EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 19, issue 1, 2025

FUR-HABE: A Hierarchical CP-ABE Scheme With Traceable Fine-Grained User Revocation for Cloud Storage pp. 1-25 Downloads
Xiaohui Yang and Ya'nan Tao
A Novel Method of Correlated Laplace Noise Generation for Differential Privacy on Time-Series Data pp. 1-27 Downloads
Lihui Mao and Zhengquan Xu
‘The Way to Be Safe Is Never to Be Secure': Security of ePHI in South African Hospitals pp. 1-21 Downloads
Kabelo Given Chuma and Mpho Ngoepe
Legal Privacy Protection Machine Learning Method Based on Word2Vec Algorithm pp. 1-19 Downloads
Rongrong Wang

Volume 18, issue 1, 2024

Enhancing Legal Protection of Children's Rights in the “Internet Plus” pp. 1-17 Downloads
Binjing Li and Wendong Yu
Network Information Security Monitoring Under Artificial Intelligence Environment pp. 1-24 Downloads
Longfei Fu, Yibin Liu, Yanjun Zhang and Ming Li
Application of Machine Learning Models for Malware Classification With Real and Synthetic Datasets pp. 1-23 Downloads
Santosh Joshi, Alexander Perez Pons, Shrirang Ambaji Kulkarni and Himanshu Upadhyay
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion pp. 1-15 Downloads
Zhiqiang Wu
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training pp. 1-28 Downloads
Yuan Tian, Wendong Wang and Jingyuan He
Assessing Employee Susceptibility to Cybersecurity Risks pp. 1-25 Downloads
Rafael Martínez-Peláez, Pablo Velarde-Alvarado, Vanessa G. Félix, Alberto Ochoa-Brust, Rodolfo Ostos and Luis J. Mena
RSA and Elliptic Curve Encryption System: A Systematic Literature Review pp. 1-27 Downloads
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba and Ayodele Ariyo Adebiyi
Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection pp. 1-26 Downloads
Zhijie Fan, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng and Xin Li
A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection pp. 1-20 Downloads
Yaping Zhang
Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights pp. 1-14 Downloads
Fares Alharbi, Gautam Siddharth Kashyap and Budoor Ahmad Allehyani
VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs pp. 1-21 Downloads
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu and Han-Bing Yan
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy pp. 1-19 Downloads
Dongyan Zhang, Lili Zhang, Zhiyong Zhang and Zhongya Zhang

Volume 17, issue 1, 2023

“Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption pp. 1-27 Downloads
Chuyi Yan, Haixia Xu and Peili Li
Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks pp. 1-14 Downloads
Xinqiang Wang and Wenhuan Lu
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN pp. 1-18 Downloads
Mallanagouda Biradar and Basavaraj Mathapathi
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors pp. 1-23 Downloads
Mathew Nicho, Christopher D. McDermott, Hussein Fakhry and Shini Girija
Trajectory Data Publication Based on Differential Privacy pp. 1-15 Downloads
Zhen Gu and Guoyin Zhang
Trust and Voice Biometrics Authentication for Internet of Things pp. 1-28 Downloads
Alec Wells and Aminu Bello Usman
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies pp. 1-25 Downloads
Ali Alibeigi, Abu Bakar Munir and Adeleh Asemi
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures pp. 1-22 Downloads
Suman Thapaliya and Pawan Kumar Sharma
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm pp. 1-16 Downloads
Sangita Baruah, Dhruba Jyoti Borah and Vaskar Deka
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security pp. 1-17 Downloads
Sabrine Ennaji, Nabil El Akkad and Khalid Haddouch

Volume 16, issue 2, 2022

Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption pp. 1-15 Downloads
Priyadharshini K. and Aroul Canessane R.
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology pp. 1-18 Downloads
Anjana S. Chandran
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model pp. 1-19 Downloads
Chakka S. V. V. S. N. Murty, G. P. Saradhi Varma and Chakravarthy A. S. N.
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities pp. 1-20 Downloads
Bin Fang
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set pp. 1-17 Downloads
Santhoshkumar K. and Suganthi P.
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN pp. 1-16 Downloads
Kusuma S. M., Veena K. N. and Varun B. V.
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN pp. 1-22 Downloads
Leelalakshmi S. and Rameshkumar K.
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data pp. 1-13 Downloads
Kimmi Kumari and Mrunalini M.

Volume 16, issue 1, 2022

Dynamic Warnings: An Eye Gaze-Based Approach pp. 1-28 Downloads
Mini Zeng, Feng Zhu and Sandra Carpenter
Machine Learning Interpretability to Detect Fake Accounts in Instagram pp. 1-25 Downloads
Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil and Anand Nayyar
AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks pp. 1-31 Downloads
Monica Malik, Khushi Gandhi and Bhawna Narwal
Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification pp. 1-44 Downloads
Bharath M. R. and Radhakrishna Rao K. A.
A Proposal Phishing Attack Detection System on Twitter pp. 1-27 Downloads
kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani and Yassine Ramdane
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile pp. 1-38 Downloads
Boubakeur Annane and Alti Adel
Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication pp. 1-20 Downloads
Danish Ahamad, Md Mobin Akhtar, Shabi Alam Hameed and Mahmoud Mohammad Mahmoud Al Qerom
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm pp. 1-21 Downloads
Ankit Rajeshkumar Kharwar and Devendra V. Thakor
A Quantitative Method for Measuring Health of Authoritative Name Servers pp. 1-19 Downloads
Sanjay Adiwal, Balaji Rajendran and Pushparaj Shetty D.
Deep Ensemble Model for Detecting Attacks in Industrial IoT pp. 1-29 Downloads
Bibhuti Bhusana Behera, Binod Kumar Pattanayak and Rajani Kanta Mohanty
Network Anomalies Detection Approach Based on Weighted Voting pp. 1-17 Downloads
Sergey Sakulin, Alexander Alfimtsev, Konstantin Kvitchenko, Leonid Dobkacz, Yuri Kalgin and Igor Lychkov
Real-Time Cyber Analytics Data Collection Framework pp. 1-10 Downloads
Herbert Maosa, Karim Ouazzane and Viktor Sowinski-Mydlarz
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection pp. 1-18 Downloads
Abdallah Soualmi, Adel Alti and Lamri Laouamer
Lightweight VLSI Architectures for Image Encryption Applications pp. 1-23 Downloads
A. Prathiba, Suyash Vardhan Srivathshav, Ramkumar P. E., Rajkamal E. and Kanchana Bhaaskaran V. S.
Anomaly Detection Using System Logs: A Deep Learning Approach pp. 1-15 Downloads
Rohit Sinha, Rittika Sur, Ruchi Sharma and Avinash K. Shrivastava
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics pp. 1-26 Downloads
M. D. J. S. Goonetillake, Rangana Jayashanka and S. V. Rathnayaka
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities pp. 1-14 Downloads
Romil Rawat, Vinod Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla and Megha Kuliha
Fractals for Internet of Things Network Structure Planning pp. 1-12 Downloads
Alexander Paramonov, Evgeny Tonkikh, Ammar Muthanna, Ibrahim A. Elgendy and Andrey Koucheryavy
Privacy Disclosure in the Real World: An Experimental Study pp. 1-22 Downloads
Siyu Wang, Nafei Zhu, Jingsha He, Da Teng and Yue Yang
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments pp. 1-16 Downloads
Anderson Aparecido Alves da Silva, Leonardo Santos Silva, Erica Leandro Bezerra, Adilson Eduardo Guelfi, Claudia de Armas, Marcelo Teixeira de Azevedo and Sergio Takeo Kofuji
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network pp. 1-24 Downloads
Erukala Suresh Babu, B. K. N. Srinivasarao, Ilaiah Kavati and Mekala Srinivasa Rao
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection pp. 1-32 Downloads
Nitin O. Mathur, Chengcheng Li, Bilal Gonen and Kijung Lee
Page updated 2025-06-14