Journal: Information Systems Security

Volume 28, Issue 4-5

107 -- 119Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi. Sinkhole+CloneID: A hybrid attack on RPL performance and detection method
120 -- 126Karima Djebaili, Lamine Melkemi. Two dimensional ElGamal public key cryptosystem
127 -- 135Rita Ismailova, Gulshat Muhametjanova, Tunç Durmus Medeni, Ihsan Tolga Medeni, Demet Soylu, Omar Azimbek Dossymbekuly. Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan
136 -- 147Paul Joseph, Jasmine Norman. Forensic corpus data reduction techniques for faster analysis by eliminating tedious files