researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJISP
Home
Index
Info
Volume
Volume
5
, Issue
4
8
--
30
O. T. Arogundade
,
A. T. Akinwale
,
Z. Jin
,
X. G. Yang
.
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
31
--
46
Benjamin Ngugi
,
Jafar Mana
,
Lydia Segal
.
Evaluating the Quality and Usefulness of Data Breach Information Systems
47
--
58
Hassen Sallay
,
Mohsen Rouached
,
Adel Ammar
,
Ouissem Ben Fredj
,
Khalid Al-Shalfan
,
Majdi Ben Saad
.
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework
Volume
5
, Issue
3
1
--
18
Ahmed Patel
,
Kenan Kalajdzic
,
Laleh Golafshan
.
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
19
--
35
J. Harold Pardue
,
Jeffrey P. Landry
,
Alec Yasinsac
.
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
36
--
49
S. Srinivasan
,
Sathish Kumar Alampalayam
.
Intrusion Detection Algorithm for MANET
50
--
67
Mathew Nicho
,
Hussein Fakhry
,
Charles Haiber
.
An Integrated Security Governance Framework for Effective PCI DSS Implementation
Volume
5
, Issue
2
1
--
12
Douglas M. Kline
,
Ling He
,
Ulku Yaylacicegi
.
User Perceptions of Security Technologies
13
--
32
Md. Golam Kaosar
,
Xun Yi
.
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
33
--
53
Anirban Sengupta
,
Chandan Mazumdar
.
A Mark-Up Language for the Specification of Information Security Governance Requirements
54
--
60
Cheng-Chi Lee
,
Min-Shiang Hwang
,
I-En Liao
.
On the Security of Self-Certified Public Keys
Volume
5
, Issue
1
1
--
13
Devon Bennett
,
Hamid Jahankhani
,
Mohammad Dastbaz
,
Hossein Jahankhani
.
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment
14
--
32
Archana Bhattarai
,
Dipankar Dasgupta
.
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis
33
--
49
Ioana Lasc
,
Reiner Dojen
,
Tom Coffey
.
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications
50
--
66
Garry L. White
,
Francis A. Mendez Mediavilla
,
Jaymeen R. Shah
.
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers