Journal: Information Systems Security

Volume 32, Issue 6

401 -- 416Lovi Dhamija, Urvashi Garg. An adaptive randomized and secured approach against adversarial attacks
417 -- 429Ramadan Dervishi, Vehbi Neziri, Blerim Rexha. Transactions privacy on blockchain using web of trust concept
430 -- 443Puvvada Nagesh, N. Srinivasu. Modeling an efficient authentic provable data possession model using legacy filter model for IOT and cloud environment
444 -- 468Suruchi Karnani, Harish Kumar Shakya. Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
469 -- 480Dan Bouhnik, Achia Admoni. "We had no homefront": another piece of the U.S part in the information warfare story
481 -- 493Mohammed Safy Elwan, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan. Intelligent security sanitizing gate

Volume 32, Issue 5

315 -- 330Kante Ramesh, Mohanasundram R. Analysis of web data classification methods based on semantic similarity measure
331 -- 346Sunita Usturge, T. Pavan Kumar. DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot
347 -- 370Sabina Barakovic, Jasmina Barakovic Husic. Cyber hygiene knowledge, awareness, and behavioral practices of university students
371 -- 382Filippos Giannakas, Christos Troussas, Akrivi Krouska, Ioannis Voyiatzis, Cleo Sgouropoulou. Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack
383 -- 400Nayana Hegde, Sunilkumar S. Manvi, Harjinder Singh Lallie 0001. Secure search scheme for encrypted data in the VANET cloud with random query trapdoor

Volume 32, Issue 4

227 -- 251Barnali Gupta Banik, Abhinandan Banik. Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video
252 -- 265Mohammed Nasereddin, Ashaar ALKhamaiseh, Malik Qasaimeh, Raad S. Al-Qassas. A systematic review of detection and prevention techniques of SQL injection attacks
266 -- 282Ourania Koutzampasopoulou Xanthidou, Dimitrios Xanthidis, Christos Manolas, Han-I Wang. Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman
283 -- 296Reza Hooshmand, Alireza Jafari, Gholamreza Karamali. Id-PC: An Identification Scheme based on Polar Codes
297 -- 313Paul A. Wortman, John A. Chandy. Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk

Volume 32, Issue 3

163 -- 172Samaneh Mashhadi. Game-based security proofs for verifiable secret sharing schemes in the standard model
173 -- 186Bilal Akhtar, Ammar Masood. Security analysis and enhancements of UAS architecture
187 -- 211M. Naim, A. Ali-Pacha. New chaotic satellite image encryption by using some or all the rounds of the AES algorithm
212 -- 226Naib Rabiaa, Ali Cherif Moussa, boukli hacene sofiane. A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks

Volume 32, Issue 2

59 -- 75A. Hadj Brahim, Adda Ali-Pacha, Naima Hadj-Said. A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
76 -- 119Dhruti Sharma. Searchable encryption : A survey
120 -- 133Elmarie Kritzinger, Adéle da Veiga, Wynand van Staden. Measuring organizational information security awareness in South Africa
134 -- 161Lampis Alevizos, Eliana Stavrou. Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS)

Volume 32, Issue 1

1 -- 20Deepali Bankatsingh Gothawal, S. V. Nagaraj. An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model
21 -- 38Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal, Lina Ben-Abdelatif, Maroua Ouaked. Implementing a secure remote patient monitoring system
39 -- 57Faozi A. Almaqtari, Najib H. S. Farhan, Ali T. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim. The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan