Journal: IJISP

Volume 7, Issue 4

1 -- 10Shadi R. Masadeh, Shadi Aljawarneh, Ashraf Odeh, Abdullah Alhaj. Secure Communication: A Proposed Public Key Watermark System
11 -- 21K. Saravanan, A. Senthilkumar. Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design
22 -- 36Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang. A Survey of Security Standards Applicable to Health Information Systems
37 -- 52Srinivasa K. G.. An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines
53 -- 74Salima Hacini, Zahia Guessoum, Mohamed Cheikh. False Alarm Reduction Using Adaptive Agent-Based Profiling

Volume 7, Issue 3

1 -- 15Omar Banimelhem, Lo'ai Ali Tawalbeh, Moad Mowafi, Mohammed Al-Batati. A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm
16 -- 35Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel. Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
36 -- 52Esraa Omran, Tyrone Grandison, David Nelson, Albert Bokma. A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
53 -- 67Michele Tomaiuolo. dDelega: Trust Management for Web Services

Volume 7, Issue 2

1 -- 28Katharina Bräunlich, Rüdiger Grimm. Development of A Formal Security Model for Electronic Voting Systems
29 -- 43Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat. Malware Detection and Prevention System Based on Multi-Stage Rules
44 -- 56Siddharth Singh, Tanveer J. Siddiqui. Robust Image Data Hiding Technique for Copyright Protection
57 -- 85Khaoula Marzouki, Amira Radhouani, Narjes Ben Rajeb. Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol

Volume 7, Issue 1

1 -- 15Nigel J. Martin, John L. Rice. Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users
16 -- 29Satya Prakash, Abhishek Vaish, Natalie Coull, SaravanaKumar G, T. N. Srinidhi, Jayaprasad Botsa. Child Security in Cyberspace Through Moral Cognition
30 -- 44Mathews Z. Nkhoma, Duy P. T. Dang. Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach
45 -- 62Ousmane Amadou Dia, Csilla Farkas. Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
63 -- 75Walid Y. Zibideh, Mustafa M. Matalgah. Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time