Journal: Information Systems Security

Volume 25, Issue 4-6

151 -- 161George Hatzivasilis, George Floros, Ioannis Papaefstathiou, Charalampos Manifavas. Lightweight authenticated encryption for embedded on-chip systems
162 -- 179Rafik Hamza, Faiza Titouna. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
180 -- 190Vishnu Venukumar, Vinod Pathari. A survey of applications of threshold cryptography - proposed and practiced
191 -- 196Milad Taleby Ahvanooey, Hassan Dana Mazraeh, Seyed Hashem Tabasi. An innovative technique for web text watermarking (AITW)
197 -- 212Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
213 -- 234D. C. Mishra, R. K. Sharma. An approach for security of color image data in coordinate, geometric, and frequency domains
235 -- 246R. Ranjith Kumar, S. Jayasudha, S. Pradeep. Efficient and secure data hiding in encrypted images: A new approach using chaos
247 -- 260Davneet Kaur, Sheetal Kalra. Five-tier barrier anti-phishing scheme using hybrid approach
261 -- 279Vedrana Krivokuca, Waleed H. Abdulla. Noninvertible fingerprint transforms: Categorization of design mechanisms and discussion of evaluation techniques
280 -- 294Zhiying Wang, Nianxin Wang, Xiang Su, Shilun Ge. Differentiated management strategies on cloud computing data security driven by data value

Volume 25, Issue 1-3

1 -- 17Tsung-Yi Chen, Hsiao-Chuan Shen. A network behavior evaluation method for improving interactive security in virtual network worlds
18 -- 31Nour Moustafa, Jill Slay. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
32 -- 38Rita Ismailova, Gulshat Muhametjanova. Cyber crime risk awareness in Kyrgyz Republic
39 -- 53Sanjay Sareen, Sandeep K. Sood, Sunil Kumar Gupta. Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme
54 -- 67Marcus A. Thompson, Michael J. Ryan, Jill Slay, Alan C. McLucas. Harmonized taxonomies for security and resilience
68 -- 82Zouheir Trabelsi. Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network
83 -- 93Jeyasingam Nivethan, Mauricio Papa. On the use of open-source firewalls in ICS/SCADA systems
94 -- 108Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell. Graphical One-Time Password (GOTPass): A usability evaluation
109 -- 123Vedrana Krivokuca, Waleed H. Abdulla. Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern
124 -- 135Maged H. Wafy. Visibility enhancements of gray and color images with size invariant visual cryptography
136 -- 150Junaid Latief Shah. A novel approach for securing IPv6 link local communication