International Journal of Information Security and Privacy (IJISP)
2007 - 2025
Current editor(s): Yassine Maleh From IGI Global Bibliographic data for series maintained by Journal Editor (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 8, issue 4, 2014
- A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System pp. 1-25

- Chikh Ramdane and Salim Chikhi
- Toward Proactive Mobile Tracking Management pp. 26-43

- Hella Kaffel Ben Ayed and Asma Hamed
- An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems pp. 44-61

- Amr Ali-Eldin, Jan Van Den Berg and Semir Daskapan
- A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks pp. 62-102

- Piotr Książak, William Farrelly and Kevin Curran
Volume 8, issue 3, 2014
- Users' Perception of Security for Mobile Communication Technology pp. 1-12

- Mohanad Halaweh
- A New Fuzzy-Based Approach for Anonymity Quantification in E-Services pp. 13-38

- Wiem Hammami, Ilhem Souissi and Lamjed Ben Said
- Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment pp. 39-62

- Janakiramaiah Bonam and Ramamohan Reddy
- TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems pp. 63-76

- Xiaojun Wang and Brendan Cronin
Volume 8, issue 2, 2014
- A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks pp. 1-18

- M. Poongodi and S. Bose
- Classification of DOS Attacks Using Visualization Technique pp. 19-32

- Mohamed Cheikh, Salima Hacini and Zizette Boufaida
- Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study pp. 33-54

- Xiang Fang and Sooun Lee
- Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution pp. 55-68

- Vinay Kumar, Abhishek Bansal and Sunil Kumar Muttoo
Volume 8, issue 1, 2014
- Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective pp. 1-18

- Mathew Nicho and Shafaq Khan
- A Covert Communication Model-Based on Image Steganography pp. 19-37

- Mamta Juneja
- An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System pp. 38-61

- Prashanta Kumar Patra and Padma Lochan Pradhan
- An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks pp. 62-78

- Aymen Akremi, Hassen Sallay and Mohsen Rouached
Volume 7, issue 4, 2013
- Secure Communication: A Proposed Public Key Watermark System pp. 1-10

- Shadi R. Masadeh, Shadi Aljawarneh, Ashraf Odeh and Abdullah Alhaj
- Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design pp. 11-21

- K. Saravanan and A. Senthilkumar
- A Survey of Security Standards Applicable to Health Information Systems pp. 22-36

- Francis Akowuah, Xiaohong Yuan, Jinsheng Xu and Hong Wang
- An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines pp. 37-52

- Srinivasa K G
- False Alarm Reduction Using Adaptive Agent-Based Profiling pp. 53-74

- Salima Hacini, Zahia Guessoum and Mohamed Cheikh
Volume 7, issue 3, 2013
- A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm pp. 1-15

- Omar Banimelhem, Lo’ai Tawalbeh, Moad Mowafi and Mohammed Al-Batati
- Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA pp. 16-35

- Daniela Simić-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer and Alexander Roßnagel
- A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain pp. 36-52

- Esraa Omran, Tyrone Grandison, David Nelson and Albert Bokma
- dDelega: Trust Management for Web Services pp. 53-67

- Michele Tomaiuolo
Volume 7, issue 2, 2013
- Development of A Formal Security Model for Electronic Voting Systems pp. 1-28

- Katharina Bräunlich and Rüdiger Grimm
- Malware Detection and Prevention System Based on Multi-Stage Rules pp. 29-43

- Ammar Alazab, Michael Hobbs, Jemal Abawajy and Ansam Khraisat
- Robust Image Data Hiding Technique for Copyright Protection pp. 44-56

- Siddharth Singh and Tanveer J. Siddiqui
- Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol pp. 57-85

- Khaoula Marzouki, Amira Radhouani and Narjes Ben Rajeb
Volume 7, issue 1, 2013
- Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users pp. 1-15

- Nigel Martin and John Rice
- Child Security in Cyberspace Through Moral Cognition pp. 16-29

- Satya Prakash, Abhishek Vaish, Natalie Coul, SaravanaKumar G, T.N. Srinidhi and Jayaprasad Botsa
- Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach pp. 30-44

- Mathews Z. Nkhoma and Duy P. T. Dang
- Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes pp. 45-62

- Ousmane Amadou Dia and Csilla Farkas
- Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time pp. 63-75

- Walid Y. Zibideh and Mustafa M. Matalgah
Volume 6, issue 4, 2012
- A Full Review of Attacks and Countermeasures in Wireless Sensor Networks pp. 1-39

- Pejman Niksaz and Mohammad Javad Kargar
- A Survey of U.S. Laws for Health Information Security & Privacy pp. 40-54

- Francis Akowuah, Xiaohong Yuan, Jinsheng Xu and Hong Wang
- Secure Data Hiding Using Eight Queens Solutions pp. 55-70

- Sunil Kumar Muttoo, Vinay Kumar and Abhishek Bansal
- Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization pp. 71-93

- Ming Yang, Chih-Cheng Hung and Edward Jung
- CITS: The Cost of IT Security Framework pp. 94-116

- Marco Spruit and Wouter de Bruijn
Volume 6, issue 3, 2012
- A Comparative Survey on Cryptology-Based Methodologies pp. 1-37

- Allan Rwabutaza, Ming Yang and Nikolaos Bourbakis
- Information Security Awareness at Saudi Arabians’ Organizations: An Information Technology Employee’s Perspective pp. 38-55

- Zakarya A. Alzamil
- Critical Evaluation of RFID Security Protocols pp. 56-74

- Azam Zavvari and Ahmed Patel
- Investing in IT Security: How to Determine the Maximum Threshold pp. 75-87

- Amanda Eisenga, Travis L. Jones and Walter Rodriguez
- A Practical Approach of Fairness in E-Procurement pp. 88-110

- Debajyoti Konar and Chandan Mazumdar
Volume 6, issue 2, 2012
- Safety Measures for Social Computing in Wiki Learning Environment pp. 1-15

- Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih and Abdullah Mohd Zin
- Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification pp. 16-33

- Dongjin Kim, Zhiyuan Chen and Aryya Gangopadhyay
- Securing Fingerprint Images Through PSO Based Robust Facial Watermarking pp. 34-52

- Roli Bansal, Priti Sehgal and Punam Bedi
- ECFS: An Enterprise-Class Cryptographic File System for Linux pp. 53-63

- U. S. Rawat and Shishir Kumar
- Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption pp. 64-94

- Shaik Shakeel Ahamad, V. N. Sastry and Siba K. Udgata
Volume 6, issue 1, 2012
- Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce pp. 1-13

- S. Srinivasan and Robert Barker
- Designing a Secure Cloud Architecture: The SeCA Model pp. 14-32

- Thijs Baars and Marco Spruit
- Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs pp. 33-56

- Pei-Yuan Shen, Maolin Tang, Vicky Liu and William Caelli
- Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM pp. 57-76

- Z. Cliffe Schreuders, Tanya McGill and Christian Payne
| |