Journal: J. Internet Serv. Inf. Secur.

Volume 12, Issue 4

84 -- 101V. Hemasree, Dr. K. Sundeep Kumar. Facial Skin Texture and Distributed Dynamic Kernel Support Vector Machine (DDKSVM) Classifier for Age Estimation in Facial Wrinkles
102 -- 115Nana Kwame Gyamfi, Nikolaj Goranin, Dainius Ceponis, Antanas Cenys. Malware Detection Using Convolutional Neural Network, A Deep Learning Framework: Comparative Analysis
116 -- 125Saahira Ahamed, Ebtesam Shadadi, Latifah Alamer, Mousa Khubrani. Deep Anomaly Net: Detecting Moving Object Abnormal Activity Using Tensor Flow
126 -- 138Margret Anouncia Savarimuthu, Renita Raymond. Transformation Requirement Pattern for Capturing Data-Intensive Applications Requirements
139 -- 155Raúl A. Sánchez-Ancajima, Sarajane Marques Peres, Javier A. López-Céspedes, José L. Saly-Rosas-Solano, Ronald M. Hernández, Miguel A. Saavedra-López. Gesture Phase Segmentation Dataset: An Extension for Development of Gesture Analysis Models
156 -- 163P. Vijayan, P. Anbalagan, Selvakumar S. An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection
164 -- 176Musaddak M. Abdul Zahra, Laith A. Abdul-Rahaim. Performance of RoF-MMW-WDM Backhaul System based on Hybrid Optical OFDM Transportation Enabling 128-QAM Format for B5G Communication Networks
177 -- 196A. Radhika, M. Syed Masood. Crop Yield Prediction by Integrating Et-DP Dimensionality Reduction and ABP-XGBOOST Technique
197 -- 203Fata Nidaul Khasanah, Dhian Tyas Untari, David Nurmanto, Budi Satria, Tulus Sukreni, Timorora Sandha Perdhana. Beta Testing Techniques in Non-Functional Testing of Gamified Learning Applications for Lecture Learning Media During the Covid-19 Pandemic
204 -- 223R. Suganthi, K. Prabha. An Adaptive Density Peak Clustering with Swarm Intelligence Algorithm for Detection of Overlapping Communities in Social Networks
224 -- 237Manvitha Gali, Aditya Mahamkali. A Distributed Deep Meta Learning based Task Offloading Framework for Smart City Internet of Things with Edge-Cloud Computing
238 -- 245Sherin Eliyas, P. Ranjana. Gamification: Is E-next Learning's Big Thing
246 -- 256A. Sonya. A Data Integrity and Security Approach for Health Care Data in Cloud Environment

Volume 12, Issue 3

1 -- 15Md. Amiruzzaman, Mahnaz Rafia Islam, Md. Rajibul Islam, Rizal Mohd Nor. Analysis of COVID-19: An infectious disease spread
16 -- 29Jose-Luis Cabra, Carlos Parra 0001, Luis Trujillo. Earprint touchscreen sensoring comparison between hand-crafted features and transfer learning for smartphone authentication
30 -- 48Mi Hyeon Jeon, Sang Uk Shin. Blockchain-based fair and secure protocol for decentralized data trading
49 -- 62Jaewon Choi, XiuPing Zhang. Classifications of restricted web streaming contents based on convolutional neural network and long short-term memory (CNN-LSTM)
63 -- 75Anthony Cheuk Tung Lai, Ping Fan Ke, Kelvin Chan, Siu-Ming Yiu, Dongsun Kim, Wai-Kin Wong, Shuai Wang, Joseph Muppala, Alan Ho. RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks
76 -- 86Yousik Lee, Samuel Woo. Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics

Volume 12, Issue 2

1 -- 20Minhye Seo. Authentication for V2X Communication in an Open-Source Plug-and-Play Platform
21 -- 50Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragon. Emerging Cyber Security Challenges after COVID Pandemic: A Survey
51 -- 69Mumtahina Ahmed, Mohammad Shahadat Hossain, Raihan Ul Islam, Karl Andersson 0001. Explainable Text Classification Model for COVID-19 Fake News Detection
70 -- 94Pierre-Henri Thevenon, Sébastien Riou, Duc Minh Tran, Maxime Puys, Nikolaos Foivos Polychronou, Mustapha El-Majihi, Camille Sivelle. iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems
95 -- 114Alexander N. Ndife, Yodthong Mensin, Wattanapong Rakwichian, Paisarn Muneesawang. Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning
115 -- 125Ye Neung Kim, Seok Min Ko, Taeguen Kim. Hidden Markov Model based Anomaly Detection Method for In-vehicle Network

Volume 12, Issue 1

1 -- 0Ilsun You. 2022 Letter from the Editor-in-Chief
2 -- 25Jianhua Yang, Lixin Wang, Suhev Shakya. Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions
26 -- 43Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi. Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM
44 -- 56Ajung Im, Sandi Rahmadika, Yong-Hwan Lee, Bonam Kim, Ilsun You. A Note on Enactment of Blockchain for HACCP-based Cooperative Model
57 -- 71Ozan Akin, Umut Can Gulmez, Ozan Sazak, Osman Ufuk Yagmur, Pelin Angin. GreenSlice: An Energy-Efficient Secure Network Slicing Framework
72 -- 82Jongmo Kim, Kunyoung Kim, Gi-Yoon Jeon, Mye M. Sohn. Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogeneous Networks