researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
32
, Issue
6
401
--
416
Lovi Dhamija
,
Urvashi Garg
.
An adaptive randomized and secured approach against adversarial attacks
417
--
429
Ramadan Dervishi
,
Vehbi Neziri
,
Blerim Rexha
.
Transactions privacy on blockchain using web of trust concept
430
--
443
Puvvada Nagesh
,
N. Srinivasu
.
Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment
444
--
468
Suruchi Karnani
,
Harish Kumar Shakya
.
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
469
--
480
Dan Bouhnik
,
Achia Admoni
.
"We had no homefront": another piece of the U.S part in the information warfare story
481
--
493
Mohammed Safy Elwan
,
Amira Salem
,
Hossam Fawky
,
Ahmed Mahmoud ramadan
.
Intelligent security sanitizing gate
Volume
32
, Issue
5
315
--
330
Kante Ramesh
,
Mohanasundram R
.
Analysis of web data classification methods based on semantic similarity measure
331
--
346
Sunita Usturge
,
T. Pavan Kumar
.
DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot
347
--
370
Sabina Barakovic
,
Jasmina Barakovic Husic
.
Cyber hygiene knowledge, awareness, and behavioral practices of university students
371
--
382
Filippos Giannakas
,
Christos Troussas
,
Akrivi Krouska
,
Ioannis Voyiatzis
,
Cleo Sgouropoulou
.
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack
383
--
400
Nayana Hegde
,
Sunilkumar S. Manvi
,
Harjinder Singh Lallie 0001
.
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor
Volume
32
, Issue
4
227
--
251
Barnali Gupta Banik
,
Abhinandan Banik
.
Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video
252
--
265
Mohammed Nasereddin
,
Ashaar ALKhamaiseh
,
Malik Qasaimeh
,
Raad S. Al-Qassas
.
A systematic review of detection and prevention techniques of SQL injection attacks
266
--
282
Ourania Koutzampasopoulou Xanthidou
,
Dimitrios Xanthidis
,
Christos Manolas
,
Han-I Wang
.
Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman
283
--
296
Reza Hooshmand
,
Alireza Jafari
,
Gholamreza Karamali
.
Id-PC: An Identification Scheme based on Polar Codes
297
--
313
Paul A. Wortman
,
John A. Chandy
.
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk
Volume
32
, Issue
3
163
--
172
Samaneh Mashhadi
.
Game-based security proofs for verifiable secret sharing schemes in the standard model
173
--
186
Bilal Akhtar
,
Ammar Masood
.
Security analysis and enhancements of UAS architecture
187
--
211
M. Naim
,
A. Ali-Pacha
.
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm
212
--
226
Naib Rabiaa
,
Ali Cherif Moussa
,
boukli hacene sofiane
.
A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks
Volume
32
, Issue
2
59
--
75
A. Hadj Brahim
,
Adda Ali-Pacha
,
Naima Hadj-Said
.
A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
76
--
119
Dhruti Sharma
.
Searchable encryption : A survey
120
--
133
Elmarie Kritzinger
,
Adéle da Veiga
,
Wynand van Staden
.
Measuring organizational information security awareness in South Africa
134
--
161
Lampis Alevizos
,
Eliana Stavrou
.
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)
Volume
32
, Issue
1
1
--
20
Deepali Bankatsingh Gothawal
,
S. V. Nagaraj
.
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model
21
--
38
Othmane Nait Hamoud
,
Tayeb Kenaza
,
Yacine Challal
,
Lina Ben-Abdelatif
,
Maroua Ouaked
.
Implementing a secure remote patient monitoring system
39
--
57
Faozi A. Almaqtari
,
Najib H. S. Farhan
,
Ali T. Yahya
,
Borhan Omar Ahmad Al-Dalaien
,
Mohd Shamim
.
The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan