EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 11, issue 4, 2017

A Survey on Denial of Service Attacks and Preclusions pp. 1-15 Downloads
Nagesh K., Sumathy R., Devakumar P. and Sathiyamurthy K.
Detection of Drive-by Download Attacks Using Machine Learning Approach pp. 16-28 Downloads
Monther Aldwairi, Musaab Hasan and Zayed Balbahaith
Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2 pp. 29-46 Downloads
Manish Kumar and Abhinav Bhandari
Malware Methodologies and Its Future: A Survey pp. 47-64 Downloads
Chandan Kumar Behera and D. Lalitha Bhaskari

Volume 11, issue 3, 2017

A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority pp. 1-14 Downloads
Sarvesh Tanwar and Anil Kumar
Identification of Cryptographic Vulnerability and Malware Detection in Android pp. 15-28 Downloads
Anjali Kumawat, Anil Kumar Sharma and Sunita Kumawat
Malware Detection by Static Checking and Dynamic Analysis of Executables pp. 29-41 Downloads
Deepti Vidyarthi, S.P. Choudhary, Subrata Rakshit and C.R.S. Kumar
Localization in Wireless Sensor Networks Using Soft Computing Approach pp. 42-53 Downloads
Sunil Kumar Singh, Prabhat Kumar and Jyoti Prakash Singh
A Secure Cloud Storage using ECC-Based Homomorphic Encryption pp. 54-62 Downloads
Daya Sagar Gupta and G. P. Biswas
Honeypot Baselining for Zero Day Attack Detection pp. 63-74 Downloads
Saurabh Chamotra, Rakesh Kumar Sehgal and Ram Swaroop Misra

Volume 11, issue 2, 2017

An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password pp. 1-10 Downloads
Prakash Mohan and Saravanakumar Chelliah
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation pp. 11-24 Downloads
Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi and N. Ramasubramanian
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies pp. 25-37 Downloads
Regner Sabillon, Jordi Serra-Ruiz, Victor Cavaller and Jeimy J. Cano
PKI Deployment Challenges and Recommendations for ICS Networks pp. 38-48 Downloads
Nandan Rao, Shubhra Srivastava and Sreekanth K.S.
Framework to Secure Browser Using Configuration Analysis pp. 49-63 Downloads
Harshad Suryakant Wadkar, Arun Mishra and Arati M. Dixit

Volume 11, issue 1, 2017

Privacy and Territoriality Issues in an Online Social Learning Portal pp. 1-17 Downloads
Mohd Anwar and Peter Brusilovsky
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees pp. 18-34 Downloads
Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN pp. 35-51 Downloads
Mukesh Kumar and Kamlesh Dutta
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes pp. 52-64 Downloads
Emmy Mugisha, Gongxuan Zhang, Maouadj Zine El Abidine and Mutangana Eugene

Volume 10, issue 4, 2016

Hybrid Intrusion Detection Framework for Ad hoc networks pp. 1-32 Downloads
Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi
A Framework for Protecting Users' Privacy in Cloud pp. 33-43 Downloads
Adesina S. Sodiya and Adegbuyi B.
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing pp. 44-57 Downloads
Azin Moradbeikie, Saied Abrishami and Hasan Abbasi
Accurate Classification Models for Distributed Mining of Privately Preserved Data pp. 58-73 Downloads
Sumana M. and Hareesha K.S.

Volume 10, issue 3, 2016

Threshold Secret Sharing Scheme for Compartmented Access Structures pp. 1-9 Downloads
P. Mohamed Fathimal and P. Arockia Jansi Rani
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method pp. 10-24 Downloads
Nilay R. Mistry, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi and Priyanka Badva
Preventing Identity Disclosure in Social Networks Using Intersected Node pp. 25-41 Downloads
Amardeep Singh, Divya Bansal and Sanjeev Sofat
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks pp. 42-66 Downloads
Erukala Suresh Babu, C. Nagaraju and M.H.M. Krishna Prasad
Metamorphic malware detection using opcode frequency rate and decision tree pp. 67-86 Downloads
Mahmood Fazlali, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati and Mohammad Mahdi Dehshibi

Volume 10, issue 2, 2016

A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) pp. 1-10 Downloads
Aftab Ahmad
Are the Payments System and e-Banking in India Safer than in other SAARC Members? pp. 11-25 Downloads
Rituparna Das
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network pp. 26-40 Downloads
Kajal S. Patel and Jagdish S. Shah
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level pp. 41-63 Downloads
Shaikha Alduaij, Zhiyuan Chen and Aryya Gangopadhyay

Volume 10, issue 1, 2016

Combination of Access Control and De-Identification for Privacy Preserving in Big Data pp. 1-27 Downloads
Amine Rahmani, Abdelmalek Amine and Reda Mohamed Hamou
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry pp. 28-44 Downloads
Colin Lai, Hung-Lian Tang, J. Michael Tarn and Sock Chung
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining pp. 45-65 Downloads
Pawan R. Bhaladhare and Devesh C. Jinwala

Volume 9, issue 4, 2015

Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group pp. 1-19 Downloads
S. Selva Nidhyananthan, Prasad M. and Shantha Selva Kumari R.
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM pp. 26-58 Downloads
Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
Secure Group Message Transfer Stegosystem pp. 59-76 Downloads
Mahinder Pal Singh Bhatia, Manjot Kaur Bhatia and Sunil Kumar Muttoo

Volume 9, issue 3, 2015

An Efficient, Anonymous and Unlinkable Incentives Scheme pp. 1-20 Downloads
Milica Milutinovic, Andreas Put and Bart De Decker
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking pp. 21-40 Downloads
Rui Wang, Zhiyong Zhang, Lei Ju and Zhiping Jia
Signature Restoration for Enhancing Robustness of FPGA IP Designs pp. 41-56 Downloads
Jing Long, Dafang Zhang, Wei Liang and Xia'an Bi
Authentication in Ubiquitous Networking pp. 57-83 Downloads
Abdullah Mohammed Almuhaideb and Bala Srinivasan
Software Defined Intelligent Building pp. 84-99 Downloads
Rui Yang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu and Zheng Yan

Volume 9, issue 2, 2015

Several Oblivious Transfer Variants in Cut-and-Choose Scenario pp. 1-12 Downloads
Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei and Hao Wang
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective pp. 13-30 Downloads
Aminu Bello Usman, William Liu, Quan Bai and Ajit Narayanan
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks pp. 31-59 Downloads
Weidong Yang, Liming Sun and Zhenqiang Xu
Observations on Genderwise Differences among University Students in Information Security Awareness pp. 60-74 Downloads
Ali Farooq, Johanna Isoaho, Seppo Virtanen and Jouni Isoaho

Volume 9, issue 1, 2015

Client-Side Detection of Clickjacking Attacks pp. 1-25 Downloads
Hossain Shahriar and Hisham M. Haddad
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour pp. 26-46 Downloads
Teodor Sommestad, Henrik Karlzén and Jonas Hallberg
Short Online/Off-line Signature Scheme for Wireless Sensor Networks pp. 47-61 Downloads
Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar and Naomie Salim
Disassociations in Security Policy Lifecycles pp. 62-77 Downloads
Michael Lapke and Gurpreet Dhillon
Page updated 2025-04-17