International Journal of Information Security and Privacy (IJISP)
2007 - 2026
Current editor(s): Yassine Maleh From IGI Global Scientific Publishing Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 20, issue 1, 2026
- A Blockchain-Based Cryptographic Framework for Secure, Private, and Traceable Digital Art Copyright Management pp. 1-16

- Jiang Lv and Jiuru Lin
Volume 19, issue 1, 2025
- FUR-HABE: A Hierarchical CP-ABE Scheme With Traceable Fine-Grained User Revocation for Cloud Storage pp. 1-25

- Xiaohui Yang and Ya'nan Tao
- A Novel Method of Correlated Laplace Noise Generation for Differential Privacy on Time-Series Data pp. 1-27

- Lihui Mao and Zhengquan Xu
- Data Privacy Regulations in the Gaming Industry: A Comparative Analysis of Singapore, Macau, and Japan pp. 1-12

- Miloslava Plachkinova
- Privacy Disclosure on Electronic Commerce: The Role of Algorithmic Transparency, Algorithmic Invasion, and Trust pp. 1-29

- Kai Gao, Shanji Yao, Yongmei Wang and Sihan Lyu
- Research on Optimization of Facial Expression Recognition Algorithm Based on Convolutional Neural Network and Support Vector Machine pp. 1-17

- Yuchi Yan
- Deep Learning-Based Intrusion Detection Systems: A Novel Approach Using Generative Adversarial Networks (GANs) pp. 1-15

- Mahdi Ajdani
- Ethical Boundary Between Network Security and Personal Privacy in the Era of Big Data pp. 1-18

- Tieguang Xu
- Leveled Homomorphic Encryption Based on NTRU Without Re-Linearization pp. 1-20

- Xiaokang Dai, Haoyong Wang, Wenyuan Wu and Yong Feng
- A Low Overhead, Fault-Tolerant, and Congestion-Aware Routing Algorithm Based on Bird Flocking Behavior for 3D-NoC Mesh pp. 1-23

- Ahmed Mesellem and Mohammed Mana
- Legal Privacy Protection Machine Learning Method Based on Word2Vec Algorithm pp. 1-19

- Rongrong Wang
- Minimal DFA With Optimization of Pattern Matching (MDFAOPM) for Network Traffic Analysis and Attacks pp. 1-24

- Krishna Kishore Thota and R. Jeberson Retna Raj
- ‘The Way to Be Safe Is Never to Be Secure': Security of ePHI in South African Hospitals pp. 1-21

- Kabelo Given Chuma and Mpho Ngoepe
Volume 18, issue 1, 2024
- An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training pp. 1-28

- Yuan Tian, Wendong Wang and Jingyuan He
- RSA and Elliptic Curve Encryption System: A Systematic Literature Review pp. 1-27

- Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba and Ayodele Ariyo Adebiyi
- Assessing Employee Susceptibility to Cybersecurity Risks pp. 1-25

- Rafael Martínez-Peláez, Pablo Velarde-Alvarado, Vanessa G. Félix, Alberto Ochoa-Brust, Rodolfo Ostos and Luis J. Mena
- A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection pp. 1-20

- Yaping Zhang
- Enhancing Legal Protection of Children's Rights in the “Internet Plus” pp. 1-17

- Binjing Li and Wendong Yu
- An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion pp. 1-15

- Zhiqiang Wu
- Adaptive Personalized Randomized Response Method Based on Local Differential Privacy pp. 1-19

- Dongyan Zhang, Lili Zhang, Zhiyong Zhang and Zhongya Zhang
- Application of Machine Learning Models for Malware Classification With Real and Synthetic Datasets pp. 1-23

- Santosh Joshi, Alexander Perez Pons, Shrirang Ambaji Kulkarni and Himanshu Upadhyay
- Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights pp. 1-14

- Fares Alharbi, Gautam Siddharth Kashyap and Budoor Ahmad Allehyani
- VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs pp. 1-21

- Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu and Han-Bing Yan
- Network Information Security Monitoring Under Artificial Intelligence Environment pp. 1-24

- Longfei Fu, Yibin Liu, Yanjun Zhang and Ming Li
- Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection pp. 1-26

- Zhijie Fan, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng and Xin Li
Volume 17, issue 1, 2023
- Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN pp. 1-18

- Mallanagouda Biradar and Basavaraj Mathapathi
- Trajectory Data Publication Based on Differential Privacy pp. 1-15

- Zhen Gu and Guoyin Zhang
- i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security pp. 1-17

- Sabrine Ennaji, Nabil El Akkad and Khalid Haddouch
- A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors pp. 1-23

- Mathew Nicho, Christopher D. McDermott, Hussein Fakhry and Shini Girija
- Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures pp. 1-22

- Suman Thapaliya and Pawan Kumar Sharma
- Trust and Voice Biometrics Authentication for Internet of Things pp. 1-28

- Alec Wells and Aminu Bello Usman
- “Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption pp. 1-27

- Chuyi Yan, Haixia Xu and Peili Li
- Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies pp. 1-25

- Ali Alibeigi, Abu Bakar Munir and Adeleh Asemi
- Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks pp. 1-14

- Xinqiang Wang and Wenhuan Lu
- Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm pp. 1-16

- Sangita Baruah, Dhruba Jyoti Borah and Vaskar Deka
Volume 16, issue 2, 2022
- Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology pp. 1-18

- Anjana S. Chandran
- Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities pp. 1-20

- Bin Fang
- Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption pp. 1-15

- Priyadharshini K. and Aroul Canessane R.
- AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set pp. 1-17

- Santhoshkumar K. and Suganthi P.
- Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN pp. 1-22

- Leelalakshmi S. and Rameshkumar K.
- Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model pp. 1-19

- Chakka S. V. V. S. N. Murty, G. P. Saradhi Varma and Chakravarthy A. S. N.
- A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN pp. 1-16

- Kusuma S. M., Veena K. N. and Varun B. V.
- A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data pp. 1-13

- Kimmi Kumari and Mrunalini M.
Volume 16, issue 1, 2022
- Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics pp. 1-26

- M. D. J. S. Goonetillake, Rangana Jayashanka and S. V. Rathnayaka
- An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm pp. 1-21

- Ankit Rajeshkumar Kharwar and Devendra V. Thakor
- A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments pp. 1-16

- Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo and Sergio Takeo Kofuji
- Lightweight VLSI Architectures for Image Encryption Applications pp. 1-23

- A. Prathiba, Suyash Vardhan Srivathshav, Ramkumar P. E., Rajkamal E. and Kanchana Bhaaskaran V. S.
- Privacy Disclosure in the Real World: An Experimental Study pp. 1-22

- Siyu Wang, Nafei Zhu, Jingsha He, Da Teng and Yue Yang
- A Quantitative Method for Measuring Health of Authoritative Name Servers pp. 1-19

- Sanjay Adiwal, Balaji Rajendran and Pushparaj Shetty D.
- Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication pp. 1-20

- Danish Ahamad, Md Mobin Akhtar, Shabi Alam Hameed and Mahmoud Mohammad Mahmoud Al Qerom
- An Imperceptible Watermarking Scheme for Medical Image Tamper Detection pp. 1-18

- Abdallah Soualmi, Adel Alti and Lamri Laouamer
- Anomaly Detection Using System Logs: A Deep Learning Approach pp. 1-15

- Rohit Sinha, Rittika Sur, Ruchi Sharma and Avinash K. Shrivastava
- Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification pp. 1-44

- Bharath M. R. and Radhakrishna Rao K. A.
- Fractals for Internet of Things Network Structure Planning pp. 1-12

- Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy and Andrey Koucheryavy
- Deep Ensemble Model for Detecting Attacks in Industrial IoT pp. 1-29

- Bibhuti Bhusana Behera, Binod Kumar Pattanayak and Rajani Kanta Mohanty
- Dynamic Warnings: An Eye Gaze-Based Approach pp. 1-28

- Mini Zeng, Feng Zhu and Sandra Carpenter
- Real-Time Cyber Analytics Data Collection Framework pp. 1-10

- Herbert Maosa, Karim Ouazzane and Viktor Sowinski-Mydlarz
- Machine Learning Interpretability to Detect Fake Accounts in Instagram pp. 1-25

- Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil and Anand Nayyar
- Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection pp. 1-32

- Nitin O. Mathur, Chengcheng Li, Bilal Gonen and Kijung Lee
- Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network pp. 1-24

- Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati and Mekala Srinivasa Rao
- Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities pp. 1-14

- Romil Rawat, Vinod Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla and Megha Kuliha
- Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile pp. 1-38

- Boubakeur Annane and Alti Adel
- Network Anomalies Detection Approach Based on Weighted Voting pp. 1-17

- Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin and Igor Lychkov
- AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks pp. 1-31

- Monica Malik, Khushi Gandhi and Bhawna Narwal
- A Proposal Phishing Attack Detection System on Twitter pp. 1-27

- kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani and Yassine Ramdane
| |