International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 15, issue 4, 2021
- A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things pp. 1-17

- Anshuman Patel and Devesh Jinwala
- An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms pp. 18-30

- Om Prakash Samantray and Satya Narayan Tripathy
- A Model to Improve Security Questions Through Individualized Assistance pp. 31-53

- Andrew Mangle, Sandip Patel, Sanjay Bapna, XingXing Zu and David Gurzick
- Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals pp. 54-78

- Shuru Liu, Zhanlei Shang and Junwei Lei
- M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office – An Empirical Study pp. 79-97

- Ahmed Elmorshidy
- Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm pp. 98-117

- Priya C. V. and K. S. Angel Viji
- Image Encryption Algorithm Based on a Novel 4D Chaotic System pp. 118-131

- Sadiq A. Mehdi
Volume 15, issue 3, 2021
- DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment pp. 1-18

- Hongsong Chen, Caixia Meng and Jingjiu Chen
- Entropy-Based Quantification of Privacy Attained Through User Profile Similarity pp. 19-32

- Priti Jagwani and Saroj Kaushik
- A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies pp. 33-47

- Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah and Abdelmalek Azizi
- A New Combinational Technique in Image Steganography pp. 48-64

- Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay and Ramkrishna Ghosh
- VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks pp. 65-82

- Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi
- ADT: Anonymization of Diverse Transactional Data pp. 83-105

- Vartika Puri, Parmeet Kaur and Shelly Sachdeva
- SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data pp. 106-128

- Muraleedharan N. and Janet B.
Volume 15, issue 2, 2021
- An Improved Separable and Reversible Steganography in Encrypted Grayscale Images pp. 1-28

- Manisha Duevedi and Sunil Kumar Muttoo
- Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud pp. 29-52

- Shweta Kaushik and Charu Gandhi
- Steganography Technique Inspired by Rook pp. 53-67

- Abhishek Bansal and Vinay Kumar
- (p+, α, t)-Anonymity Technique Against Privacy Attacks pp. 68-86

- Sowmyarani C. N., Veena Gadad and Dayananda P.
- Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain pp. 87-112

- Randhir Kumar and Rakesh Tripathi
- Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO) pp. 113-130

- V. Sandeep, Saravanan Kondappan, Amir Anton Jone and Raj Barath S.
- DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors pp. 131-144

- Redha Taguelmimt and Rachid Beghdad
- Detecting DDoS Attacks in IoT Environment pp. 145-180

- Yasmine Labiod, Abdelaziz Amara Korba and Nacira Ghoualmi-Zine
- Assessing HIPAA Compliance of Open Source Electronic Health Record Applications pp. 181-195

- Hossain Shahriar, Hisham M. Haddad and Maryam Farhadi
- Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization pp. 196-216

- Suhas Bhagate and Prakash J. Kulkarni
Volume 15, issue 1, 2021
- A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network pp. 1-25

- Dung Hoang Le, Nguyen Thanh Vu and Tuan Dinh Le
- Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm pp. 26-43

- Sikha Bagui, Keenal M. Shah, Yizhi Hu and Subhash Bagui
- CSMCSM: Client-Server Model for Comprehensive Security in MANETs pp. 44-64

- Hatem Mahmoud Salama, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama and Khaled Mahmoud Badran
- IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms pp. 65-98

- Mhamed Zineddine
- Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making pp. 99-116

- Sarra Namane, Nassira Ghoualmi and Mustafa Kaiiali
- Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery pp. 117-137

- Salome James, Gowri Thumbur and Vasudeva Reddy P.
- Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System pp. 138-152

- Mohamed Abdou Souidi and Noria Taghezout
- Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks pp. 153-172

- Preetish Ranjan and Abhishek Vaish
- Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies pp. 173-189

- Rawan Baalous and Ronald Poet
- Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks pp. 190-212

- Peng Li, Chao Xu and He Xu
Volume 14, issue 4, 2020
- A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols pp. 1-21

- Noureddine Aribi and Yahia Lebbah
- An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System pp. 22-41

- S. Immaculate Shyla and S.S. Sujatha
- A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud pp. 42-56

- Mohamed Haddadi and Rachid Beghdad
- DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications pp. 57-73

- Charu Gupta, Rakesh Kumar Singh, Simran Kaur Bhatia and Amar Kumar Mohapatra
- Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews pp. 74-91

- Andrew R. Besmer, Jason Watson and M. Shane Banks
- Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective pp. 92-112

- Sheshadri Chatterjee
- A Tweakable Key Alternating Lightweight Cipher for Internet of Things pp. 113-133

- Mary Shamala L., Zayaraz G., Vivekanandan K. and Vijayalakshmi V.
Volume 14, issue 3, 2020
- Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network pp. 1-17

- Geetika Sarna and M. P. S. Bhatia
- Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning pp. 18-37

- Sharmila Subudhi and Suvasini Panigrahi
- Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application pp. 38-49

- Pranav Vyas and Bhushan Trivedi
- Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments pp. 50-71

- Oussama Hannache and Mohamed Chaouki Batouche
- An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization pp. 72-94

- Pooja Parameshwarappa, Zhiyuan Chen and Gunes Koru
- Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets pp. 95-114

- Ravi Kiran Varma Penmatsa, Akhila Kalidindi and S. Kumar Reddy Mallidi
- An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions pp. 115-133

- J. Rene Beulah and D. Shalini Punithavathani
Volume 14, issue 2, 2020
- A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks pp. 1-19

- Khundrakpam Johnson Singh, Janggunlun Haokip and Usham Sanjota Chanu
- Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice pp. 20-40

- Rui Filipe Silva, Raul Barbosa and Jorge Bernardino
- A Valid and Correct-by-Construction Formal Specification of RBAC pp. 41-61

- Hania Gadouche, Zoubeyr Farah and Abdelkamel Tari
- Aggregate Searchable Encryption With Result Privacy pp. 62-82

- Dhruti P. Sharma and Devesh C. Jinwala
- Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain pp. 83-101

- Giridhar Maji, Sharmistha Mandal and Soumya Sen
- Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem pp. 102-115

- Kouraogo Yacouba, Orhanou Ghizlane and Elhajji Said
- IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment pp. 116-142

- Shelendra Kumar Jain and Nishtha Kesswani
Volume 14, issue 1, 2020
- Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors pp. 1-15

- Amanpreet Kaur, Padam Kumar and Govind P. Gupta
- Manifold Surveillance Issues in Wireless Network and the Secured Protocol pp. 16-26

- Mamata Rath, Bibudhendu Pati and Binod Kumar Pattanayak
- Comparison of Various DoS Algorithm pp. 27-43

- Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh and Gunjan Chhabra
- Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE pp. 44-66

- Neha Agarwal, Ajay Rana, J.P. Pandey and Amit Agarwal
- An Improved Intrusion Detection System to Preserve Security in Cloud Environment pp. 67-80

- Partha Ghosh, Sumit Biswas, Shivam Shakti and Santanu Phadikar
| |