EconPapers    
Economics at your fingertips  
 

International Journal of Information Security and Privacy (IJISP)

2007 - 2025

Current editor(s): Yassine Maleh

From IGI Global
Bibliographic data for series maintained by Journal Editor ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 8, issue 4, 2014

A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System pp. 1-25 Downloads
Chikh Ramdane and Salim Chikhi
Toward Proactive Mobile Tracking Management pp. 26-43 Downloads
Hella Kaffel Ben Ayed and Asma Hamed
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems pp. 44-61 Downloads
Amr Ali-Eldin, Jan Van Den Berg and Semir Daskapan
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks pp. 62-102 Downloads
Piotr Książak, William Farrelly and Kevin Curran

Volume 8, issue 3, 2014

Users' Perception of Security for Mobile Communication Technology pp. 1-12 Downloads
Mohanad Halaweh
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services pp. 13-38 Downloads
Wiem Hammami, Ilhem Souissi and Lamjed Ben Said
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment pp. 39-62 Downloads
Janakiramaiah Bonam and Ramamohan Reddy
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems pp. 63-76 Downloads
Xiaojun Wang and Brendan Cronin

Volume 8, issue 2, 2014

A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks pp. 1-18 Downloads
M. Poongodi and S. Bose
Classification of DOS Attacks Using Visualization Technique pp. 19-32 Downloads
Mohamed Cheikh, Salima Hacini and Zizette Boufaida
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study pp. 33-54 Downloads
Xiang Fang and Sooun Lee
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution pp. 55-68 Downloads
Vinay Kumar, Abhishek Bansal and Sunil Kumar Muttoo

Volume 8, issue 1, 2014

Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective pp. 1-18 Downloads
Mathew Nicho and Shafaq Khan
A Covert Communication Model-Based on Image Steganography pp. 19-37 Downloads
Mamta Juneja
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System pp. 38-61 Downloads
Prashanta Kumar Patra and Padma Lochan Pradhan
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks pp. 62-78 Downloads
Aymen Akremi, Hassen Sallay and Mohsen Rouached

Volume 7, issue 4, 2013

Secure Communication: A Proposed Public Key Watermark System pp. 1-10 Downloads
Shadi R. Masadeh, Shadi Aljawarneh, Ashraf Odeh and Abdullah Alhaj
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design pp. 11-21 Downloads
K. Saravanan and A. Senthilkumar
A Survey of Security Standards Applicable to Health Information Systems pp. 22-36 Downloads
Francis Akowuah, Xiaohong Yuan, Jinsheng Xu and Hong Wang
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines pp. 37-52 Downloads
Srinivasa K G
False Alarm Reduction Using Adaptive Agent-Based Profiling pp. 53-74 Downloads
Salima Hacini, Zahia Guessoum and Mohamed Cheikh

Volume 7, issue 3, 2013

A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm pp. 1-15 Downloads
Omar Banimelhem, Lo’ai Tawalbeh, Moad Mowafi and Mohammed Al-Batati
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA pp. 16-35 Downloads
Daniela Simić-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer and Alexander Roßnagel
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain pp. 36-52 Downloads
Esraa Omran, Tyrone Grandison, David Nelson and Albert Bokma
dDelega: Trust Management for Web Services pp. 53-67 Downloads
Michele Tomaiuolo

Volume 7, issue 2, 2013

Development of A Formal Security Model for Electronic Voting Systems pp. 1-28 Downloads
Katharina Bräunlich and Rüdiger Grimm
Malware Detection and Prevention System Based on Multi-Stage Rules pp. 29-43 Downloads
Ammar Alazab, Michael Hobbs, Jemal Abawajy and Ansam Khraisat
Robust Image Data Hiding Technique for Copyright Protection pp. 44-56 Downloads
Siddharth Singh and Tanveer J. Siddiqui
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol pp. 57-85 Downloads
Khaoula Marzouki, Amira Radhouani and Narjes Ben Rajeb

Volume 7, issue 1, 2013

Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users pp. 1-15 Downloads
Nigel Martin and John Rice
Child Security in Cyberspace Through Moral Cognition pp. 16-29 Downloads
Satya Prakash, Abhishek Vaish, Natalie Coul, SaravanaKumar G, T.N. Srinidhi and Jayaprasad Botsa
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach pp. 30-44 Downloads
Mathews Z. Nkhoma and Duy P. T. Dang
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes pp. 45-62 Downloads
Ousmane Amadou Dia and Csilla Farkas
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time pp. 63-75 Downloads
Walid Y. Zibideh and Mustafa M. Matalgah

Volume 6, issue 4, 2012

A Full Review of Attacks and Countermeasures in Wireless Sensor Networks pp. 1-39 Downloads
Pejman Niksaz and Mohammad Javad Kargar
A Survey of U.S. Laws for Health Information Security & Privacy pp. 40-54 Downloads
Francis Akowuah, Xiaohong Yuan, Jinsheng Xu and Hong Wang
Secure Data Hiding Using Eight Queens Solutions pp. 55-70 Downloads
Sunil Kumar Muttoo, Vinay Kumar and Abhishek Bansal
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization pp. 71-93 Downloads
Ming Yang, Chih-Cheng Hung and Edward Jung
CITS: The Cost of IT Security Framework pp. 94-116 Downloads
Marco Spruit and Wouter de Bruijn

Volume 6, issue 3, 2012

A Comparative Survey on Cryptology-Based Methodologies pp. 1-37 Downloads
Allan Rwabutaza, Ming Yang and Nikolaos Bourbakis
Information Security Awareness at Saudi Arabians’ Organizations: An Information Technology Employee’s Perspective pp. 38-55 Downloads
Zakarya A. Alzamil
Critical Evaluation of RFID Security Protocols pp. 56-74 Downloads
Azam Zavvari and Ahmed Patel
Investing in IT Security: How to Determine the Maximum Threshold pp. 75-87 Downloads
Amanda Eisenga, Travis L. Jones and Walter Rodriguez
A Practical Approach of Fairness in E-Procurement pp. 88-110 Downloads
Debajyoti Konar and Chandan Mazumdar

Volume 6, issue 2, 2012

Safety Measures for Social Computing in Wiki Learning Environment pp. 1-15 Downloads
Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih and Abdullah Mohd Zin
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification pp. 16-33 Downloads
Dongjin Kim, Zhiyuan Chen and Aryya Gangopadhyay
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking pp. 34-52 Downloads
Roli Bansal, Priti Sehgal and Punam Bedi
ECFS: An Enterprise-Class Cryptographic File System for Linux pp. 53-63 Downloads
U. S. Rawat and Shishir Kumar
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption pp. 64-94 Downloads
Shaik Shakeel Ahamad, V. N. Sastry and Siba K. Udgata

Volume 6, issue 1, 2012

Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce pp. 1-13 Downloads
S. Srinivasan and Robert Barker
Designing a Secure Cloud Architecture: The SeCA Model pp. 14-32 Downloads
Thijs Baars and Marco Spruit
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs pp. 33-56 Downloads
Pei-Yuan Shen, Maolin Tang, Vicky Liu and William Caelli
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM pp. 57-76 Downloads
Z. Cliffe Schreuders, Tanya McGill and Christian Payne
Page updated 2025-04-17