EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 15, issue 4, 2021

A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things pp. 1-17 Downloads
Anshuman Patel and Devesh Jinwala
An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms pp. 18-30 Downloads
Om Prakash Samantray and Satya Narayan Tripathy
A Model to Improve Security Questions Through Individualized Assistance pp. 31-53 Downloads
Andrew Mangle, Sandip Patel, Sanjay Bapna, XingXing Zu and David Gurzick
Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals pp. 54-78 Downloads
Shuru Liu, Zhanlei Shang and Junwei Lei
M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office – An Empirical Study pp. 79-97 Downloads
Ahmed Elmorshidy
Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm pp. 98-117 Downloads
Priya C. V. and K. S. Angel Viji
Image Encryption Algorithm Based on a Novel 4D Chaotic System pp. 118-131 Downloads
Sadiq A. Mehdi

Volume 15, issue 3, 2021

DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment pp. 1-18 Downloads
Hongsong Chen, Caixia Meng and Jingjiu Chen
Entropy-Based Quantification of Privacy Attained Through User Profile Similarity pp. 19-32 Downloads
Priti Jagwani and Saroj Kaushik
A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies pp. 33-47 Downloads
Nabil Kannouf, Mohamed Labbi, Yassine Chahid, Mohammed Benabdellah and Abdelmalek Azizi
A New Combinational Technique in Image Steganography pp. 48-64 Downloads
Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay and Ramkrishna Ghosh
VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks pp. 65-82 Downloads
Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi
ADT: Anonymization of Diverse Transactional Data pp. 83-105 Downloads
Vartika Puri, Parmeet Kaur and Shelly Sachdeva
SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data pp. 106-128 Downloads
Muraleedharan N. and Janet B.

Volume 15, issue 2, 2021

An Improved Separable and Reversible Steganography in Encrypted Grayscale Images pp. 1-28 Downloads
Manisha Duevedi and Sunil Kumar Muttoo
Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud pp. 29-52 Downloads
Shweta Kaushik and Charu Gandhi
Steganography Technique Inspired by Rook pp. 53-67 Downloads
Abhishek Bansal and Vinay Kumar
(p+, α, t)-Anonymity Technique Against Privacy Attacks pp. 68-86 Downloads
Sowmyarani C. N., Veena Gadad and Dayananda P.
Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain pp. 87-112 Downloads
Randhir Kumar and Rakesh Tripathi
Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO) pp. 113-130 Downloads
V. Sandeep, Saravanan Kondappan, Amir Anton Jone and Raj Barath S.
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors pp. 131-144 Downloads
Redha Taguelmimt and Rachid Beghdad
Detecting DDoS Attacks in IoT Environment pp. 145-180 Downloads
Yasmine Labiod, Abdelaziz Amara Korba and Nacira Ghoualmi-Zine
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications pp. 181-195 Downloads
Hossain Shahriar, Hisham M. Haddad and Maryam Farhadi
Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization pp. 196-216 Downloads
Suhas Bhagate and Prakash J. Kulkarni

Volume 15, issue 1, 2021

A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network pp. 1-25 Downloads
Dung Hoang Le, Nguyen Thanh Vu and Tuan Dinh Le
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm pp. 26-43 Downloads
Sikha Bagui, Keenal M. Shah, Yizhi Hu and Subhash Bagui
CSMCSM: Client-Server Model for Comprehensive Security in MANETs pp. 44-64 Downloads
Hatem Mahmoud Salama, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama and Khaled Mahmoud Badran
IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms pp. 65-98 Downloads
Mhamed Zineddine
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making pp. 99-116 Downloads
Sarra Namane, Nassira Ghoualmi and Mustafa Kaiiali
Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery pp. 117-137 Downloads
Salome James, Gowri Thumbur and Vasudeva Reddy P.
Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System pp. 138-152 Downloads
Mohamed Abdou Souidi and Noria Taghezout
Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks pp. 153-172 Downloads
Preetish Ranjan and Abhishek Vaish
Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies pp. 173-189 Downloads
Rawan Baalous and Ronald Poet
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks pp. 190-212 Downloads
Peng Li, Chao Xu and He Xu

Volume 14, issue 4, 2020

A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols pp. 1-21 Downloads
Noureddine Aribi and Yahia Lebbah
An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System pp. 22-41 Downloads
S. Immaculate Shyla and S.S. Sujatha
A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud pp. 42-56 Downloads
Mohamed Haddadi and Rachid Beghdad
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications pp. 57-73 Downloads
Charu Gupta, Rakesh Kumar Singh, Simran Kaur Bhatia and Amar Kumar Mohapatra
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews pp. 74-91 Downloads
Andrew R. Besmer, Jason Watson and M. Shane Banks
Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective pp. 92-112 Downloads
Sheshadri Chatterjee
A Tweakable Key Alternating Lightweight Cipher for Internet of Things pp. 113-133 Downloads
Mary Shamala L., Zayaraz G., Vivekanandan K. and Vijayalakshmi V.

Volume 14, issue 3, 2020

Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network pp. 1-17 Downloads
Geetika Sarna and M. P. S. Bhatia
Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning pp. 18-37 Downloads
Sharmila Subudhi and Suvasini Panigrahi
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application pp. 38-49 Downloads
Pranav Vyas and Bhushan Trivedi
Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments pp. 50-71 Downloads
Oussama Hannache and Mohamed Chaouki Batouche
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization pp. 72-94 Downloads
Pooja Parameshwarappa, Zhiyuan Chen and Gunes Koru
Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets pp. 95-114 Downloads
Ravi Kiran Varma Penmatsa, Akhila Kalidindi and S. Kumar Reddy Mallidi
An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions pp. 115-133 Downloads
J. Rene Beulah and D. Shalini Punithavathani

Volume 14, issue 2, 2020

A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks pp. 1-19 Downloads
Khundrakpam Johnson Singh, Janggunlun Haokip and Usham Sanjota Chanu
Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice pp. 20-40 Downloads
Rui Filipe Silva, Raul Barbosa and Jorge Bernardino
A Valid and Correct-by-Construction Formal Specification of RBAC pp. 41-61 Downloads
Hania Gadouche, Zoubeyr Farah and Abdelkamel Tari
Aggregate Searchable Encryption With Result Privacy pp. 62-82 Downloads
Dhruti P. Sharma and Devesh C. Jinwala
Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain pp. 83-101 Downloads
Giridhar Maji, Sharmistha Mandal and Soumya Sen
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem pp. 102-115 Downloads
Kouraogo Yacouba, Orhanou Ghizlane and Elhajji Said
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment pp. 116-142 Downloads
Shelendra Kumar Jain and Nishtha Kesswani

Volume 14, issue 1, 2020

Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors pp. 1-15 Downloads
Amanpreet Kaur, Padam Kumar and Govind P. Gupta
Manifold Surveillance Issues in Wireless Network and the Secured Protocol pp. 16-26 Downloads
Mamata Rath, Bibudhendu Pati and Binod Kumar Pattanayak
Comparison of Various DoS Algorithm pp. 27-43 Downloads
Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh and Gunjan Chhabra
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE pp. 44-66 Downloads
Neha Agarwal, Ajay Rana, J.P. Pandey and Amit Agarwal
An Improved Intrusion Detection System to Preserve Security in Cloud Environment pp. 67-80 Downloads
Partha Ghosh, Sumit Biswas, Shivam Shakti and Santanu Phadikar
Page updated 2025-04-17