Journal: IJISP

Volume 5, Issue 4

8 -- 30O. T. Arogundade, A. T. Akinwale, Z. Jin, X. G. Yang. A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements
31 -- 46Benjamin Ngugi, Jafar Mana, Lydia Segal. Evaluating the Quality and Usefulness of Data Breach Information Systems
47 -- 58Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad. Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework

Volume 5, Issue 3

1 -- 18Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan. Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
19 -- 35J. Harold Pardue, Jeffrey P. Landry, Alec Yasinsac. E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
36 -- 49S. Srinivasan, Sathish Kumar Alampalayam. Intrusion Detection Algorithm for MANET
50 -- 67Mathew Nicho, Hussein Fakhry, Charles Haiber. An Integrated Security Governance Framework for Effective PCI DSS Implementation

Volume 5, Issue 2

1 -- 12Douglas M. Kline, Ling He, Ulku Yaylacicegi. User Perceptions of Security Technologies
13 -- 32Md. Golam Kaosar, Xun Yi. Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
33 -- 53Anirban Sengupta, Chandan Mazumdar. A Mark-Up Language for the Specification of Information Security Governance Requirements
54 -- 60Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao. On the Security of Self-Certified Public Keys

Volume 5, Issue 1

1 -- 13Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz, Hossein Jahankhani. A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment
14 -- 32Archana Bhattarai, Dipankar Dasgupta. A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis
33 -- 49Ioana Lasc, Reiner Dojen, Tom Coffey. A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications
50 -- 66Garry L. White, Francis A. Mendez Mediavilla, Jaymeen R. Shah. Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers