Journal: Information Systems Security

Volume 28, Issue 6

149 -- 163N. B. Gayathri, Thumbur Gowri, P. Vasudeva Reddy. Secure and efficient certificateless aggregate signature scheme from bilinear pairings
164 -- 177Ashutosh Bahuguna, R. K. Bisht, Jeetendra Pande. Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context
178 -- 193Hossain Shahriar, Chi Zhang, Stephen Dunn, Robert Bronte, Atef Sahlan, Khaled Tarmissi. Mobile anti-phishing: Approaches and challenges

Volume 28, Issue 4-5

107 -- 119Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi. Sinkhole+CloneID: A hybrid attack on RPL performance and detection method
120 -- 126Karima Djebaili, Lamine Melkemi. Two dimensional ElGamal public key cryptosystem
127 -- 135Rita Ismailova, Gulshat Muhametjanova, Tunç Durmus Medeni, Ihsan Tolga Medeni, Demet Soylu, Omar Azimbek Dossymbekuly. Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan
136 -- 147Paul Joseph, Jasmine Norman. Forensic corpus data reduction techniques for faster analysis by eliminating tedious files

Volume 28, Issue 3

55 -- 80Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid. A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions
81 -- 106Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis. A comprehensive cybersecurity learning platform for elementary education

Volume 28, Issue 1-2

1 -- 19Shivi Garg, R. K. Singh, A. K. Mohapatra. Analysis of software vulnerability classification based on different technical parameters
20 -- 34Lanfranco Lopriore. Key management in wireless sensor networks
35 -- 45Milap J. Bhuva, Sanjay Singh. Symmetric key-based authenticated encryption protocol
46 -- 54Mikhail Styugin. Protection from reconnaissance for establishing information security systems