International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 11, issue 4, 2017
- A Survey on Denial of Service Attacks and Preclusions pp. 1-15

- Nagesh K., Sumathy R., Devakumar P. and Sathiyamurthy K.
- Detection of Drive-by Download Attacks Using Machine Learning Approach pp. 16-28

- Monther Aldwairi, Musaab Hasan and Zayed Balbahaith
- Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2 pp. 29-46

- Manish Kumar and Abhinav Bhandari
- Malware Methodologies and Its Future: A Survey pp. 47-64

- Chandan Kumar Behera and D. Lalitha Bhaskari
Volume 11, issue 3, 2017
- A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority pp. 1-14

- Sarvesh Tanwar and Anil Kumar
- Identification of Cryptographic Vulnerability and Malware Detection in Android pp. 15-28

- Anjali Kumawat, Anil Kumar Sharma and Sunita Kumawat
- Malware Detection by Static Checking and Dynamic Analysis of Executables pp. 29-41

- Deepti Vidyarthi, S.P. Choudhary, Subrata Rakshit and C.R.S. Kumar
- Localization in Wireless Sensor Networks Using Soft Computing Approach pp. 42-53

- Sunil Kumar Singh, Prabhat Kumar and Jyoti Prakash Singh
- A Secure Cloud Storage using ECC-Based Homomorphic Encryption pp. 54-62

- Daya Sagar Gupta and G. P. Biswas
- Honeypot Baselining for Zero Day Attack Detection pp. 63-74

- Saurabh Chamotra, Rakesh Kumar Sehgal and Ram Swaroop Misra
Volume 11, issue 2, 2017
- An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password pp. 1-10

- Prakash Mohan and Saravanakumar Chelliah
- Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation pp. 11-24

- Satyanarayana Vollala, B. Shameedha Begum, Amit D. Joshi and N. Ramasubramanian
- Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies pp. 25-37

- Regner Sabillon, Jordi Serra-Ruiz, Victor Cavaller and Jeimy J. Cano
- PKI Deployment Challenges and Recommendations for ICS Networks pp. 38-48

- Nandan Rao, Shubhra Srivastava and Sreekanth K.S.
- Framework to Secure Browser Using Configuration Analysis pp. 49-63

- Harshad Suryakant Wadkar, Arun Mishra and Arati M. Dixit
Volume 11, issue 1, 2017
- Privacy and Territoriality Issues in an Online Social Learning Portal pp. 1-17

- Mohd Anwar and Peter Brusilovsky
- A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees pp. 18-34

- Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
- Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN pp. 35-51

- Mukesh Kumar and Kamlesh Dutta
- A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes pp. 52-64

- Emmy Mugisha, Gongxuan Zhang, Maouadj Zine El Abidine and Mutangana Eugene
Volume 10, issue 4, 2016
- Hybrid Intrusion Detection Framework for Ad hoc networks pp. 1-32

- Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi
- A Framework for Protecting Users' Privacy in Cloud pp. 33-43

- Adesina S. Sodiya and Adegbuyi B.
- Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing pp. 44-57

- Azin Moradbeikie, Saied Abrishami and Hasan Abbasi
- Accurate Classification Models for Distributed Mining of Privately Preserved Data pp. 58-73

- Sumana M. and Hareesha K.S.
Volume 10, issue 3, 2016
- Threshold Secret Sharing Scheme for Compartmented Access Structures pp. 1-9

- P. Mohamed Fathimal and P. Arockia Jansi Rani
- iPhone Forensics: Recovering Investigative Evidence using Chip-off Method pp. 10-24

- Nilay R. Mistry, Binoj Koshy, Mohindersinh Dahiya, Chirag Chaudhary, Harshal Patel, Dhaval Parekh, Jaidip Kotak, Komal Nayi and Priyanka Badva
- Preventing Identity Disclosure in Social Networks Using Intersected Node pp. 25-41

- Amardeep Singh, Divya Bansal and Sanjeev Sofat
- IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks pp. 42-66

- Erukala Suresh Babu, C. Nagaraju and M.H.M. Krishna Prasad
- Metamorphic malware detection using opcode frequency rate and decision tree pp. 67-86

- Mahmood Fazlali, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati and Mohammad Mahdi Dehshibi
Volume 10, issue 2, 2016
- A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) pp. 1-10

- Aftab Ahmad
- Are the Payments System and e-Banking in India Safer than in other SAARC Members? pp. 11-25

- Rituparna Das
- Analysis of Existing Trust Based Routing Schemes Used in Wireless Network pp. 26-40

- Kajal S. Patel and Jagdish S. Shah
- Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level pp. 41-63

- Shaikha Alduaij, Zhiyuan Chen and Aryya Gangopadhyay
Volume 10, issue 1, 2016
- Combination of Access Control and De-Identification for Privacy Preserving in Big Data pp. 1-27

- Amine Rahmani, Abdelmalek Amine and Reda Mohamed Hamou
- The Compliance of IT Control and Governance: A Case of Macao Gaming Industry pp. 28-44

- Colin Lai, Hung-Lian Tang, J. Michael Tarn and Sock Chung
- A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining pp. 45-65

- Pawan R. Bhaladhare and Devesh C. Jinwala
Volume 9, issue 4, 2015
- Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group pp. 1-19

- S. Selva Nidhyananthan, Prasad M. and Shantha Selva Kumari R.
- A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM pp. 26-58

- Mohamed Amine Boudia, Reda Mohamed Hamou and Abdelmalek Amine
- Secure Group Message Transfer Stegosystem pp. 59-76

- Mahinder Pal Singh Bhatia, Manjot Kaur Bhatia and Sunil Kumar Muttoo
Volume 9, issue 3, 2015
- An Efficient, Anonymous and Unlinkable Incentives Scheme pp. 1-20

- Milica Milutinovic, Andreas Put and Bart De Decker
- A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking pp. 21-40

- Rui Wang, Zhiyong Zhang, Lei Ju and Zhiping Jia
- Signature Restoration for Enhancing Robustness of FPGA IP Designs pp. 41-56

- Jing Long, Dafang Zhang, Wei Liang and Xia'an Bi
- Authentication in Ubiquitous Networking pp. 57-83

- Abdullah Mohammed Almuhaideb and Bala Srinivasan
- Software Defined Intelligent Building pp. 84-99

- Rui Yang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu and Zheng Yan
Volume 9, issue 2, 2015
- Several Oblivious Transfer Variants in Cut-and-Choose Scenario pp. 1-12

- Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei and Hao Wang
- Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective pp. 13-30

- Aminu Bello Usman, William Liu, Quan Bai and Ajit Narayanan
- Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks pp. 31-59

- Weidong Yang, Liming Sun and Zhenqiang Xu
- Observations on Genderwise Differences among University Students in Information Security Awareness pp. 60-74

- Ali Farooq, Johanna Isoaho, Seppo Virtanen and Jouni Isoaho
Volume 9, issue 1, 2015
- Client-Side Detection of Clickjacking Attacks pp. 1-25

- Hossain Shahriar and Hisham M. Haddad
- A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour pp. 26-46

- Teodor Sommestad, Henrik Karlzén and Jonas Hallberg
- Short Online/Off-line Signature Scheme for Wireless Sensor Networks pp. 47-61

- Anser Ghazzaal Ali Alquraishee, Jayaprakash Kar and Naomie Salim
- Disassociations in Security Policy Lifecycles pp. 62-77

- Michael Lapke and Gurpreet Dhillon
| |