Journal: Information Systems Security

Volume 29, Issue 6

267 -- 283Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi-Alli, Adebola Olayinka Adekunle, Joseph Bamidele Awotunde. Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
284 -- 296Yuancheng Li, Haiyan Hou, Wenping Chen. A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
297 -- 309Ali Cherif Khalfallah, Naima Hadj-Said, Ali Pacha Adda. A new chaotic encrypted image based on the trigonometric circle
310 -- 326Abdalla Alameen, Ashu Gupta. Fitness rate-based rider optimization enabled for optimal task scheduling in cloud
327 -- 340Samir Chabbi, Rachid Boudour, Fouzi Semchedine, Djalel Chefrour. Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone
341 -- 365Zakaria Hassan Abdelwahab, Talaat A. Elgarf, Abdelhalim Zekry. Approved algorithmic security enhancement of stream cipher for advanced mobile communications
366 -- 381Thakkalapally Preethi, B. B. Amberker. Lattice-based group signature scheme without random oracle

Volume 29, Issue 5

209 -- 219Ogechukwu N. Iloanusi, Ugochi C. Ejiogu. Gender classification from fused multi-fingerprint types
220 -- 243Francesco Bergadano, Milena Boetti, Fabio Cogno, Valerio Costamagna, Mario Leone, Marco Evangelisti. A modular framework for mobile security analysis
244 -- 249Samaneh Mashhadi. Toward a formal proof for multi-secret sharing in the random oracle model
250 -- 266Ashutosh Bahuguna, Raj Kishor Bisht, Jeetendra Pande. Country-level cybersecurity posture assessment: Study and analysis of practices

Volume 29, Issue 4

155 -- 168Sanaj Ms, Joe Prathap P. M, Valanto Alappatt. Profit maximization based task scheduling in hybrid clouds using whale optimization technique
169 -- 182Nanta Janpitak, Woraphon Lilakiatsakun, Chanboon Sathitwiriyawong. The novel secure testament methodology for cryptocurrency wallet using mnemonic seed
183 -- 198Charu Gupta, Rakesh Kumar Singh, Amar Kumar Mohapatra. A survey and classification of XML based attacks on web applications
199 -- 208Akshay Gajanan Bhosale, Vikram Shripati Patil. A (2, 2) Visual Cryptography Technique with Improved Contrast

Volume 29, Issue 3

103 -- 117Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp. Convolutional neural networks for image spam detection
118 -- 133Mahsa Nooribakhsh, Mahdi MollaMotalebi. A review on statistical approaches for anomaly detection in DDoS attacks
134 -- 153Priyansh Singh, Shashikala Tapaswi, Sanchit Gupta. Malware Detection in PDF and Office Documents: A survey

Volume 29, Issue 2

51 -- 61Alka Gupta, Lalit Sen Sharma. Detecting attacks in high-speed networks: Issues and solutions
62 -- 72Shravani Mahesh Patil, B. R. Purushothama. DR-PRE: dual receiver proxy re-encryption scheme
73 -- 90Debojit Boro, Mrinmoy Haloi, Dhruba K. Bhattacharyya. A fast self-similarity matrix-based method for shrew DDoS attack detection
91 -- 101Prema T. Akkasaligar, Sumangala Biradar. Selective medical image encryption using DNA cryptography

Volume 29, Issue 1

1 -- 13Vankamamidi Srinivasa Naresh, Reddi Sivaranjani, Nistala V. E. S. Murthy. Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie-Hellman for wireless sensor networks
14 -- 29Junaid Latief Shah, Heena Farooq Bhat. Towards a Secure IPv6 Autoconfiguration
30 -- 39Farah Deeba, Kun She 0001, Fayaz Ali Dharejo, Hira Memon. Digital image watermarking based on ANN and least significant bit
40 -- 50Mukesh Dalal, mamta juneja. Evaluation of orthogonal and biorthogonal wavelets for video steganography