Journal: IJISP

Volume 17, Issue 1

1 -- 25Ali Alibeigi, Munir Abu Bakar, Adeleh Asemi. Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies
1 -- 18Mallanagouda Biradar, Basavaraj Mathapathi. Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN
1 -- 28Alec Wells, Aminu Bello Usman. Trust and Voice Biometrics Authentication for Internet of Things
1 -- 16Sangita Baruah, Dhruba Jyoti Borah, Vaskar Deka. Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm
1 -- 22Suman Thapaliya, Pawan Kumar Sharma. Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures
1 -- 18Mohamed Guendouz, Abdelmalek Amine. A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques
1 -- 18Jinhai Song, Zhiyong Zhang 0002, Kejing Zhao, Qinhai Xue, Brij B. Gupta. A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
1 -- 15Zhen Gu, Guoyin Zhang. Trajectory Data Publication Based on Differential Privacy
1 -- 25Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias-Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj. Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing
1 -- 17Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch. i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
1 -- 23Mathew Nicho, Christopher D. McDermott, Hussein Fakhry, Shini Girija. A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors