Journal: Information Systems Security

Volume 30, Issue 6

309 -- 324Shani Raj, B. Arun Kumar, Prasanna Venkatesan G. K. D. A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system
325 -- 341Sreeparna Chakrabarti, G. N. K. Suresh Babu. The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model
342 -- 358Ziaul Haque Choudhury, M. Munir Ahamed Rabbani. Facial blemishes detection and encryption with secure force algorithm into HCC2D code for biometric-passport
359 -- 370Md. Rashedul Islam, T. R. Tanni, S. Parvin, M. J. Sultana, Ayasha Siddiqa. A modified LSB image steganography method using filtering algorithm and stream of password
371 -- 383Suhad Muhajer Kareem, Abdul Monem S. Rahma. New method for improving add round key in the advanced encryption standard algorithm

Volume 30, Issue 5

257 -- 280Hiten Choudhury, Bidisha Goswami, Sameer Kumar Gurung. CovidChain: An Anonymity Preserving Blockchain Based Framework for Protection Against Covid-19
281 -- 293Malika Bendechache, Pintu Lohar, Guodong Xie, Rob Brennan, Ramona Trestian, Edoardo Celeste, Kristina Kapanova, Evgeniia Jayasekera, Irina Tal. Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study
294 -- 307Erik B. Korn, Douglas M. Fletcher, Erica M. Mitchell, Aryn A. Pyke, Steven M. Whitham. Jack pandemus - Cyber incident and emergency response during a pandemic

Volume 30, Issue 4

189 -- 204Osamah M. Al-Matari, Iman M. A. Helal, Sherif A. Mazen, Sherif Elhennawy. Integrated framework for cybersecurity auditing
205 -- 218Tianyu Wang, Li-Chiou Chen, Yegin Genc. A dictionary-based method for detecting machine-generated domains
219 -- 234Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda. Fast secure matrix multiplications over ring-based homomorphic encryption
235 -- 256Ibrahim Ali Alnajjar, Massudi Mahmuddin. Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment

Volume 30, Issue 3

125 -- 138Taban Habibu, Edith Talina Luhanga, Anael Elikana Sam. A study of users' compliance and satisfied utilization of biometric application system
139 -- 148Martti Lehto, Jarno Limnéll. Strategic leadership in cyber security, case Finland
149 -- 159Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah. Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization
160 -- 172Siva Reddy Sonti, Mutchakayala Siva Ganga Prasad. Improved Whale Optimization Algorithm and Convolutional neural network based Cooperative Spectrum Sensing in Cognitive Radio Networks
173 -- 187Jacques Bou Abdo, Sherali Zeadally. Neural network-based blockchain decision scheme

Volume 30, Issue 2

63 -- 87Sachin Dhawan, Rashmi Gupta. Analysis of various data security techniques of steganography: A survey
88 -- 99Yegin Genc, Harpreet Kour, Hasan T. Arslan, Li-Chiou Chen. Understanding Nigerian e-mail scams: A computational content analysis approach
100 -- 110Christian Graham. Fear of the unknown with healthcare IoT devices: An exploratory study
111 -- 124Jennifer Batamuliza, Damien Hanyurwimfura. Identity based encryption with equality test

Volume 30, Issue 1

1 -- 18Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Rasim Sh. Mahmudov, Ramiz M. Aliguliyev. Information security as a national security component
19 -- 29Wenchao Cui, Qiong Lu, Asif Moin Qureshi, Wei Li 0100, Kehe Wu. An adaptive LeNet-5 model for anomaly detection
30 -- 56Richard Charles Hornberger. Creating a sense of digital privacy in the private sector
57 -- 61Ibrahim F. Elashry. Cryptanalysis of Jain-Singh's identity-based RSA encryption