal, Francesco Flammini, Janhavi V., Ravi Kumar V.. Prediction of Phishing Websites Using AI Techniques
1 -- 17Kapil Kant Kamal, Monit Kapoor, Padmaja Joshi. Secure and Flexible Key Protected Identity Framework for Mobile Devices
1 -- 27Kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane. A Proposal Phishing Attack Detection System on Twitter
1 -- 22R. Balakrishnan Unny, Nityesh Bhatt. A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems
1 -- 20R. E. Vinodhini, P. Malathi. Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security
1 -- 18El Arbi Abdellaoui Alaoui, Mohamed-Lamine Messai, Anand Nayyar. Using Machine Learning in WSNs for Performance Prediction MAC Layer
1 -- 21Rajamandrapu Srinivas, N. Mayur. Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System
1 -- 22Siyu Wang, Nafei Zhu, Jingsha He, Da Teng, Yue Yang. Privacy Disclosure in the Real World: An Experimental Study
1 -- 16Hicham Grari, Khalid Zine-Dine, Ahmed Azouaoui, Siham Lamzabi. Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
1 -- 12Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy, Andrey Koucheryavy. Fractals for Internet of Things Network Structure Planning
1 -- 24Xin Liu, Bin Zhang. An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud
1 -- 20Liangshun Wu, Hengjin Cai, Han Li. Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX
1 -- 24Dipali K. Shende, Yogesh Angal, S. C. Patil. An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT
1 -- 16Moez Farokhnia Hamedani, Ali Dehghan 0004. Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms
1 -- 20Danish Ahamad, Md Mobin Akhtar, Shabi Alam Hameed, Mahmoud Mohammad Mahmoud Al Qerom. Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication
1 -- 20Meenu Jain, Manisha Jailia. Blockchain-Based Data Sharing Approach Considering Educational Data
1 -- 24Kakali Chatterjee. A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation
1 -- 20Ping Zhao, Zhijie Fan, Zhiwei Cao, Xin Li. Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism
1 -- 38Boubakeur Annane, Adel Alti. Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile
1 -- 44Bharath M. R., K. A. Radhakrishna Rao. Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification
1 -- 27Ritinder Kaur, Neha Gupta. CFS-MHA: A Two-Stage Network Intrusion Detection Framework
1 -- 19Erkan Çetintas, Ikram Dastan. Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA
1 -- 32Nitin O. Mathur, Chengcheng Li, Bilal Gonen, Kijung Lee. Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
1 -- 16Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo, Sergio Takeo Kofuji. A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments
1 -- 28Mini Zeng, Feng Zhu 0010, Sandra Carpenter. Dynamic Warnings: An Eye Gaze-Based Approach
1 -- 15Rohit Sinha, Rittika Sur, Ruchi Sharma, Avinash K. Shrivastava. Anomaly Detection Using System Logs: A Deep Learning Approach
1 -- 14Yonglei Liu, Kun Hao, Weilong Zhang, Lin Gao, Li Wang. A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes
1 -- 20Sahana Lokesh R., H. R. Ranganatha. An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization
1 -- 20Abhaya Kumar Sahoo, Srishti Raj, Chittaranjan Pradhan, Bhabani Shankar Prasad Mishra, Rabindra Kumar Barik, Ankit Vidyarthi. Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System
1 -- 18Adnan Gutub. Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication
1 -- 17Chaudhari D. A., Dipalee A. Chaudhari, Umamaheswari E., E. Umamaheswari. Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications
1 -- 15R. Lalduhsaka, Nilutpol Bora, Ajoy Kumar Khan. Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
1 -- 17Na Hua, Juyan Li, Kejia Zhang, Long Zhang. A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices
1 -- 18Mohammad H. Alshayeji, Mousa Alsulaimi, Sa'ed Abed, Reem Jaffal. Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine
1 -- 10Herbert Maosa, Karim Ouazzane, Viktor Sowinski-Mydlarz. Real-Time Cyber Analytics Data Collection Framework
1 -- 14Romil Rawat, Vinod Kumar Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla, Megha Kuliha. Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities
1 -- 25Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Anand Nayyar. Machine Learning Interpretability to Detect Fake Accounts in Instagram
1 -- 20Chandra Sekhar Kolli, Uma Devi Tatavarthi. Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank
1 -- 26Garry L. White. Infrastructure Cyber-Attack Awareness Training: Effective or Not?
1 -- 24Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati, Mekala Srinivasa Rao. Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network
1 -- 21Mohammed Tayebi, Said El Kafhali. Credit Card Fraud Detection Based on Hyperparameters ‎Optimization Using the Differential Evolution
1 -- 22Srijita Basu, Sandip Karmakar, Debasish Bera. Securing Cloud Virtual Machine Image Using Ethereum Blockchain
1 -- 17Karim Ouazzane, Thekla Polykarpou, Yogesh Patel 0001, Jun Li 0013. An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach
1 -- 31Monica Malik, Khushi Gandhi, Bhawna Narwal. AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks
1 -- 28Boris Jerson Zannou, Tahirou Djara, Antoine Vianou. Cylindrical Curve for Contactless Fingerprint Template Securisation
1 -- 28Adnan Gutub. Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility
1 -- 18Faheem Syeed Masoodi, Iram Abrar, Alwi M. Bamhdi. An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques
1 -- 19Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D. A Quantitative Method for Measuring Health of Authoritative Name Servers
1 -- 29Bibhuti Bhusana Behera, Binod Kumar Pattanayak, Rajani Kanta Mohanty. Deep Ensemble Model for Detecting Attacks in Industrial IoT
1 -- 25Pankaj Pankaj, Bharti P. K, Brajesh kumar. A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture
1 -- 24Sachikanta Dash, Sasmita Padhy, Bodhisatwa Parija, T. Rojashree, K. Abhimanyu Kumar Patro. A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques
1 -- 24Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand. Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols