researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
28
, Issue
6
149
--
163
N. B. Gayathri
,
Thumbur Gowri
,
P. Vasudeva Reddy
.
Secure and efficient certificateless aggregate signature scheme from bilinear pairings
164
--
177
Ashutosh Bahuguna
,
R. K. Bisht
,
Jeetendra Pande
.
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
178
--
193
Hossain Shahriar
,
Chi Zhang
,
Stephen Dunn
,
Robert Bronte
,
Atef Sahlan
,
Khaled Tarmissi
.
Mobile anti-phishing: Approaches and challenges
Volume
28
, Issue
4-5
107
--
119
Sayed Mohammad Hossein Mirshahjafari
,
Behrouz Shahgholi Ghahfarokhi
.
Sinkhole+CloneID: A hybrid attack on RPL performance and detection method
120
--
126
Karima Djebaili
,
Lamine Melkemi
.
Two dimensional ElGamal public key cryptosystem
127
--
135
Rita Ismailova
,
Gulshat Muhametjanova
,
Tunç Durmus Medeni
,
Ihsan Tolga Medeni
,
Demet Soylu
,
Omar Azimbek Dossymbekuly
.
Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan
136
--
147
Paul Joseph
,
Jasmine Norman
.
Forensic corpus data reduction techniques for faster analysis by eliminating tedious files
Volume
28
, Issue
3
55
--
80
Akhyari Nasir
,
Ruzaini Abdullah Arshah
,
Mohd Rashid Ab Hamid
.
A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions
81
--
106
Filippos Giannakas
,
Andreas Papasalouros
,
Georgios Kambourakis
,
Stefanos Gritzalis
.
A comprehensive cybersecurity learning platform for elementary education
Volume
28
, Issue
1-2
1
--
19
Shivi Garg
,
R. K. Singh
,
A. K. Mohapatra
.
Analysis of software vulnerability classification based on different technical parameters
20
--
34
Lanfranco Lopriore
.
Key management in wireless sensor networks
35
--
45
Milap J. Bhuva
,
Sanjay Singh
.
Symmetric key-based authenticated encryption protocol
46
--
54
Mikhail Styugin
.
Protection from reconnaissance for establishing information security systems