researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJISP
Home
Index
Info
Volume
Volume
7
, Issue
4
1
--
10
Shadi R. Masadeh
,
Shadi Aljawarneh
,
Ashraf Odeh
,
Abdullah Alhaj
.
Secure Communication: A Proposed Public Key Watermark System
11
--
21
K. Saravanan
,
A. Senthilkumar
.
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design
22
--
36
Francis Akowuah
,
Xiaohong Yuan
,
Jinsheng Xu
,
Hong Wang
.
A Survey of Security Standards Applicable to Health Information Systems
37
--
52
Srinivasa K. G.
.
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines
53
--
74
Salima Hacini
,
Zahia Guessoum
,
Mohamed Cheikh
.
False Alarm Reduction Using Adaptive Agent-Based Profiling
Volume
7
, Issue
3
1
--
15
Omar Banimelhem
,
Lo'ai Ali Tawalbeh
,
Moad Mowafi
,
Mohammed Al-Batati
.
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm
16
--
35
Daniela Simic-Draws
,
Stephan Neumann
,
Anna Kahlert
,
Philipp Richter
,
Rüdiger Grimm
,
Melanie Volkamer
,
Alexander Roßnagel
.
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
36
--
52
Esraa Omran
,
Tyrone Grandison
,
David Nelson
,
Albert Bokma
.
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
53
--
67
Michele Tomaiuolo
.
dDelega: Trust Management for Web Services
Volume
7
, Issue
2
1
--
28
Katharina Bräunlich
,
Rüdiger Grimm
.
Development of A Formal Security Model for Electronic Voting Systems
29
--
43
Ammar Alazab
,
Michael Hobbs
,
Jemal Abawajy
,
Ansam Khraisat
.
Malware Detection and Prevention System Based on Multi-Stage Rules
44
--
56
Siddharth Singh
,
Tanveer J. Siddiqui
.
Robust Image Data Hiding Technique for Copyright Protection
57
--
85
Khaoula Marzouki
,
Amira Radhouani
,
Narjes Ben Rajeb
.
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol
Volume
7
, Issue
1
1
--
15
Nigel J. Martin
,
John L. Rice
.
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users
16
--
29
Satya Prakash
,
Abhishek Vaish
,
Natalie Coull
,
SaravanaKumar G
,
T. N. Srinidhi
,
Jayaprasad Botsa
.
Child Security in Cyberspace Through Moral Cognition
30
--
44
Mathews Z. Nkhoma
,
Duy P. T. Dang
.
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach
45
--
62
Ousmane Amadou Dia
,
Csilla Farkas
.
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes
63
--
75
Walid Y. Zibideh
,
Mustafa M. Matalgah
.
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time