Journal Contents: International Journal of Information Security and Privacy (IJISP)

Volume 18 (2024)
Issue 1
Article 25
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy (pages 1-19)
Dongyan Zhang (Henan University of Science and Technology, China), Lili Zhang (Henan University of Science and Technology, China), Zhiyong Zhang (Henan University of Science and Technology, China), Zhongya Zhang (Henan University of Science and Technology, China)
Article 28
RSA and Elliptic Curve Encryption System: A Systematic Literature Review (pages 1-27)
Musa Ugbedeojo (Landmark University, Nigeria), Marion O. Adebiyi (Landmark University, Nigeria), Oluwasegun Julius Aroba (Durban University of Technology, South Africa), Ayodele Ariyo Adebiyi (Landmark University, Nigeria)
Article 94
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion (pages 1-15)
Zhiqiang Wu (Henan Police College, China)
Volume 17 (2023)
Issue 1
Article 2
Trust and Voice Biometrics Authentication for Internet of Things (pages 1-28)
Alec Wells (York St. John University, UK), Aminu Bello Usman (York St. John University, UK)
Article 3
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm (pages 1-16)
Sangita Baruah (Cotton University, India), Dhruba Jyoti Borah (Gauhati University, India), Vaskar Deka (Gauhati University, India)
Article 4
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features (pages 1-18)
Zhijie Fan (Fudan University, China), Zhiwei Cao (The Third Research Institute of Ministry of Public Security, China), Xin Li (People's Public Security University of China, China), Chunmei Wang (Fudan University, China), Bo Jin (The Third Research Institute of Ministry of Public Security, China), Qianjin Tang (The Third Research Institute of Ministry of Public Security, China)
Article 13
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security (pages 1-17)
Sabrine Ennaji (Sidi Mohamed Ben Abdellah University, Morocco), Nabil El Akkad (National School of Applied Sciences, Morocco), Khalid Haddouch (National School of Applied Sciences, Morocco)
Article 17
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN (pages 1-18)
Mallanagouda Biradar (Department of Computer Science & Engineering, Kalaburagi, Sharnbasva University, India), Basavaraj Mathapathi (Sharnbasva University, India)
Article 18
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies (pages 1-25)
Ali Alibeigi (University of Malaya, Malaysia), Abu Bakar Munir (University of Malaysia, Malaysia), Adeleh Asemi (University of Malaya, Malaysia)
Article 18
A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques (pages 1-18)
Mohamed Guendouz (GeCoDe Laboratory, Dr. Moulay Tahar University of Saïda, Saïda, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Dr. Moulay Tahar University of Saïda, Saïda, Algeria)
Article 19
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures (pages 1-22)
Suman Thapaliya (Department of IT, Lincoln University College, Malaysia), Pawan Kumar Sharma (Department of Faculty of Science Health and Technology, Nepal Open University, Nepal)
Article 19
Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks (pages 1-14)
Xinqiang Wang (Tianjin Sino-German University of Applied Sciences, China), Wenhuan Lu (Tianjin University, China)
Article 32
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet (pages 1-18)
Jinhai Song (Henan University of Science and Technology, China), Zhiyong Zhang (Henan University of Science and Technology, China), Kejing Zhao (Henan University of Science and Technology, China), Qinhai Xue (Henan University of Science and Technology, China), Brij B. Gupta (Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan, & Lebanese American University, Beirut, Lebanon, & Center for Interdisciplinary Research at University of Petroleum and Energy Studies (UPES), Dehradun, India, & UCRD, Chandigarh University, Chandigarh, India)
Article 64
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors (pages 1-23)
Mathew Nicho (Rabdan Academy, UAE), Christopher D. McDermott (Robert Gordon University, UK), Hussein Fakhry (Zayed University, UAE), Shini Girija (Zayed University, UAE)
Article 71
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing (pages 1-25)
Romil Rawat (Department of Computer Science and Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Rajesh Kumar Chakrawarti (Department of Computer Science and Engineering, Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Piyush Vyas (Department of Computer Information Systems, College of Business Administration, Texas A&M University-Central Texas, USA), José Luis Arias Gonzáles (Business Department, Pontifical Catholic University of Peru, Peru), Ranjana Sikarwar (Amity University, India), Ramakant Bhardwaj (Department of Mathematics, Amity University, Kolkata, India)
Article 93
Trajectory Data Publication Based on Differential Privacy (pages 1-15)
Zhen Gu (Harbin Engineering University, China), Guoyin Zhang (Harbin Engineering University, China)
Article 97
“Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption (pages 1-27)
Chuyi Yan (Institute of Information Engineering, Chinese Academy of Sciences, China), Haixia Xu (Institute of Information Engineering, Chinese Academy of Sciences, China), Peili Li (National Engineering Research Center for Cryptography, China)
Volume 16 (2022)
Issue 1
Article 0
Lightweight VLSI Architectures for Image Encryption Applications (pages 1-23)
A. Prathiba (Vellore Institute of Technology, Chennai, India), Suyash Vardhan Srivathshav (Vellore Institute of Technology, Chennai, India), Ramkumar P. E. (Vellore Institute of Technology, Chennai, India), Rajkamal E. (Vellore Institute of Technology, Chennai, India), Kanchana Bhaaskaran V. S. (Vellore Institute of Technology, Chennai, India)
Article 1
Privacy Disclosure in the Real World: An Experimental Study (pages 1-22)
Siyu Wang (Beijing University of Technology, China), Nafei Zhu (Beijing University of Technology, China), Jingsha He (Beijing University of Technology, USA), Da Teng (Beijing University of Technology, China), Yue Yang (Beijing University of Technology, China)
Article 1
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection (pages 1-32)
Nitin O. Mathur (University of Cincinnati, USA), Chengcheng Li (University of Cincinnati, USA), Bilal Gonen (University of Cincinnati, USA), Kijung Lee (University of Cincinnati, USA)
Article 2
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection (pages 1-18)
Abdallah Soualmi (LRSD Lab, Computer Science Department, Faculty of Sciences, University of Setif 1, Algeria), Adel Alti (LRSD Lab, Computer Science Department, Faculty of Sciences, University of Setif 1, Algeria), Lamri Laouamer (Department of Management Information Systems, College of Business and Economics, Qassim University, Saudi Arabia)
Article 2
Infrastructure Cyber-Attack Awareness Training: Effective or Not? (pages 1-26)
Garry L. White (Texas State University, San Marcos, USA)
Article 3
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics (pages 1-26)
M. D. J. S. Goonetillake (School of Computing, University of Colombo, Sri Lanka), Rangana Jayashanka (School of Computing, University of Colombo, Sri Lanka), S. V. Rathnayaka (School of Computing, University of Colombo, Sri Lanka)
Article 3
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine (pages 1-18)
Mohammad H. Alshayeji (Kuwait University, Kuwait), Mousa AlSulaimi (Kuwait University, Kuwait), Sa'ed Abed (Kuwait University, Kuwait), Reem Jaffal (Kuwait University, Kuwait)
Article 4
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments (pages 1-16)
Anderson Aparecido Alves da Silva (SENAC, Brazil & IPT, Brazil & UNIP, Brazil & USP, Brazil), Leonardo Santos Silva (IPT, Brazil), Erica Leandro Bezerra (USP, Brazil), Adilson Eduardo Guelfi (UNOESTE, Brazil), Claudia de Armas (USP, Brazil), Marcelo Teixeira de Azevedo (USP, Brazil), Sergio Takeo Kofuji (USP, Brazil)
Article 5
Network Anomalies Detection Approach Based on Weighted Voting (pages 1-17)
Sergey Sakulin (Bauman Moscow State Technical University, Russia), Alexander Alfimtsev (Bauman Moscow State Technical University, Russia), Konstantin Kvitchenko (Moscow Credit Bank, Russia), Leonid Dobkacz (Bauman Moscow State Technical University, Russia), Yuri Kalgin (Bauman Moscow State Technical University, Russia), Igor Lychkov (Bauman Moscow State Technical University, Russia)
Article 6
Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication (pages 1-20)
Danish Ahamad (Shaqra University, Saudi Arabia), Md Mobin Akhtar (Riyadh Elm University, Saudi Arabia), Shabi Alam Hameed (Shaqra University, Saudi Arabia), Mahmoud Mohammad Mahmoud Al Qerom (College of Computing, Science, and Engineering, University of Salford, UK)
Article 7
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network (pages 1-24)
Erukala Suresh Babu (National Institute of Technology, Warangal, India), B. K. N. Srinivasarao (National Institute of Technology, Warangal, India), Ilaiah Kavati (National Institute of Technology, Warangal, India), Mekala Srinivasa Rao (Lakireddy Bali Reddy College of Engineering, Mylavaram, India)
Article 8
Personal Data and the Assemblage Security in Consumer Internet of Things (pages 1-20)
Mpho Ngoepe (University of South Africa, South Africa), Mfanasibili Ngwenya (University of South Africa, South Africa)
Article 9
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms (pages 1-16)
Moez Farokhnia Hamedani (University of South Florida, USA), Ali Dehghan (University of La Verne, USA)
Article 10
Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX (pages 1-20)
Liangshun Wu (Wuhan University, China), Hengjin Cai (Wuhan University, China), Han Li (Zall Research Institute of Smart Commerce, China)
Article 11
A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation (pages 1-24)
Kakali Chatterjee (National Institute of Technology Patna, India)
Article 12
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques (pages 1-18)
Faheem Syeed Masoodi (University of Kashmir, India), Iram Abrar (University of Kashmir, India), Alwi M. Bamhdi (Umm Al Qura University, Saudi Arabia)
Article 13
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm (pages 1-21)
Ankit Rajeshkumar Kharwar (Chhotubhai Gopalbhai Patel Institute of Technology, Uka Tarsadia University, India), Devendra V. Thakor (Chhotubhai Gopalbhai Patel Institute of Technology, Uka Tarsadia University, India)
Article 14
An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach (pages 1-17)
Karim Ouazzane (London Metropolitan University, UK), Thekla Polykarpou (Callsign Ltd., London, UK), Yogesh Patel (Callsign Ltd., London, UK), Jun Li (Cranfield University, UK)
Article 14
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences (pages 1-18)
Bahubali Akiwate (Visvesvaraya Technological University, Belgaum, India), Latha Parthiban (Pondicherry University, Pondicherry, India)
Article 15
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System (pages 1-20)
Abhaya Kumar Sahoo (Kalinga Institute of Industrial Technology (Deemed), India), Srishti Raj (Kalinga Institute of Industrial Technology (Deemed), India), Chittaranjan Pradhan (Kalinga Institute of Industrial Technology (Deemed), India), Bhabani Shankar Prasad Mishra (Kalinga Institute of Industrial Technology (Deemed), India), Rabindra Kumar Barik (Kalinga Institute of Industrial Technology (Deemed), India), Ankit Vidyarthi (Jaypee Institute of Information Technology, India)
Article 16
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile (pages 1-38)
Boubakeur Annane (LRSD, Department of Computer Science, Faculty of Sciences, University of Setif-1, Algeria), Alti Adel (LRSD, Department of Computer Science, Faculty of Sciences, University of Setif-1, Algeria)
Article 17
An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT (pages 1-24)
Dipali K. Shende (Sinhgad Institute of Technology, Lonavala, India), Yogesh S. Angal (JSPM Bhivarabai Sawant Institute of Technology and Research, India), S.C. Patil. (JSPM's Rajarshi Shahu College of Engineering, India)
Article 17
Secure and Flexible Key Protected Identity Framework for Mobile Devices (pages 1-17)
Kapil Kant Kamal (C-DAC, India), Monit Kapoor (University of Petroleum and Energy Studies, India), Padmaja Joshi (C-DAC, India)
Article 18
Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication (pages 1-18)
Adnan Gutub (Computer Engineering Department, Umm Al-Qura University, Makkah - Saudi Arabia)
Article 19
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context (pages 1-26)
Faruk Arslan (New Mexico State University, USA), Kallol K. Bagchi (The University of Texas at El Paso, USA), Godwin Udo (The University of Texas at El Paso, USA)
Article 21
Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA (pages 1-19)
Erkan Çetintaş (Yalova University, Turkey), İkram Daştan (Yalova University, Turkey)
Article 22
Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security (pages 1-20)
Vinodhini R. E. (Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, India), Malathi P. (Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, India)
Article 22
A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture (pages 1-25)
Pankaj Pankaj (Venkateswara University, India), Bharti P.K (Venkateswara University, India), Brajesh Kumar (MJP Rohilkhand University, India)
Article 23
Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank (pages 1-20)
Chandra Sekhar Kolli (Gandhi Institute of Technology and Management, India), Uma Devi T. (Gandhi Institute of Technology and Management, India)
Article 23
Fractals for Internet of Things Network Structure Planning (pages 1-12)
Alexander Paramonov (Bonch-Bruevich Saint-Petersburg State University of Telecommunications (SPbSUT), Russia), Evgeny Tonkikh (Radio Research and Development Institute (NIIR), Russia), Ammar Muthanna (Bonch-Bruevich Saint-Petersburg State University of Telecommunications (SPbSUT), Russia), Ibrahim A. Elgendy (Faculty of Computers and Information, Menoufia University, Egypt), Andrey Koucheryavy (Bonch-Bruevich Saint-Petersburg State University of Telecommunications (SPbSUT), Russia)
Article 25
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher (pages 1-16)
Hicham Grari (Chouaib Doukkali University, Morocco), Khalid Zine-Dine (Faculty of Sciences, Mohammed V University in Rabat, El Jadida, El Jadida, Morocco), Khalid Zine-Dine (Faculty of Sciences, Mohammed V University in Rabat, Morocco), Ahmed Azouaoui (Chouaib Doukkali University, Morocco), Siham Lamzabi (Laboratory of Innovation in Management and Engineering for Entreprise (LIMIE), ISGA Rabat, Morocco)
Article 26
An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization (pages 1-20)
Sahana Lokesh R. (Department of CSE, SSIT, Tumkur, India), H.R. Ranganatha (Department of ISE, Sapthagiri College of Engineering, Bengaluru, India)
Article 30
An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud (pages 1-24)
Xin Liu (School of Information Engineering, Shandong Youth University of Political Science, Jinan, China), Bin Zhang (School of Information Engineering, Shandong Youth University of Political Science, Jinan, China)
Article 30
A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking (pages 1-17)
Guoyan Li (Tianjin Chengjian University, China), Yihui Shang (Tianjin Chengjian University, China), Yi Liu (Tianjin Chengjian University, China), Xiangru Zhou (Tianjin Chengjian University, China)
Article 31
A Proposal Phishing Attack Detection System on Twitter (pages 1-27)
kamel Ahsene Djaballah (University of Science and Technology Houari Boumediene, Algiers, Algeria), Kamel Boukhalfa (University of Sciences and Technology Houari Boumediene, Algiers, Algeria), Mohamed Amine Guelmaoui (University of Science and Technology Houari Boumediene, Algiers, Algeria), Amir Saidani (University of Science and Technology Houari Boumediene, Algiers, Algeria), Yassine Ramdane (ERIC Laboratory EA 3083, University of Lyon 2, Lyon, France)
Article 32
Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism (pages 1-20)
Ping Zhao (People's Public Security University of China, China), Zhijie Fan* (Fudan University, China & Shanghai Chenrui Information Technology Company), Zhiwei Cao (Third Research Institute of Ministry of Public Security, China), Xin Li (People's Public Security University of China, China)
Article 36
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices (pages 1-17)
Na Hua (School of Mathematical Sciences, Heilongjiang University, China), Juyan Li (School of Date Science and Technology, Heilongjiang University, China & Institute for Cryptology & Network Security, Heilongjiang University, China & Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, China), Kejia Zhang (School of Mathematical Sciences, Heilongjiang University, China & Institute for Cryptology & Network Security, Heilongjiang University, China), Long Zhang (School of Mathematical Sciences, Heilongjiang University, China & Institute for Cryptology & Network Security, Heilongjiang University, China)
Article 56
Credit Card Fraud Detection Based on Hyperparameters ‎Optimization Using the Differential Evolution (pages 1-21)
Mohammed Tayebi (Faculty of Sciences and Techniques, IR2M Laboratory, Hassan First University of Settat, Morocco), Said El Kafhali (Faculty of Sciences and Techniques, IR2M Laboratory, Hassan First University of Settat, Morocco)
Article 59
Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System (pages 1-21)
Rajamandrapu Srinivas (University of Technology, Jaipur, India), Mayur N. (University of Technology, Jaipur, India)
Article 60
AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks (pages 1-31)
Monica Malik (NetApp, Bangalore, India), Khushi Gandhi (Indira Gandhi Delhi Technical University for Women, India), Bhawna Narwal (Indira Gandhi Delhi Technical University for Women, India)
Article 61
Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols (pages 1-24)
Ankush Balaram Pawar (Visvesvaraya Technological University, India), Shashikant U. Ghumbre (Government College of Engineering, India), Rashmi M. Jogdand (Graphic Era University, India)
Article 62
Dynamic Warnings: An Eye Gaze-Based Approach (pages 1-28)
Mini Zeng (Jacksonville University, USA), Feng Zhu (University of Alabama in Huntsville, USA), Sandra Carpenter (University of Alabama in Huntsville, USA)
Article 63
CFS-MHA: A Two-Stage Network Intrusion Detection Framework (pages 1-27)
Ritinder Kaur (Manav Rachna International Institute of Research and Studies, India), Neha Gupta (Manav Rachna International Institute of Research and Studies, India)
Article 64
Cylindrical Curve for Contactless Fingerprint Template Securisation (pages 1-28)
Boris Jerson Zannou (University of Abomey-Calavi, Benin), Tahirou Djara (University of Abomey-Calavi, Benin), Antoine Vianou (University of Abomey-Calavi, Benin)
Article 65
Machine Learning Interpretability to Detect Fake Accounts in Instagram (pages 1-25)
Amine Sallah (Department of Computer Science, FST, Moulay Ismail University of Meknès, Morocco), El Arbi Abdellaoui Alaoui (Department of Sciences, Ecole Normale Supérieure, Moulay Ismail University of Meknès, Morocco), Said Agoujil (École Nationale de Commerce et de Gestion, Moulay Ismail University of Meknès, Morocco), Anand Nayyar (Graduate School, Duy Tan University, Da Nang Vietnam)
Article 65
Real-Time Cyber Analytics Data Collection Framework (pages 1-10)
Herbert Maosa (London Metropolitan University, UK), Karim Ouazzane (London Metropolitan University, UK), Viktor Sowinski-Mydlarz (London Metropolitan University, UK)
Article 66
Blockchain-Based Data Sharing Approach Considering Educational Data (pages 1-20)
Meenu Jain (Department of Information Technology, Banasthali Vidyapith, India), Manisha Jailia (Department of Computer Science, Banasthali Vidyapith, India)
Article 66
Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach (pages 1-15)
R. Lalduhsaka (Mizoram University, India), Nilutpol Bora (Delhi Technological University, India), Ajoy Kumar Khan (Mizoram University, India)
Article 67
Using Machine Learning in WSNs for Performance Prediction MAC Layer (pages 1-18)
El Arbi Abdellaoui Alaoui (Departement of Sciences, Ecole Normale Supérieure, Moulay Ismail University of Meknes, Morocco), Mohamed-Lamine Messai (Université de Lyon, France), Anand Nayyar (Graduate School, Duy Tan University, Da Nang, Vietnam)
Article 67
Deep Ensemble Model for Detecting Attacks in Industrial IoT (pages 1-29)
Bibhuti Bhusana Behera (Department of Computer Science and Engineering), Binod Kumar Pattanayak (Department of Computer Science and Engineering), Rajani Kanta Mohanty (Department of CSE-SP, FET Jain University, Bangalore, India)
Article 68
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes (pages 1-14)
Yonglei Liu (Tianjin Chengjian University, China), Kun Hao (Tianjin Chengjian University, China), Weilong Zhang (Hebei Jiaotong Vocational and Technical College, China), Lin Gao (Tianjin Chengjian University, China), Li Wang (Tianjin Chengjian University, China)
Article 68
Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification (pages 1-44)
Bharath M. R. (Dept. Electronics and Communication PES College of Engineering, Mandya, India), Radhakrishna Rao K. A. (Dept. Electronics and Communication PES College of Engineering, Mandya, India)
Article 68
Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation (pages 1-19)
Divyashikha Sethia (Delhi Technological University, India), Raj Sahu (Delhi Technological University, India)
Article 68
Securing Cloud Virtual Machine Image Using Ethereum Blockchain (pages 1-22)
Srijita Basu (Indian Institute of Information Technology, Kalyani, India), Sandip Karmakar (National Institute of Technology, Durgapur, India), Debasish Bera (Indian Institute of Information Technology, Kalyani, India)
Article 69
A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques (pages 1-24)
Sachikanta Dash (GIET University, India), Sasmita Padhy (VIT Bhopal University, India), Bodhisatwa Parija (DRIEMS Cuttack, India), T. Rojashree (DRIEMS Cuttack, India), K. Abhimanyu Kumar Patro (Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal 576104,Karnataka,India)
Article 69
Prediction of Phishing Websites Using AI Techniques (pages 1-14)
Gururaj H. L. (Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India), Prithwijit Mitra (University of Engineering and Management, Jaipur, India), Soumyadip Koner (University of Engineering and Management, Jaipur, India), Sauvik Bal (Haldia Institute of Technology, India), Francesco Flammini (University of Applied Sciences and Arts of Southern Switzerland, Switzerland), Janhavi V. (Vidyavardhaka College of Engineering, India), Ravi Kumar V. (Vidyavardhaka College of Engineering, India)
Article 71
Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility (pages 1-28)
Adnan Gutub (Umm Al-Qura University, Saudi Arabia)
Article 72
Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments (pages 1-20)
Faiza Benmenzer (Département d'informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria & Laboratoire LAMIE, Université de Batna, Route de Constantine. Fésdis, Batna, Algeria.), Rachid Beghdad (Département d'informatique, Faculté des Sciences Exactes, Université de Bejaia, 06000 Bejaia, Algeria & Laboratoire LAMIE, Université de Batna, Route de Constantine. Fésdis, Batna, Algeria.)
Article 80
A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems (pages 1-22)
Balakrishnan Unny R. (Nirma University, India), Nityesh Bhatt (Nirma University, India)
Article 81
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities (pages 1-14)
Romil Rawat (Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Vinod Mahor (IPS College of Technology and Management, India), Bhagwati Garg (Union Bank of India, India), Shrikant Telang (Shri Vaishnav Vidyapeeth Vishwavidyalaya, India), Kiran Pachlasiya (NRI Institute of Science and Technology, India), Anil Kumar (Government Engineering College, Bharatpur, India), Surendra Kumar Shukla (Graphic Era Deemed to be University, Deharadun, India), Megha Kuliha (Shri G.S. Institute of Technology and Science, Indore, India)
Article 82
A Quantitative Method for Measuring Health of Authoritative Name Servers (pages 1-19)
Sanjay Adiwal (Centre for Development of Advanced Computing, Bengaluru, India), Balaji Rajendran (Centre for Development of Advanced Computing, Bengaluru, India), Pushparaj Shetty D. (National Institute of Technology, Karnataka, India)
Article 83
Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications (pages 1-17)
Dipalee A. Chaudhari (D.Y. Patil College of Engineering, Pune, India & VIT University, Chennai, India), Chaudhari D. A. (D. Y. Patil College of Engineering, India), E. Umamaheswari (VIT University Chennai Campus, India), Umamaheswari E. (Vellore Institute of Technology, Chennai, India)
Article 84
Anomaly Detection Using System Logs: A Deep Learning Approach (pages 1-15)
Rohit Sinha (The Neotia University, India), Rittika Sur (The Neotia University, India), Ruchi Sharma (The Neotia University, India), Avinash K. Shrivastava (International Management Institute, Kolkata, India)
Issue 2
Special Issue on Recent Advances in Blockchain for Secure Software-Defined Networking in Smart Communities
Guest Editorial Preface
Gunasekaran Manogaran (District University Francisco José de Caldas, Colombia), Ching-Hsien Hsu (Asia University, Taiwan), Qin Xin (University of the Faroe Islands, Denmark)
Special Issue on: Recent advances in blockchain for Secure Software defined Networking in Smart Communities
Guest Editorial Preface
Gunasekaran Manogaran (District University Francisco José de Caldas, Colombia), Ching-Hsien Hsu (Asia University, Taiwan), Qin Xin (University of the Faroe Islands, Denmark)
Article 4
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption (pages 1-15)
Priyadharshini K. (Sathyabama Institute of Science and Technology, India), Aroul Canessane R. (Sathyabama Institute of Science and Technology, India)
Article 5
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data (pages 1-13)
Kimmi Kumari (M. S. Ramaiah Institute of Technology, India), Mrunalini M. (M. S. Ramaiah Institute of Technology, India)
Article 6
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology (pages 1-18)
Anjana S. Chandran (SCMS School of Technology and Management, India)
Article 7
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks (pages 1-18)
Tirupathaiah Kanaparthi (Vignan's Foundation for Science Technology and Research, India), Ramesh S. (Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, India), Ravi Sekhar Yarrabothu (Vignan's Keysight COE, Vignan's Foundation for Science Technology and Research, India)
Article 8
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference (pages 1-18)
Hong Wei (Guangdong University of Finance and Economics, China), Zhiyong Li (Guangdong University of Finance and Economics, China)
Article 9
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model (pages 1-19)
Chakka S. V. V. S. N. Murty (Jawaharlal Nehru Technological University, Kakinada, India), G. P. Saradhi Varma (Koneru Lakshmaiah Education Foundation, India), Chakravarthy A. S. N. (Jawaharlal Nehru Technological University, Kakinada, India)
Article 10
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN (pages 1-16)
Kusuma S. M. (Reva University, India), Veena K. N. (REVA University, India), Varun B. V. (M. S. Ramaiah Institute of Technology, India)
Article 11
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol (pages 1-18)
Abhijit Biswas (The ICFAI University, India), Dushyanta Dutta (The ICFAI University, India)
Article 12
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN (pages 1-22)
Leelalakshmi S. (Bharathiar University, India), Rameshkumar K. (Bharathiar University, India)
Article 13
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set (pages 1-17)
Santhoshkumar K. (Periyar University, India), Suganthi P. (Namakkal Kavignar Ramalingam Government Arts College for Women, India)
Article 14
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities (pages 1-20)
Bin Fang (Nanjing Vocation University of Industry Technology, China)
Article 14
Balanced Scheduling Method of Network Information Resources for Cloud Storage (pages 1-17)
Xiang Ma (Xijing University, China), Zhan Li (Northwest University, China)
Article 15
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence (pages 1-19)
Feilu Hang (Information Center of Yunnan Power Grid Co., Ltd., China), Linjiang Xie (Information Center of Yunnan Power Grid Co., Ltd., China), Zhenhong Zhang (Information Center of Yunnan Power Grid Co., Ltd., China), Wei Guo (Information Center of Yunnan Power Grid Co., Ltd., China), Hanruo Li (Information Center of Yunnan Power Grid Co., Ltd., China)
Article 15
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments (pages 1-15)
Kalluri Rama Krishna (Osmania University, India), C. V. Guru Rao (S. R. University, India)
Article 16
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking (pages 1-20)
Jintao Chen (State Grid Shanghai Municipal Electric Power Company Electric Power Research Institute, China), Binruo Zhu (State Grid Shanghai Municipal Electric Power Company Electric Power Research Institute, China), Fang Zhao (State Grid Shanghai Municipal Electric Power Company Electric Power Research Institute, China), Ruili Huang (State Grid Shanghai Municipal Electric Power Company Electric Power Research Institute, China)
Issue 3
Issue 4
Volume 15 (2021)
Issue 1
Article 1
A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network (pages 1-25)
Dung Hoang Le (University of Information Technology, Vietnam National University, Vietnam), Nguyen Thanh Vu (Ho Chi Minh City University of Food Industry, Vietnam), Tuan Dinh Le (Long An University of Economics and Industry, Vietnam)
Article 2
Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm (pages 26-43)
Sikha Bagui (University of West Florida, USA), Keenal M. Shah (University of West Florida, USA), Yizhi Hu (University of West Florida, USA), Subhash Bagui (University of West Florida, USA)
Article 3
CSMCSM: Client-Server Model for Comprehensive Security in MANETs (pages 44-64)
Hatem Mahmoud Salama (Military Technical College, Egypt), Mohamed Zaki Abd El Mageed (Al-Azhar Universty, Egypt), Gouda Ismail Mohamed Salama (Military Technical College, Egypt), Khaled Mahmoud Badran (Military Technical College, Egypt)
Article 4
Article 5
Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making (pages 99-116)
Sarra Namane (Networks and Systems Laboratory, Algeria), Nassira Ghoualmi (Networks and Systems Laboratory, Algeria), Mustafa Kaiiali (Queen's University, Belfast, UK)
Article 6
Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery (pages 117-137)
Salome James (Andhra University, India), Gowri Thumbur (GITAM University, India), Vasudeva Reddy P. (Andhra University, India)
Article 7
Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System (pages 138-152)
Mohamed Abdou Souidi (Laboratoire d'informatique d'Oran (LIO), Université Oran 1, Algeria), Noria Taghezout (Laboratoire d'informatique d'Oran (LIO), Université Oran 1, Algeria)
Article 8
Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks (pages 153-172)
Preetish Ranjan (Indian Institute of Information Technology, Allahabad, India), Abhishek Vaish (Indian Institute of Information Technology, Allahabad, India)
Article 9
Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies (pages 173-189)
Rawan Baalous (University of Glasgow, UK), Ronald Poet (University of Glasgow, UK)
Article 10
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks (pages 190-212)
Peng Li (Nanjing University of Posts and Telecommunications, China), Chao Xu (Nanjing University of Posts and Telecommunications, China), He Xu (Nanjing University of Posts and Telecommunications, China)
Issue 2
Article 1
An Improved Separable and Reversible Steganography in Encrypted Grayscale Images (pages 1-28)
Manisha Duevedi (University of Delhi, India), Sunil Kumar Muttoo (University of Delhi, India)
Article 2
Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud (pages 29-52)
Shweta Kaushik (Jaypee Institute of Information Technology, India), Charu Gandhi (Jaypee Institute of Information Technology, India)
Article 3
Steganography Technique Inspired by Rook (pages 53-67)
Abhishek Bansal (Indira Gandhi National Tribal University, Amarkantak, India), Vinay Kumar (Vivekananda Institute of Professional Studies, GGSIPU, Delhi, India)
Article 4
(p+, α, t)-Anonymity Technique Against Privacy Attacks (pages 68-86)
Sowmyarani C. N. (R. V. College of Engineering, Bengaluru, India), Veena Gadad (R. V. College of Engineering, Bengaluru, India), Dayananda P. (JSS Academy of Technical Education, Bengaluru, India)
Article 5
Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain (pages 87-112)
Randhir Kumar (National Institute of Technology, Raipur, India), Rakesh Tripathi (National Institute of Technology, Raipur, India)
Article 6
Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO) (pages 113-130)
V. Sandeep (Kalasalingam Academy of Research and Education, India), Saravanan Kondappan (Saint Gits College of Engineering, India), Amir Anton Jone (Karunya Institute of Technology and Sciences, India), Raj Barath S. (Sai Vidya Institute of Technology, India)
Article 7
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors (pages 131-144)
Redha Taguelmimt (Département d'informatique, Faculté Des Sciences Exactes, Université de Bejaia, Bejaia, Algeria), Rachid Beghdad (Département d'Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria)
Article 8
Detecting DDoS Attacks in IoT Environment (pages 145-180)
Yasmine Labiod (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria), Abdelaziz Amara Korba (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria), Nacira Ghoualmi-Zine (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Algeria)
Article 9
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications (pages 181-195)
Hossain Shahriar (Kennesaw State University, USA), Hisham M. Haddad (Kennesaw State University, USA), Maryam Farhadi (Kennesaw State University, USA)
Article 10
Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization (pages 196-216)
Suhas Bhagate (D. K. T. E. Society's Textile and Engineering Institute, Ichalkaranji, India), Prakash J. Kulkarni (Walchand College of Engineering, Sangli, India)
Issue 3
Article 1
DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment (pages 1-18)
Hongsong Chen (University of Science and Technology, Beijing, China), Caixia Meng (Railway Police College, China), Jingjiu Chen (University of Science and Technology, Beijing, China)
Article 2
Entropy-Based Quantification of Privacy Attained Through User Profile Similarity (pages 19-32)
Priti Jagwani (University of Delhi, India), Saroj Kaushik (Indian Institute of Technology, Delhi, India)
Article 3
A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies (pages 33-47)
Nabil Kannouf (Abdelmalek Essaâdi University, Morocco), Mohamed Labbi (Mohamed I University, Morocco), Yassine Chahid (Mohamed I University, Morocco), Mohammed Benabdellah (Mohamed I University, Morocco), Abdelmalek Azizi (Mohamed I University, Morocco)
Article 4
A New Combinational Technique in Image Steganography (pages 48-64)
Sabyasachi Pramanik (Haldia Institute of Technology, India), Debabrata Samanta (CHRIST University, India), Samir Kumar Bandyopadhyay (University of Calcutta, India), Ramkrishna Ghosh (Haldia Institute of Technology, India)
Article 5
VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks (pages 65-82)
Oladayo Olufemi Olakanmi (University of Ibadan, Nigeria), Kehinde Oluwasesan Odeyemi (University of Ibadan, Nigeria)
Article 6
ADT: Anonymization of Diverse Transactional Data (pages 83-105)
Vartika Puri (Jaypee Institute of Information Technology, Noida, India), Parmeet Kaur (Jaypee Institute of Information Technology, Noida, India), Shelly Sachdeva (National Institute of Technology, Delhi, India)
Article 7
SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data (pages 106-128)
Muraleedharan N. (Centre for Development of Advanced Computing, India), Janet B. (National Institute of Technology (NIT), Tiruchirappalli, India)
Issue 4
Article 1
A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things (pages 1-17)
Anshuman Patel (Department of Information Technology, Government Polytechnic, Gandhinagar, India), Devesh Jinwala (Department of Computer Engineering, S.V. National Institute of Technology, Surat, India)
Article 2
An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms (pages 18-30)
Om Prakash Samantray (Raghu Institute of Technology, India), Satya Narayan Tripathy (Berhampur University, India)
Article 3
A Model to Improve Security Questions Through Individualized Assistance (pages 31-53)
Andrew Mangle (Bowie State University, USA), Sandip Patel (Morgan State University (Retired), USA), Sanjay Bapna (Morgan State University, USA), XingXing Zu (Morgan State University, USA), David Gurzick (Hood College, USA)
Article 4
Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals (pages 54-78)
Shuru Liu (Zhengzhou University of Light Industry, China), Zhanlei Shang (Zhengzhou University of Light Industry, China), Junwei Lei (Naval Aviation University of PLA, China)
Article 6
Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm (pages 98-117)
Priya C. V. (Noorul Islam Centre for Higher Education, India), K. S. Angel Viji (College of Engineering, Kottayam, India)
Article 7
Image Encryption Algorithm Based on a Novel 4D Chaotic System (pages 118-131)
Sadiq A. Mehdi (Department of Computer Science, College of Education, Mustansiriyah University, Baghdad, Iraq)
Volume 14 (2020)
Issue 1
Special Issue on Security, Privacy, and Trust in Modern Management
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasth, Ajmer, India), Frank Lin (Central University of Rajasth, Ajmer, India)
Article 1
Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors (pages 1-15)
Amanpreet Kaur (Jaypee Institute of Information Technology, Uttar Pradesh, India), Padam Kumar (Jaypee Institute of Information Technology, Uttar Pradesh, India), Govind P. Gupta (National Institute of Technology Raipur, Raipur, India)
Article 2
Manifold Surveillance Issues in Wireless Network and the Secured Protocol (pages 16-26)
Mamata Rath (Birla School of Management (IT), Birla Global University, Odisha, India), Bibudhendu Pati (Department of Computer Science, Rama Devi Women's University, Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, Odisha, India)
Article 3
Comparison of Various DoS Algorithm (pages 27-43)
Mainul Hasan (University of Petroleum and Energy Studies, Dehradun, India), Amogh Venkatanarayan (University of Petroleum and Energy Studies, Dehradun, India), Inder Mohan (University of Petroleum and Energy Studies, Dehradun, India), Ninni Singh (University of Petroleum and Energy Studies, Dehradun, India), Gunjan Chhabra (University of Petroleum and Energy Studies, Dehradun, India)
Article 4
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE (pages 44-66)
Neha Agarwal (Amity University, Uttar Pradesh, India), Ajay Rana (Amity University, Uttar Pradesh, India), J.P. Pandey (KNIT, Delhi, India), Amit Agarwal (School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India)
Article 5
An Improved Intrusion Detection System to Preserve Security in Cloud Environment (pages 67-80)
Partha Ghosh (Netaji Subhash Engineering College, MAKAUT, Kolkata, India), Sumit Biswas (Tata Consultancy Services Ltd, Mumbai, India), Shivam Shakti (Netaji Subhash Engineering College, MAKAUT, Kolkata, India), Santanu Phadikar (Maulana Abul Kalam Azad University of Technology, Kolkata, India)
Issue 2
Article 1
A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks (pages 1-19)
Khundrakpam Johnson Singh (National Institute of Technology, Manipur, India), Janggunlun Haokip (National Institute of Technology Manipur, India), Usham Sanjota Chanu (NIELIT, Imphal, India)
Article 2
Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice (pages 20-40)
Rui Filipe Silva (Polytechnic of Coimbra - ISEC, Coimbra, Portugal), Raul Barbosa (University of Coimbra - UC Center for Informatics and Systems of University of Coimbra, Coimbra, Portugal), Jorge Bernardino (Polytechnic of Coimbra - ISEC, Coimbra, Portugal)
Article 3
A Valid and Correct-by-Construction Formal Specification of RBAC (pages 41-61)
Hania Gadouche (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria), Zoubeyr Farah (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria), Abdelkamel Tari (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria)
Article 4
Aggregate Searchable Encryption With Result Privacy (pages 62-82)
Dhruti P. Sharma (S.V. National Institute of Technology, Surat, India), Devesh C. Jinwala (S.V. National Institute of Technology, Surat, India)
Article 5
Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain (pages 83-101)
Giridhar Maji (Asansol Polytechnic, Asansol, India), Sharmistha Mandal (Kanyapur Polytechnic, Asansol, India), Soumya Sen (University of Calcutta, Calcutta, India)
Article 6
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem (pages 102-115)
Kouraogo Yacouba (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Orhanou Ghizlane (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Elhajji Said (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco)
Article 7
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment (pages 116-142)
Shelendra Kumar Jain (Department of Computer Science, Central University of Rajasthan, NH-8, Bandar Sindri, Ajmer, 305817, Rajasthan, India), Nishtha Kesswani (Department of Computer Science, Central University of Rajasthan, NH-8, Bandar Sindri, Ajmer, 305817, Rajasthan, India)
Issue 3
Special Issue on “Machine Learning Techniques for Information Security and Data Privacy”
Guest Editorial Preface
Kanubhai Patel (Faculty of Computer Science and Applications, Charotar University of Science and Technology, Changa, India), Laura Sani (University of Parma, Parma, Italy), Gianfranco Lombardo (Department of Engineering and Architecture, University of Parma, Parma, Italy)
Article 1
Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network (pages 1-17)
Geetika Sarna (Netaji Subhas University of Technology, India), M. P. S. Bhatia (Netaji Subhas University of Technology, India)
Article 2
Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning (pages 18-37)
Sharmila Subudhi (ITER, Siksha 'O' Anusandhan Deemed to be University, India), Suvasini Panigrahi (Veer Surendra Sai University of Technology, India)
Article 3
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application (pages 38-49)
Pranav Vyas (Charotar University of Science and Technology, India), Bhushan Trivedi (GLS University, India)
Article 4
Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments (pages 50-71)
Oussama Hannache (MISC Laboratory, Computer Science Department, University of Constantine 2, Algeria), Mohamed Chaouki Batouche (Information Technology Department, CCIS - RC, Princess Nourah University, Riyadh, Saudi Arabia)
Article 5
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization (pages 72-94)
Pooja Parameshwarappa (University of Maryland, Baltimore County, USA), Zhiyuan Chen (University of Maryland, Baltimore County, USA), Gunes Koru (University of Maryland, Baltimore County, USA)
Article 6
Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets (pages 95-114)
Ravi Kiran Varma Penmatsa (MVGR College of Engineering, India), Akhila Kalidindi (MVGR College of Engineering, India), S. Kumar Reddy Mallidi (Sri Vasavi Engineering College, India)
Article 7
An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions (pages 115-133)
J. Rene Beulah (Saveetha School of Engineering, India), D. Shalini Punithavathani (Government College of Engineering, India)
Issue 4
Article 1
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols (pages 1-21)
Noureddine Aribi (LITIO Lab., Université Oran1, Oran, Algeria), Yahia Lebbah (LITIO Lab., Université Oran1, Oran, Algeria)
Article 2
An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System (pages 22-41)
S. Immaculate Shyla (Department of Computer Science, S.T. Hindu College, Nagercoil Manonmaniam Sundaranar University, Nagercoil, India), S.S. Sujatha (Department of Computer Science and Application, S.T. Hindu College, Nagercoil Manonmaniam Sundaranar University, Nagercoil, India)
Article 3
A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud (pages 42-56)
Mohamed Haddadi (Département d'Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria), Rachid Beghdad (Département d'Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria)
Article 4
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications (pages 57-73)
Charu Gupta (Indira Gandhi Delhi Technical Universiy for Women, Delhi, India), Rakesh Kumar Singh (Indira Gandhi Delhi Technical University for Women, Delhi, India), Simran Kaur Bhatia (Indira Gandhi Delhi Technical University for Women, Delhi, India), Amar Kumar Mohapatra (Indira Gandhi Delhi Technical University for Women, Delhi, India)
Article 5
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews (pages 74-91)
Andrew R. Besmer (Winthrop University, Rock Hill, USA), Jason Watson (University of North Alabama, Florence, USA), M. Shane Banks (University of North Alabama, Florence, USA)
Article 7
A Tweakable Key Alternating Lightweight Cipher for Internet of Things (pages 113-133)
Mary Shamala L. (Pondicherry Engineering College, Pondicherry, India), Zayaraz G. (Pondicherry Engineering College, Pondicherry, India), Vivekanandan K. (Pondicherry Engineering College, Pondicherry, India), Vijayalakshmi V. (Pondicherry Engineering College, Pondicherry, India)
Volume 13 (2019)
Issue 1
Special Issue on Cyber Security and Privacy in Communication Networks
Guest Editorial Preface
C.P. Gupta (Rajasthan Technical University, Kota, India)
Article 1
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm (pages 1-16)
Oshin Sharma (PES University, Bangalore, India), Hemraj Saini (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India)
Article 2
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence (pages 17-29)
Yerra Shankar Rao (Gandhi Institute of Excellent Technocrafts, Deuliapatna, India), Prasant Kumar Nayak (C. V. Raman College of Engineering, Mahura, India), Hemraj Saini (Jayppe University of Information Technology, Waknaghat, India), Tarini Charana Panda (Department of Mathematics, Ravenshaw University, Cuttack, India)
Article 3
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques (pages 30-45)
Pratiksha Gautam (Jaypee University of Information Technology, Waknaghat, India), Hemraj Saini (Jayppe University of Information Technology, Waknaghat, India)
Article 4
Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET (pages 46-58)
Mamata Rath (Department of Computer Science and Engineering, C.V.Raman College of Engineering, Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India)
Article 5
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing (pages 59-69)
Pratiksha Gautam (Jaypee University of Information Technology, Waknaghat, India), Mohd. Dilshad Ansari (CMR College of Engineering & Technology, Hyderabad, India), Surender Kumar Sharma (Department of Physics, School of Basic and Applied Science, Galgotias University, Greater Noida, India)
Article 6
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things (pages 70-85)
Rajwinder Kaur (Central University of Rajasthan, Ajmer, India), Karan Verma (Central University of Rajasthan, Ajmer, India), Shelendra Kumar Jain (Central University of Rajasthan, Ajmer, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 7
A Survey: Intrusion Detection Techniques for Internet of Things (pages 86-105)
Sarika Choudhary (Central University of Rajasthan, Ajmer, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Issue 2
Article 1
Reversible Data Hiding Scheme for Video (pages 1-13)
T. Bhaskar (JNTUH, Hyderabad, India), Madhu Oruganti (Department of ECE, Sreenidhi Institute of Science and Technology SNIST, Hyderabad, India)
Article 2
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments (pages 14-31)
Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Muhammad Usama (Bahria University, Karachi, Pakistan), Khaled Almustafa (Prince Sultan University, Riyadh, Saudi Arabia), Waheed Iqbal (University of the Punjab, Lahore, Pakistan), Muhammad Ali Raza (University of the Punjab, Lahore, Pakistan), Tanveer Khan (COMSATS University, Islamabad, Pakistan)
Article 3
Cyber Defense Maturity Levels and Threat Models for Smart Cities (pages 32-46)
Ali Amur Al Shidhani (The Research Council, Muscat, Oman)
Article 4
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies (pages 47-66)
Martin Boldt (Blekinge Institute of Technology, Karlskrona, Sweden), Kaavya Rekanar (Blekinge Institute of Technology, Karlskrona, Sweden)
Article 5
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions (pages 67-85)
Marwan Majeed Nayyef (Anbar University, Baghdad, Iraq), Ali Makki Sagheer (University of Anbar, Baghdad, Iraq)
Article 6
A Mathematical Model of HMST Model on Malware Static Analysis (pages 86-103)
Satheesh Abimannan (VIT University, Vellore, India), Kumaravelu R. (VIT University, Vellore, India)
Article 7
Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing (pages 104-119)
Feng Xu (Nanjing University of Aeronautics and Astronautics, Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, China), Mingming Su (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Yating Hou (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China)
Issue 3
Special Issue on Security and Privacy Issues in Cloud Computing, Big Data and IoT Technology: Current Progress and Future Directions
Guest Editorial Preface
Manu Vardhan (Department of Computer Science and Engineering, National Institute of Technology Raipur, Chhattisgarh, India), Malay Kumar (Department of Computer Science and Engineering, National Institute of Technology Raipur, Chhattisgarh, India)
Article 1
An Intelligent Surveillance System Based on IoT for Internal Security of a Nation (pages 1-30)
Tarun Kumar (CSED, MNNIT Allahabad, Prayagraj, India), Dharmender Singh Kushwaha (CSED, MNNIT Allahabad, Prayagraj, India)
Article 2
Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection (pages 31-47)
Alok Kumar Shukla (NIT Raipur, Raipur, India), Pradeep Singh (NIT Raipur, Raipur, India)
Article 3
Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site (pages 48-59)
Abhishek Kumar Singh (NIT Raipur, Raipur, India), Naresh Kumar Nagwani (National Institute of Technology Raipur, Raipur, India), Sudhakar Pandey (National Institute of Technology Raipur, Raipur, India)
Article 4
A Priority Based Efficient Secure Framework for WBANs (pages 60-73)
Vinay Pathak (JNU, New Delhi, India)
Article 5
A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks (pages 74-90)
Deepika Agrawal (National Institute of Technology Raipur, Raipur, India), Sudhakar Pandey (National Institute of Technology Raipur, Raipur, India), Veena Anand (National Institute of Technology Raipur, Raipur, India)
Article 6
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT (pages 91-105)
Anurag Shukla Shukla (NIT Raipur, Raipur, India), Sarsij Tripathi (NIT Raipur, Raipur, India)
Article 7
Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce (pages 106-122)
Ashish Kumar Tripathi (Delhi Technological University, New Delhi, India), Kapil Sharma (Delhi Technological University, New Delhi, India), Manju Bala (Indraprastha College of Women, New Delhi, India)
Issue 4
Article 1
A Quantum Secure Entity Authentication Protocol Design for Network Security (pages 1-11)
Surjit Paul (IIT Kharagpur, Kharagpur, India), Sanjay Kumar (NIT Jamshedpur, Jamshedpur, India), Rajiv Ranjan Suman (NIT Jamshedpur, Jamshedpur, India)
Article 2
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption (pages 12-27)
G. Sravan Kumar (Acharya Nagarjuna University, Guntur, India), A. Sri Krishna (RVR & JC College of Engineering, Guntur, India)
Article 3
A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set (pages 28-52)
N. Syed Siraj Ahmed (VIT University, Vellore, India), Debi Prasanna Acharjya (School of Computing Sciences and Engineering,VIT University, Vellore, India)
Article 4
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions (pages 53-67)
Ranu Gupta (Jaypee University of Engineering and Technology, Guna, India), Rahul Pachauri (Jaypee University of Engineering and Technology, Guna, India), Ashutosh K. Singh (Thapar Institute of Engineering and Technology University, Punjab, India)
Article 5
Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks (pages 68-88)
Asha Jyothi Ch (JNTUH College of Engineering, Jagtial, India), Narsimha G. (JNTUH Hyderabad, Hyderabad, India)
Article 6
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps (pages 89-108)
Pankaj Kumar (School of Computing Science and Engineering, Galgotias University, Delhi, India), Vishnu Sharma (Amity School of Engineering, Amity University, Noida, India), Gaurav Sharma (Département d'Informatique, Université Libre de Bruxelles, Bruxelles, Belgium), Tarunpreet Bhatia (Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India)
Article 7
A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks (pages 109-138)
Ismaila Adeniyi Kamil (University of Ibadan, Ibadan, Nigeria), Sunday Oyinlola Ogundoyin (University of Ibadan, Ibadan, Nigeria)
Volume 12 (2018)
Issue 1
Special Issue on Security Mechanisms
Guest Editorial Preface
G. Geetha (Lovely Professional University, Punjab, India)
Article 1
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security (pages 1-12)
Ranjeet Kumar Singh (National Institute of Technology, Department of Computer Applications, Jamshedpur, India), Dilip Kumar Shaw (National Institute of Technology, Department of Computer Applications, Jamshedpur, India)
Article 2
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification (pages 13-28)
Gautam Kumar (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 3
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET (pages 29-41)
Arun Malik (Lovely Professional University, Punjab, India), Babita Pandey (Lovely Professional University, Punjab, India)
Article 4
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN (pages 42-52)
Geetanjali Rathee (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 5
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN (pages 53-62)
Gulshan Kumar (Lovely Professional University, Punjab, India), Rahul Saha (Lovely Professional University, Punjab, India), Mandeep Singh (Lovely Professional University, Punjab, India), Mritunjay Kumar Rai (Lovely Professional University, Punjab, India)
Article 6
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor (pages 63-73)
Rajeev Sobti (Lovely Professional University, Punjab, India), Geetha Ganesan (Lovely Professional University, Punjab, India)
Article 7
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation (pages 74-88)
Rajni Mohana (Jaypee University of Information Technology, Solan, India)
Article 8
Breaching Security of Full Round Tiny Encryption Algorithm (pages 89-98)
Puneet Kumar Kaushal (Lovely Professional University, Punjab, India), Rajeev Sobti (Lovely Professional University, Punjab, India)
Issue 2
Special Issue on Security Challenges in Internet of Things (IoT)
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasthan, Ajmer, India), C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Kota, India), Frank Lin (California State University San Bernardino (CSUSB), San Bernardino, USA)
Article 1
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis (pages 1-25)
Malay Kumar (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India), Manu Vardhan (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India)
Article 2
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN (pages 26-37)
Geetanjali Rathee (Jaypee University of Information Technology, India), Hemraj Saini (Jaypee University of Information Technology, India)
Article 3
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks (pages 38-45)
Jhum Swain (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, Odisha, India), Bibudhendu Pati (Department of Computer Science and Engineering, C. V. Raman College of Engineering, Bhubaneswar, India)
Article 4
An Improvised Framework for Privacy Preservation in IoT (pages 46-63)
Muzzammil Hussain (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India), Neha Kaliya (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India)
Issue 3
Article 1
A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia (pages 1-15)
Noushin Ashrafi (University of Massachusetts Boston, Boston, USA), Jean-Pierre Kuilboer (University of Massachusetts Boston, Boston, USA)
Article 2
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm (pages 16-26)
Bouchra Echandouri (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fouzia Omary (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fatima Ezzahra Ziani (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Anas Sadak (Faculty of Sciences, Mohammed V University, Rabat, Morocco)
Article 3
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem (pages 27-41)
Hridoy Jyoti Mahanta (Computer Science and Engineering, Assam University, Silchar, India), Ajoy Kumar Khan (Computer Science and Engineering, Assam University, Silchar, India)
Article 4
A Literature Review on Image Encryption Techniques (pages 42-83)
S Geetha (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), P Punithavathi (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), A Magnus Infanteena (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), S Siva Sivatha Sindhu (Shan Systems LLC, Jersey City, USA)
Article 5
Blind Image Source Device Identification: Practicality and Challenges (pages 84-99)
Udaya Sameer Venkata (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India), Ruchira Naskar (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India)
Article 6
Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data (pages 100-122)
Benjamin Stark (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heiko Gewald (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heinrich Lautenbacher (University Hospital Tübingen, Tübingen, Germany), Ulrich Haase (Klinikum Stuttgart, Stuttgart, Germany), Siegmar Ruff (DSM DatenSchutzManagement Schurer GmbH, Tübingen, Germany)
Article 8
Association Rule Hiding in Privacy Preserving Data Mining (pages 141-163)
S. Vijayarani Mohan (Department of Computer Science, Bharathiar University, Coimbatore, India), Tamilarasi Angamuthu (Department of MCA, Kongu Engineering College, Erode, India)
Issue 4
Article 1
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω) (pages 1-23)
Martin Konan (University of Electronic Science and Technology of China (UESTC), Chengdu, China), Wenyong Wang (University of Electronic Science and Technology of China (UESTC), Chengdu, China)
Article 2
VuWaDB: A Vulnerability Workaround Database (pages 24-34)
Atefeh Khazaei (Yazd University, Yazd, Iran), Mohammad Ghasemzadeh (Yazd University, Yazd, Iran), Christoph Meinel (Hasso Plattner Institute, Potsdam, Germany)
Article 3
Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking (pages 35-53)
Rohit M. Thanki (C. U. Shah University, Wadhwan City, India), Komal Rajendrakumar Borisagar (Atmiya Institute of Technology and Science, Rajkot, India)
Article 4
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO) (pages 54-67)
Charifa Hanin (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Fouzia Omary (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Souad Elbernoussi (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Khadija Achkoun (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Bouchra Echandouri (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco)
Article 5
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain (pages 68-81)
Xueping Liang (Institute of Information Engineering, Chinese Academy of Sciences, China & School of Cyber Security, University of Chinese Academy of Sciences, China & Old Dominion University, USA), Sachin Shetty (Old Dominion University, USA), Deepak K. Tosh (Department of Computer Science, University of Texas at El Paso, USA), Juan Zhao (Tennessee State University, USA), Danyi Li (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jihong Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 6
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards (pages 82-97)
Patryk Szewczyk (Edith Cowan University, Joondalup, Australia), Krishnun Sansurooah (Edith Cowan University, Joondalup, Australia), Patricia A. H. Williams (Flinders University, Adelaide, Australia)
Volume 11 (2017)
Issue 1
Article 1
Privacy and Territoriality Issues in an Online Social Learning Portal (pages 1-17)
Mohd Anwar (North Carolina A&T State University, Greensboro, NC, USA), Peter Brusilovsky (University of Pittsburgh, Pittsburgh, PA, USA)
Article 2
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees (pages 18-34)
Mohamed Amine Boudia (Dr. Moulay Tahar University of Saida, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria)
Article 3
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN (pages 35-51)
Mukesh Kumar (National Institute of Technology, Hamirpur, India), Kamlesh Dutta (National Institute of Technology, Hamirpur, India)
Article 4
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes (pages 52-64)
Emmy Mugisha (Nanjing University of Science and Technology, Nanjing, China), Gongxuan Zhang (Nanjing University of Science and Technology, Nanjing, China), Maouadj Zine El Abidine (Nanjing University of Science and Technology, Nanjing, China), Mutangana Eugene (Nanjing University of Science and Technology, Nanjing, China)
Issue 2
Special Issue on Cyber Security and Privacy in Communication Networks (Part 1)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password (pages 1-10)
Prakash Mohan (Karpagam College of Engineering (Autonomous), Coimbatore, India), Saravanakumar Chelliah (St. Joseph's Institute of Technology, Chennai, India)
Article 2
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation (pages 11-24)
Satyanarayana Vollala (National Institute of Technology, Tiruchirappalli, India), B. Shameedha Begum (National Institute of Technology, Tiruchirappalli, India), Amit D. Joshi (National Institute of Technology, Tiruchirappalli, India), N. Ramasubramanian (National Institute of Technology, Tiruchirappalli, India)
Article 3
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies (pages 25-37)
Regner Sabillon (Universitat Oberta de Catalunya, Barcelona, Spain), Jordi Serra-Ruiz (Universitat Oberta de Catalunya, Barcelona, Spain), Victor Cavaller (Universitat Oberta de Catalunya, Barcelona, Spain), Jeimy J. Cano (Universidad de los Andes, Bogota, Colombia)
Article 4
PKI Deployment Challenges and Recommendations for ICS Networks (pages 38-48)
Nandan Rao (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Shubhra Srivastava (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Sreekanth K.S. (ABB Global Industries and Services Pvt Ltd., Bangalore, India)
Article 5
Framework to Secure Browser Using Configuration Analysis (pages 49-63)
Harshad Suryakant Wadkar (Defence Institute of Advanced Technology, Pune, India), Arun Mishra (Defence Institute of Advanced Technology, Pune, India), Arati M. Dixit (Savitribai Phule Pune University, Pune, India)
Issue 3
Special Issue Cyber Security and Privacy in Communication Networks (Part 2)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority (pages 1-14)
Sarvesh Tanwar (Mody University of Science and Technology, Lakshmangarh, India), Anil Kumar (Mody University of Science and Technology, Lakshmangarh, India)
Article 2
Identification of Cryptographic Vulnerability and Malware Detection in Android (pages 15-28)
Anjali Kumawat (Government Women Engineering College, Ajmer, India), Anil Kumar Sharma (Government Women Engineering College, Ajmer, India), Sunita Kumawat (Government Women Engineering College, Ajmer, India)
Article 3
Malware Detection by Static Checking and Dynamic Analysis of Executables (pages 29-41)
Deepti Vidyarthi (Defence Institute of Advanced Technology, Pune, India), S.P. Choudhary (Defence Institute of Advanced Technology, Pune, India), Subrata Rakshit (Center of Artificial Intelligence & Robotics, Bangalore, India), C.R.S. Kumar (Defence Institute of Advanced Technology, Pune, India)
Article 4
Localization in Wireless Sensor Networks Using Soft Computing Approach (pages 42-53)
Sunil Kumar Singh (National Institute of Technology Patna, Patna, India), Prabhat Kumar (Department of Computer Science and Engineering, National Institute of Technology Patna, Patna, India), Jyoti Prakash Singh (National Institute of Technology Patna, Patna, India)
Article 5
A Secure Cloud Storage using ECC-Based Homomorphic Encryption (pages 54-62)
Daya Sagar Gupta (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India), G. P. Biswas (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India)
Article 6
Honeypot Baselining for Zero Day Attack Detection (pages 63-74)
Saurabh Chamotra (CDAC, Mohali, India), Rakesh Kumar Sehgal (CDAC, Mohali, India), Ram Swaroop Misra (CDAC, Mohali, India)
Issue 4
Article 1
A Survey on Denial of Service Attacks and Preclusions (pages 1-15)
Nagesh K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sumathy R. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Devakumar P. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sathiyamurthy K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India)
Article 2
Detection of Drive-by Download Attacks Using Machine Learning Approach (pages 16-28)
Monther Aldwairi (Jordan University of Science and Technology, Department of Network Engineering and Security, Irbid, Jordan), Musaab Hasan (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E), Zayed Balbahaith (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E)
Article 3
Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2 (pages 29-46)
Manish Kumar (Punjabi University, Department of Computer Engineering, Patiala, India), Abhinav Bhandari (Punjabi University, Department of Computer Engineering, Patiala, India)
Article 4
Malware Methodologies and Its Future: A Survey (pages 47-64)
Chandan Kumar Behera (Andhra Univeristy, Visakhapatnam, India), D. Lalitha Bhaskari (Andhra Univeristy, Visakhapatnam, India)
Volume 10 (2016)
Issue 1
Article 1
Combination of Access Control and De-Identification for Privacy Preserving in Big Data (pages 1-27)
Amine Rahmani (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria)
Article 2
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry (pages 28-44)
Colin Lai (Macao Polytechnic Institute, Macao), Hung-Lian Tang (Eastern Michigan University, Ypsilanti, MI, USA), J. Michael Tarn (Department of Business Information Systems, Western Michigan University, Kalamazoo, MI, USA), Sock Chung (Eastern Michigan University, Ypsilanti, MI, USA)
Article 3
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining (pages 45-65)
Pawan R. Bhaladhare (SNJB's College of Engineering, Chandwad, India), Devesh C. Jinwala (Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, India)
Issue 2
Article 1
A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) (pages 1-10)
Aftab Ahmad (John Jay College of Criminal Justice, City University of New York (CUNY), New York, NY, USA)
Article 2
Are the Payments System and e-Banking in India Safer than in other SAARC Members? (pages 11-25)
Rituparna Das (University of Petroleum and Energy Studies, Dehradun, India)
Article 3
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network (pages 26-40)
Kajal S. Patel (Government Engineering College, Rajkot, India), Jagdish S. Shah (Government Engineering College, Patan, India)
Article 4
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level (pages 41-63)
Shaikha Alduaij (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Zhiyuan Chen (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Aryya Gangopadhyay (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA)
Issue 3
Special Issue on Security of Information and Networks
Guest Editorial Preface
Atilla Elçi (Electrical and Electronics Engineering Department, Aksaray University, Aksaray, Turkey), Oleg Borisovich Makarevich (Southern Federal University, Taganrog, Russia), Manoj S. Gaur (Malaviya National Institute of Technology, Jaipur, India), Mehmet A. Orgun (Department of Computing, Macquarie University, Sydney, Australia)
Article 1
Threshold Secret Sharing Scheme for Compartmented Access Structures (pages 1-9)
P. Mohamed Fathimal (Manonmaniam Sundaranar University, Tirunelveli, India), P. Arockia Jansi Rani (Manonmaniam Sundaranar University, Tirunelveli, India)
Article 2
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method (pages 10-24)
Nilay R. Mistry (Institute of Forensic Science, Gandhinagar, India), Binoj Koshy (Institute of Forensic Science, Gandhinagar, India), Mohindersinh Dahiya (Institute of Forensic Science, Gandhinagar, India), Chirag Chaudhary (Institute of Forensic Science, Gandhinagar, India), Harshal Patel (Institute of Forensic Science, Gandhinagar, India), Dhaval Parekh (Institute of Forensic Science, Gandhinagar, India), Jaidip Kotak (Institute of Forensic Science, Gandhinagar, India), Komal Nayi (Institute of Forensic Science, Gandhinagar, India), Priyanka Badva (Institute of Forensic Science, Gandhinagar, India)
Article 3
Preventing Identity Disclosure in Social Networks Using Intersected Node (pages 25-41)
Amardeep Singh (PEC University of Technology, Chandigarh, India), Divya Bansal (PEC University of Technology, Chandigarh, India), Sanjeev Sofat (PEC University of Technology, Chandigarh, India)
Article 4
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks (pages 42-66)
Erukala Suresh Babu (K.L. University, Vijayawada, India), C. Nagaraju (Y.V. University, Proddutur, India), M.H.M. Krishna Prasad (J.N.T. University, Kakinada, India)
Article 5
Metamorphic malware detection using opcode frequency rate and decision tree (pages 67-86)
Mahmood Fazlali (Department of Computer Science, Cyberspace Research Institute, Shahid Beheshti University, GC, Tehran, Iran), Peyman Khodamoradi (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Farhad Mardukhi (Department of Computer Engineering, Razi University, Kermanshah, Iran), Masoud Nosrati (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Mohammad Mahdi Dehshibi (Pattern Research Center, Tehran, Iran)
Issue 4
Article 1
Hybrid Intrusion Detection Framework for Ad hoc networks (pages 1-32)
Abdelaziz Amara Korba (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Mehdi Nafaa (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Salim Ghanemi (Embedded Systems Laboratory (LASE), Badji Mokhtar-Annaba University, Annaba, Algeria)
Article 2
A Framework for Protecting Users' Privacy in Cloud (pages 33-43)
Adesina S. Sodiya (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria), Adegbuyi B. (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria)
Article 3
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing (pages 44-57)
Azin Moradbeikie (International University of Imamreza, Mashhad, Iran), Saied Abrishami (Ferdowsi University of Mashhad, Mashhad, Iran), Hasan Abbasi (International University of Imamreza, Mashhad, Iran)
Article 4
Accurate Classification Models for Distributed Mining of Privately Preserved Data (pages 58-73)
Sumana M. (M. S. Ramaiah Institute of Technology, Bangalore, India), Hareesha K.S. (Manipal Institute of Technology, Udupi, India)
Volume 9 (2015)
Issue 1
Article 1
Client-Side Detection of Clickjacking Attacks (pages 1-25)
Hossain Shahriar (Department of Computer Science, Kennesaw State University, Kennesaw, GA, USA), Hisham M. Haddad (Kennesaw State University, Kennesaw, GA, USA)
Article 2
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour (pages 26-46)
Teodor Sommestad (Swedish Defence Research Agency (FOI), Linköping, Sweden), Henrik Karlzén (Swedish Defence Research Agency (FOI), Linköping, Sweden), Jonas Hallberg (Swedish Defence Research Agency (FOI), Linköping, Sweden)
Article 3
Short Online/Off-line Signature Scheme for Wireless Sensor Networks (pages 47-61)
Anser Ghazzaal Ali Alquraishee (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Jayaprakash Kar (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Naomie Salim (Faculty of Computing Universiti Teknologi Malaysia, Sekudai, Malaysia)
Article 4
Disassociations in Security Policy Lifecycles (pages 62-77)
Michael Lapke (University of Mary Washington, Fredericksburg, VA, USA), Gurpreet Dhillon (School of Business, Virginia Commonwealth University, Richmond, VA, USA)
Issue 2
Special Issue on Trust, Security and Privacy in Computing and Communications (Part 1)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
Several Oblivious Transfer Variants in Cut-and-Choose Scenario (pages 1-12)
Chuan Zhao (School of Computer Science and Technology, Shandong University, Jinan, China), Han Jiang (School of Computer Science and Technology, Shandong University, Jinan, China), Qiuliang Xu (School of Computer Science and Technology, Shandong University, Jinan, China), Xiaochao Wei (School of Computer Science and Technology, Shandong University, Jinan, China), Hao Wang (School of Computer Science and Technology, Shandong University, Jinan, China)
Article 2
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective (pages 13-30)
Aminu Bello Usman (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), William Liu (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Quan Bai (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Ajit Narayanan (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Article 3
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks (pages 31-59)
Weidong Yang (Key Laboratory of Grain Information Processing and Control Ministry of Education, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China), Liming Sun (Beijing Key Laboratory of IOT information security technology, Institute of Information Engineering, CAS, Beijing, China), Zhenqiang Xu (Zhenqiang Xu, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China)
Article 4
Observations on Genderwise Differences among University Students in Information Security Awareness (pages 60-74)
Ali Farooq (Department of Information Technology, University of Turku, Turku, Finland), Johanna Isoaho (Department of Information Technology, University of Turku, Turku, Finland), Seppo Virtanen (Department of Information Technology, University of Turku, Turku, Finland), Jouni Isoaho (Department of Information Technology, University of Turku, Turku, Finland)
Issue 3
Special Issue on Trust, Security, and Privacy in Computing and Communications (Part 2)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
An Efficient, Anonymous and Unlinkable Incentives Scheme (pages 1-20)
Milica Milutinovic (KU Leuven, Leuven, Belgium), Andreas Put (KU Leuven, Leuven, Belgium), Bart De Decker (KU Leuven, Leuven, Belgium)
Article 2
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking (pages 21-40)
Rui Wang (Shandong University, Jinan, China), Zhiyong Zhang (Shandong University, Jinan, China), Lei Ju (Shandong University, Jinan, China), Zhiping Jia (Shandong University, Jinan, China)
Article 3
Signature Restoration for Enhancing Robustness of FPGA IP Designs (pages 41-56)
Jing Long (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Dafang Zhang (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Wei Liang (College of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China), Xia'an Bi (College of Mathematics and Computer Science, Hunan Normal University, Changsha, China)
Article 4
Authentication in Ubiquitous Networking (pages 57-83)
Abdullah Mohammed Almuhaideb (College of Computer Science and IT, King Faisal University, Alahsa, Saudi Arabia), Bala Srinivasan (Faculty of Information Technology, Monash University, Melbourne, Australia)
Article 5
Software Defined Intelligent Building (pages 84-99)
Rui Yang Xu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Xin Huang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Jie Zhang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Yulin Lu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Ge Wu (University of Wollongong, Australia), Zheng Yan (Aalto University, Espoo, Finland & Xidian University, China)
Issue 4
Article 1
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group (pages 1-19)
S. Selva Nidhyananthan (Mepco Schlenk Engineering College, Sivakasi, India), Prasad M. (Mepco Schlenk Engineering College, Sivakasi, India), Shantha Selva Kumari R. (Mepco Schlenk Engineering College, Sivakasi, India)
Article 2
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM (pages 26-58)
Mohamed Amine Boudia (GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria)
Article 3
Secure Group Message Transfer Stegosystem (pages 59-76)
Mahinder Pal Singh Bhatia (Department of Computer Engineering, Netaji Subhas Institute of Technology, New Delhi, India), Manjot Kaur Bhatia (Department of Computer Science, University of Delhi, New Delhi, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India)
Volume 8 (2014)
Issue 1
Article 1
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective (pages 1-18)
Mathew Nicho (University of Dubai, Dubai, UAE), Shafaq Khan (University of Dubai, Dubai, UAE)
Article 2
A Covert Communication Model-Based on Image Steganography (pages 19-37)
Mamta Juneja (UIET, Panjab University, Chandigarh, India)
Article 3
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System (pages 38-61)
Prashanta Kumar Patra (Department of CSE, College of Engineering and Technology, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India), Padma Lochan Pradhan (Department of CSE, Central Institute of Technology, Raipur, India)
Article 4
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks (pages 62-78)
Aymen Akremi (CES Research Unit, National School of Engineers of Sfax, Sfax, Tunisia), Hassen Sallay (Al Imam Mohammad Ibn Saud Islamic University. (IMSIU), Riyadh, Saudi Arabia), Mohsen Rouached (College of Computers and Information Technology, Taif University, Taif, Saudi Arabia)
Issue 2
Article 1
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks (pages 1-18)
M. Poongodi (Anna University, Chennai, India), S. Bose (Anna University, Chennai, India)
Article 2
Classification of DOS Attacks Using Visualization Technique (pages 19-32)
Mohamed Cheikh (Computer Science Department, Constantine 2 University, Constantine, Algeria), Salima Hacini (TLSI department, Constantine 2 University, Constantine, Algeria), Zizette Boufaida (Computer Science Department, Constantine 2 University, Constantine, Algeria)
Article 3
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study (pages 33-54)
Xiang Fang (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA), Sooun Lee (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA)
Article 4
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution (pages 55-68)
Vinay Kumar (Vivekananda Institute of Professional Studies, Guru Gobind Singh Indraprastha University, Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, Delhi, India)
Issue 3
Article 1
Users' Perception of Security for Mobile Communication Technology (pages 1-12)
Mohanad Halaweh (University of Dubai, UAE)
Article 2
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services (pages 13-38)
Wiem Hammami (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia), Ilhem Souissi (National School of Computer Science, Tunis, Tunisia), Lamjed Ben Said (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia)
Article 3
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment (pages 39-62)
Janakiramaiah Bonam (DVR & Dr HS MIC College of Technology, Kanchikacherla, India), Ramamohan Reddy (Sri Venkateswara University, Tirupati, India)
Article 4
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems (pages 63-76)
Xiaojun Wang (Dublin City University, Dublin, Ireland), Brendan Cronin (Dublin City University, Dublin, Ireland)
Issue 4
Article 1
A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System (pages 1-25)
Chikh Ramdane (Sétif 1 University, Sétif, Algeria), Salim Chikhi (MISC Laboratory, Constantine 2 University, Constantine, Algeria)
Article 2
Toward Proactive Mobile Tracking Management (pages 26-43)
Hella Kaffel Ben Ayed (National School of Computer Science, University of Manouba, Manouba, Tunisia), Asma Hamed (National School of Computer Science, University of Manouba, Manouba, Tunisia)
Article 3
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems (pages 44-61)
Amr Ali-Eldin (Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt), Jan Van Den Berg (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands), Semir Daskapan (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands)
Article 4
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks (pages 62-102)
Piotr Książak (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), William Farrelly (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), Kevin Curran (Faculty of Computing & Engineering, Ulster University, Londonderry, UK)
Volume 7 (2013)
Issue 1
Article 1
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users (pages 1-15)
Nigel Martin (Research School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia), John Rice (Department of International Business and Asian Studies, Griffith University, Southport, QLD, Australia)
Article 2
Child Security in Cyberspace Through Moral Cognition (pages 16-29)
Satya Prakash (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Abhishek Vaish (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Natalie Coul (School of Computing & Engineering Systems, University of Abertay Dundee, Dundee, UK), SaravanaKumar G (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), T.N. Srinidhi (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Jayaprasad Botsa (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India)
Article 3
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach (pages 30-44)
Mathews Z. Nkhoma (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam), Duy P. T. Dang (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam)
Article 4
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes (pages 45-62)
Ousmane Amadou Dia (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA), Csilla Farkas (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA)
Article 5
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time (pages 63-75)
Walid Y. Zibideh (Qualcomm, San Diego, CA, USA), Mustafa M. Matalgah (Department of Electrical Engineering, University of Mississippi, University, MS, USA)
Issue 2
Article 1
Development of A Formal Security Model for Electronic Voting Systems (pages 1-28)
Katharina Bräunlich (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany), Rüdiger Grimm (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany)
Article 2
Malware Detection and Prevention System Based on Multi-Stage Rules (pages 29-43)
Ammar Alazab (School of Information Technology, Deakin University, Burwood, VIC, Australia), Michael Hobbs (School of Information Technology, Deakin University, Burwood, VIC, Australia), Jemal Abawajy (School of Information Technology, Deakin University, Burwood, VIC, Australia), Ansam Khraisat (Ballarat University, Mt Helen, VIC, Australia)
Article 3
Robust Image Data Hiding Technique for Copyright Protection (pages 44-56)
Siddharth Singh (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India), Tanveer J. Siddiqui (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India)
Article 4
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol (pages 57-85)
Khaoula Marzouki (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Amira Radhouani (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Narjes Ben Rajeb (INSAT, LIP2-LR99ES18, Carthage University, Tunis, Tunisia)
Law, Policy and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Book Review
Ken Krechmer (University of Colorado, Boulder, CO, USA)
Issue 3
Article 1
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm (pages 1-15)
Omar Banimelhem (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Lo’ai Tawalbeh (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan), Moad Mowafi (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Mohammed Al-Batati (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan)
Article 2
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA (pages 16-35)
Daniela Simić-Draws (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Stephan Neumann (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Anna Kahlert (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Philipp Richter (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Rüdiger Grimm (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Melanie Volkamer (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Alexander Roßnagel (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany)
Article 3
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain (pages 36-52)
Esraa Omran (Gulf University for Science & Technology, Kuwait City, Kuwait), Tyrone Grandison (Proficiency Labs, Ashland, OR, USA), David Nelson (Faculty of Applied Sciences, University of Sunderland, Sunderland, UK), Albert Bokma (Avedas Information Management, Karlsruhe, Germany)
Article 4
dDelega: Trust Management for Web Services (pages 53-67)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Issue 4
Article 1
Secure Communication: A Proposed Public Key Watermark System (pages 1-10)
Shadi R. Masadeh (Department of Computer Networks , Al-Isra University, Amman, Jordan,), Shadi Aljawarneh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Ashraf Odeh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Abdullah Alhaj (Faculty of Information Technology, University of Jordan, Aqaba, Jordan)
Article 2
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design (pages 11-21)
K. Saravanan (Department of Electronics and Communication, Nehru Institute of Technology, Coimbatore, Tamil Nadu, India), A. Senthilkumar (Department of Electrical and Electronics, Dr. Mahalingam College of Engineering and Technology, Pollachi, Tamil Nadu, India)
Article 3
A Survey of Security Standards Applicable to Health Information Systems (pages 22-36)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, Center for Cyber Defense (a CAE/IAE), North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 4
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines (pages 37-52)
Srinivasa K G (Department of Computer Science and Engineering, M. S. Ramaiah Institute of Technology, Bangalore, Karnataka, India)
Article 5
False Alarm Reduction Using Adaptive Agent-Based Profiling (pages 53-74)
Salima Hacini (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria), Zahia Guessoum (LIP6, Pierre et Marie Curie University, Paris, France), Mohamed Cheikh (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria)
Volume 6 (2012)
Issue 1
Article 1
Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce (pages 1-13)
S. Srinivasan (Texas A&M International University, USA), Robert Barker (University of Louisville, USA)
Article 2
Designing a Secure Cloud Architecture: The SeCA Model (pages 14-32)
Thijs Baars (Utrecht University, The Netherlands), Marco Spruit (Utrecht University, The Netherlands)
Article 3
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs (pages 33-56)
Pei-Yuan Shen (Queensland University of Technology, Australia), Maolin Tang (Queensland University of Technology, Australia), Vicky Liu (Queensland University of Technology, Australia), William Caelli (Queensland University of Technology, Australia)
Article 4
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM (pages 57-76)
Z. Cliffe Schreuders (Leeds Metropolitan University, UK), Tanya McGill (Murdoch University, Australia), Christian Payne (Murdoch University, Australia)
Issue 2
Article 1
Safety Measures for Social Computing in Wiki Learning Environment (pages 1-15)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK), Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia), Joaquim Celestino Júnior (State University of Ceará, Brazil), Rodziah Latih (Universiti Kebangsaan Malaysia, Malaysia), Abdullah Mohd Zin (Universiti Kebangsaan Malaysia, Malaysia)
Article 2
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification (pages 16-33)
Dongjin Kim (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA)
Article 3
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking (pages 34-52)
Roli Bansal (University of Delhi, India), Priti Sehgal (University of Delhi, India), Punam Bedi (University of Delhi, India)
Article 4
ECFS: An Enterprise-Class Cryptographic File System for Linux (pages 53-63)
U. S. Rawat (Jaypee University of Engineering & Technology, India), Shishir Kumar (Jaypee University of Engineering & Technology, India)
Article 5
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption (pages 64-94)
Shaik Shakeel Ahamad (Institute for Development and Research in Banking Technology and University of Hyderabad, India), V. N. Sastry (Institute for Development and Research in Banking Technology and University of Hyderabad, India), Siba K. Udgata (Institute for Development and Research in Banking Technology and University of Hyderabad, India)
Issue 3
Article 1
A Comparative Survey on Cryptology-Based Methodologies (pages 1-37)
Allan Rwabutaza (ATR Center, Wright State University, USA), Ming Yang (Southern Polytechnic State University, USA), Nikolaos Bourbakis (ATR Center, Wright State University, USA)
Article 2
Article 3
Critical Evaluation of RFID Security Protocols (pages 56-74)
Azam Zavvari (Universiti Kebangsaan Malaysia, Malaysia), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, & Kingston University, UK)
Article 4
Investing in IT Security: How to Determine the Maximum Threshold (pages 75-87)
Amanda Eisenga (Lutgert College of Business, Florida Gulf Coast University, USA), Travis L. Jones (Lutgert College of Business, Florida Gulf Coast University, USA), Walter Rodriguez (Lutgert College of Business, Florida Gulf Coast University, USA)
Article 5
A Practical Approach of Fairness in E-Procurement (pages 88-110)
Debajyoti Konar (Presidency University, India), Chandan Mazumdar (Jadavpur University, India)
Issue 4
Article 1
A Full Review of Attacks and Countermeasures in Wireless Sensor Networks (pages 1-39)
Pejman Niksaz (Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Yazd, Iran), Mohammad Javad Kargar (Department of Computer Engineering, Islamic Azad University, Maybod Branch, Maybod, Iran)
Article 2
A Survey of U.S. Laws for Health Information Security & Privacy (pages 40-54)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 3
Secure Data Hiding Using Eight Queens Solutions (pages 55-70)
Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India), Vinay Kumar (Department of IT, Vivekanand Institute of Professional Studies, New Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India)
Article 4
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization (pages 71-93)
Ming Yang (Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Chih-Cheng Hung (Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Edward Jung (Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA)
Article 5
CITS: The Cost of IT Security Framework (pages 94-116)
Marco Spruit (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands), Wouter de Bruijn (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands)
Volume 5 (2011)
Issue 1
Article 1
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment (pages 1-13)
Devon Bennett (University of East London, UK), Hamid Jahankhani (University of East London, UK), Mohammad Dastbaz (University of East London, UK), Hossein Jahankhani (University of East London, UK)
Article 2
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis (pages 14-32)
A. Bhattarai (University of Memphis, USA), D. Dasgupta (University of Memphis, USA)
Article 3
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications (pages 33-49)
Ioana Lasc (University of Limerick, Ireland), Reiner Dojen (University of Limerick, Ireland), Tom Coffey (University of Limerick, Ireland)
Article 4
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers (pages 50-66)
Garry L. White (Texas State University – San Marcos, USA), Francis A. Méndez Mediavilla (Texas State University – San Marcos, USA), Jaymeen R. Shah (Texas State University – San Marcos, USA)
Issue 2
Article 1
User Perceptions of Security Technologies (pages 1-12)
Douglas M. Kline (University of North Carolina Wilmington, USA), Ling He (Saginaw Valley State University, USA), Ulku Yaylacicegi (University of North Carolina Wilmington, USA)
Article 2
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree (pages 13-32)
Golam Kaosar (Victoria University, Australia), Xun Yi (Victoria University, Australia)
Article 3
A Mark-Up Language for the Specification of Information Security Governance Requirements (pages 33-53)
Anirban Sengupta (Jadavpur University, India), Chandan Mazumdar (Jadavpur University, India)
Article 4
On the Security of Self-Certified Public Keys (pages 54-60)
Cheng-Chi Lee (Fu Jen Catholic University, Taiwan), Min-Shiang Hwang (Asia University, Taiwan), I-En Liao (National Chung Hsing University, Taiwan)
Issue 3
Article 1
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card (pages 1-18)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK), Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Laleh Golafshan (Department of Computer Engineering and IT, Science and Research Branch, Islamic Azad University, Fars, Iran), Mona Taghavi (Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran)
Article 2
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems (pages 19-35)
Harold Pardue (University of South Alabama, USA), Jeffrey P. Landry (University of South Alabama, USA), Alec Yasinsac (University of South Alabama, USA)
Article 3
Intrusion Detection Algorithm for MANET (pages 36-49)
S. Srinivasan (Texas A&M International University, USA), S. P. Alampalayam (APS Technologies, USA)
Article 4
An Integrated Security Governance Framework for Effective PCI DSS Implementation (pages 50-67)
Mathew Nicho (University of Dubai, UAE), Hussein Fakhry (University of Dubai, UAE), Charles Haiber (Kent State University at Stark, USA)
Issue 4
Article 1
A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions (pages 1-7)
Murthy V. Rallapalli (IBM and Stevens Institute of Technology, USA)
Article 2
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements (pages 8-30)
O. T. Arogundade (Chinese Academy of Sciences, China), A. T. Akinwale (University of Agriculture, Abeokuta, Nigeria), Z. Jin (Peking University, China), X. G. Yang (Chinese Academy of Sciences, China)
Article 3
Evaluating the Quality and Usefulness of Data Breach Information Systems (pages 31-46)
Benjamin Ngugi (Suffolk University, USA), Jafar Mana (Suffolk University, USA), Lydia Segal (Suffolk University, USA)
Article 4
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework (pages 47-58)
Hassen Sallay (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Mohsen Rouached (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Adel Ammar (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Ouissem Ben Fredj (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Khalid Al-Shalfan (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Majdi Ben Saad (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia)
Volume 4 (2010)
Issue 1
Article 1
Provable Security for Outsourcing Database Operations (pages 1-17)
Sergei Evdokimov (Humboldt-Universität zu Berlin, Germany), Matthias Fischmann (Humboldt-Universität zu Berlin, Germany), Oliver Günther (Humboldt-Universität zu Berlin, Germany)
Article 2
A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections (pages 18-31)
Ran Tao (Louisiana State University, USA), Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Bin Li (Louisiana State University, USA)
Article 3
A Keystroke Biometric Systemfor Long-Text Input (pages 32-60)
Charles C. Tappert (Pace University, USA), Sung-Hyuk Cha (Pace University, USA), Mary Villani (Pace University, USA), Robert S. Zack (Pace University, USA)
Article 4
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements (pages 61-92)
Surya B. Yadav (Texas Tech University, USA)
Article 5
Are Online Privacy Policies Readable? (pages 93-116)
M. Sumeeth (University of Alberta, Canada), R. I. Singh (University of Alberta, Canada), J. Miller (University of Alberta, Canada)
Issue 2
Article 1
Protecting User Privacy Better with Query l-Diversity (pages 1-18)
Fuyu Liu (University of Central Florida, USA), Kien A. Hua (University of Central Florida, USA)
Article 2
Globalization and Data Privacy: An Exploratory Study (pages 19-35)
Robert L. Totterdale (Robert Morris University, USA)
Article 3
Security Issues for Cloud Computing (pages 36-48)
Kevin Hamlen (The University of Texas at Dallas, USA), Murat Kantarcioglu (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
Global Information Security Factors (pages 49-60)
Garry White (Texas State University - San Marcos, USA), Ju Long (Texas State University - San Marcos, USA)
Issue 3
Article 1
The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise (pages 1-21)
Munir Majdalawieh (American University of Sharjah, United Arab Emirates)
Article 2
Policy Enforcement System for Inter-Organizational Data Sharing (pages 22-39)
Mamoun Awad (UAE University, UAE), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 3
Goals and Practices in Maintaining Information Systems Security (pages 40-50)
Zippy Erlich (The Open University of Israel, Israel), Moshe Zviran (Tel-Aviv University, Israel)
Article 4
Factors Influencing College Students’ Use of Computer Security (pages 51-60)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA), Robert W. Stone (University of Idaho, USA)
Issue 4
Article 1
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments (pages 1-20)
Feng W. Zhu (The University of Alabama in Huntsville, USA), Sandra Carpenter (The University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co., USA), Matt Mutka (Michigan State University, USA)
Article 2
Hiding Message in Map Along Pre-Hamiltonian Path (pages 21-34)
Sunil Kumar Muttoo (University of Delhi, India), Vinay Kumar (National Informatics Centre, India)
Article 3
Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance (pages 35-59)
Bandar Alhaqbani (Queensland University of Technology, Australia), Colin Fidge (Queensland University of Technology, Australia)
Volume 3 (2009)
Issue 1
Article 1
Re-Evaluation of On-Line Hot Topic Discovery Model (pages 1-10)
Hui-min Ye (University of Vermont, USA), Sushil K. Sharma (Ball State University, USA), Huinan Xu (Ernst & Young, USA)
Article 2
Understanding User Behavior towards Passwords through Acceptance and Use Modelling (pages 11-29)
Lee Novakovic (Murdoch University, Australia), Tanya McGill (Murdoch University, Australia), Michael Dixon (Murdoch University, Australia)
Article 3
Without Permission: Privacy on the Line (pages 30-44)
Joanne H. Pratt (Joanne H. Pratt Associates, USA), Sue Conger (University of Dallas, USA)
Article 4
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce (pages 45-64)
Hamid R. Nemati (The University of North Carolina at Greensboro, USA), Thomas Van Dyke (The University of North Carolina, USA)
Article 5
Large Key Sizes and the Security of Password-Based Cryptography (pages 65-72)
Kent D. Boklan (Queens College, USA)
Issue 2
Article 1
Information Systems Security Assurance Management at Municipal Software Solutions, Inc. (pages 1-9)
Virginia Franke Kleist (West Virginia University, USA), Bonnie Morris (West Virginia University, USA), James W. Denton (West Virginia University, USA)
Article 2
A Chronicle of a Journey: An E-Mail Bounce Back System (pages 10-41)
Alex Kosachev (The University of North Carolina at Greensboro, USA), Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
Article 3
Data Privacy and Security: HIPAA and Small Business Compliance (pages 42-53)
James Suleiman (University of Southern Maine, USA), Terry Huston (IT Consultant, Canada)
Article 4
PCI Compliance: Overcoming the Challenges (pages 54-67)
Benjamin Ngugi (Suffolk University, USA), Gina Vega (Salem State College, USA), Glenn Dardick (Longwood University, USA)
Article 6
Information Security by Words Alone: The Case for Strong Security Policies (pages 84-89)
Kirk P. Arnett (Mississippi State University, USA), Gary F. Templeton (Mississippi State University, USA), David A. Vance (Olivet Nazarene University, USA)
Article 7
The Social Organization of a Criminal Hacker Network: A Case Study (pages 90-104)
Yong Lu (Pennsylvania State University, USA)
Issue 3
Article 1
Security and Privacy Issues in Secure E-Mail Standards and Services (pages 1-13)
Lei Chen (Sam Houston State University, USA), Wen-Chen Hu (University of North Dakota, USA), Ming Yang (Jacksonville State University, USA), Lei Zhang (Frostburg State University, USA)
Article 2
Applied Cryptography for Security and Privacy in Wireless Sensor Networks (pages 14-36)
Dulal C. Kar (Texas A&M University-Corpus Christi, USA), Hung L. Ngo (Texas A&M University-Corpus Christi, USA), Geetha Sanapala (Texas A&M University-Corpus Christi, USA)
Article 3
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy (pages 37-54)
Ming Yang (Jacksonville State University, USA), Monica Trifas (Jacksonville State University, USA), Guillermo Francia III (Jacksonville State University, USA), Lei Chen (Sam Houston State University, USA)
Article 4
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks (pages 55-75)
Ramakrishna Thurimella (University of Denver, USA), William Mitchell (University of Denver, USA)
Article 5
Fair Electronic Exchange Based on Fingerprint Biometrics (pages 76-106)
Harkeerat Bedi (University of Tennessee at Chattanooga, USA), Li Yang (University of Tennessee at Chattanooga, USA)
Article 6
Secure and Private Service Discovery in Pervasive Computing Environments (pages 107-122)
Feng Zhu (University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co, USA)
Issue 4
Article 1
Preserving Privacy in Mining Quantitative Associations Rules (pages 1-17)
Madhu V. Ahluwalia (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA)
Article 2
A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents (pages 18-28)
Hamidreza Amouzegar (K. N. Toosi University of Technology, Iran), Mohammad Jafar Tarokh (K. N. Toosi University of Technology, Iran), Anahita Naghilouye Hidaji (Infotech Pars Company, Iran)
Article 3
PAKE on the Web (pages 29-42)
Xunhua Wang (James Madison University, USA), Hua Lin (University of Virginia, USA)
Article 4
Three Models to Measure Information Security Compliance (pages 43-67)
Wasim A Al-Hamdani (Kentucky State University, USA)
Article 5
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies (pages 68-95)
Ian Reay (University of Alberta, Canada), Patricia Beatty (University of Alberta, Canada), Scott Dick (University of Alberta, Canada), James Miller (University of Alberta, Canada)
Volume 2 (2008)
Issue 1
Article 2
Life Cycle Pattern Study of Malicious Codes (pages 26-41)
June Wei (University of West Florida, USA), Randall C. Reid (University of West Florida, USA), Hongmei Zhang (University of South Carolina, USA)
Article 3
An Empirical Investigation of an Individual's Perceived Need for Privacy and Security (pages 42-53)
Taner Pirim (Mississsippi Center for Supercomputing Research, USA), Tabitha James (Virginia Polytechnic Institute and State University, USA), Katherine Boswell (University of Louisiana at Monroe, USA), Brian Reithel (University of Mississippi, USA), Reza Barkhi (Virginia Polytechnic Institute and State University, USA)
Article 4
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids (pages 54-79)
Syed Naqvi (Centre of Excellence in Information and Communication Technologies, Belgium)
Article 5
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use (pages 80-90)
S.E. Kruck (James Madison University, USA), Faye P. Teer (James Madison University, USA)
Issue 2
Article 1
Memory-Based Antiforensic Tools and Techniques (pages 1-13)
Hamid Jahankhani (University of East London, UK), Elidon Beqiri (University of East London, UK)
Article 2
A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs) (pages 14-30)
Spyridon Papastergiou (University of Pireaus, Greece), Despina Polemi (University of Pireaus, Greece)
Article 3
Trust-Based Usage Control in Collaborative Environment (pages 31-45)
Li Yang (University of Tennessee at Chattanooga, USA), Chang Phuong (University of Tennessee at Chattanooga, USA), Amy Novobilski (University of Tennessee at Chattanooga, USA), Raimund K. Ege (North Illinois University, USA)
Article 4
Spam Classification Based on E-Mail Path Analysis (pages 46-69)
Srikanth Palla (University of North Texas, USA), Ram Dantu (University of North Texas, USA), João W. Cangussu (University of Texas at Dallas, USA)
Article 5
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study (pages 70-82)
John A. Cassini (Université d’Angers, France), B.Dawn Medlin (Appalachian State University, USA), Adriana Romaniello (Universidad Rey Juan Carlos, Spain)
Issue 3
Article 1
The Impact of Privacy Legislation on Patient Care (pages 1-17)
Jeff Barnett (University of Victoria, Canada)
Article 2
Using Statistical Texture Analysis for Medical Image Tamper Proofing (pages 18-27)
Samia Boucherkha (Mentouri University, Algeria), Mohamed Benmohamed (Mentouri University, Algeria)
Article 3
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes (pages 28-44)
Tamas S. Gal (Univeristy of Maryland Baltimore County (UMBC), USA), Zhiyuan Chen (Univeristy of Maryland Baltimore County (UMBC), USA), Aryya Gangopadhyay (Univeristy of Maryland Baltimore County (UMBC), USA)
Article 4
Electronic Medical Records, HIPAA, and Patient Privacy (pages 45-54)
Jingquan Li (Texas A&M University-Kingsville, USA), Michael J. Shaw (University of Illinois at Urbana-Champaign, USA)
Article 5
Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in (pages 55-70)
Patricia Y. Logan (Marshall University Graduate College, USA), Debra Noles (Marshall University Graduate College, USA)
Article 6
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? (pages 71-83)
B. Dawn Medlin (Appalachian State University, USA), Joseph A. Cazier (Appalachian State University, USA), Daniel P. Foulk (Appalachian State University, USA)
Article 7
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health (pages 84-97)
E. Vance Wilson (University of Toledo, USA), David D. Dobrzykowski (University of Toledo, USA), Joseph A. Cazier (Appalachian State University, USA)
Issue 4
Article 1
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control (pages 1-21)
Zude Li (University of Western Ontario, Canada), Xiaojun Ye (Tsinghua University, China)
Article 2
A Decentralized Security Framework for Web-Based Social Networks (pages 22-53)
Barbara Carminati (Universita degli Studi dell’Insubria, Italy), Elena Ferrari (Universita degli Studi dell’Insubria, Italy), Andrea Perego (Universita degli Studi dell’Insubria, Italy)
Article 3
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors (pages 54-66)
Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Balachandran Ramadass (Louisiana State University, USA)
Article 4
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries (pages 67-90)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Yashaswini Harsha Kumar (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA)
Article 5
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees (pages 91-109)
Xun Li (University of Kentucky, USA), Radhika Santhanam (University of Kentucky, USA)
Volume 1 (2007)
Issue 1
Article 1
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation (pages 1-17)
Stephen J.H. Yang (National Central University, Taiwan), Blue C.W. Lan (National Central University, Taiwan), James S.F. Hsieh (Ulead Systems Inc., Taiwan), Jen-Yao Chung (IBM T. J. Watson Research Center, USA)
Article 2
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management (pages 18-34)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Natasha Tsybulnik (The University of Texas at Dallas, USA), Ashraful Alam (The University of Texas at Dallas, USA)
Article 3
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication (pages 35-46)
Song Han (Curtin University of Technology, Australia), Vidyasagar Potdar (Curtin University of Technology, Australia), Elizabeth Chang (Curtin University of Technology, Australia), Tharam Dillon (University of Technology, Australia)
Article 4
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice (pages 47-63)
Lixin Fu (The University of North Carolina at Greensboro, USA), Hamid Nemati (The University of North Carolina at Greensboro, USA), Fereidoon Sadri (The University of North Carolina at Greensboro, USA)
Article 5
Privacy and Security in the Age of Electronic Customer Relationship Management (pages 65-86)
Nicholas C. Romano Jr. (Oklahoma State University, USA), Jerry Fjermestad (New Jersey Institute of Technology, USA)
Issue 2
Article 1
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text (pages 1-12)
Dieter Bartmann (Universität Regensburg, Germany), Idir Bakdi (Universität Regensburg, Germany), Michael Achatz (Universität Regensburg, Germany)
Article 2
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach (pages 13-36)
Stanley R.M. Oliveira (Embrapa Informática Agropecuária, Brazil), Osmar R. Zaïane (University of Alberta, Canada)
Article 3
Information Security Effectiveness: Conceptualization and Validation of a Theory (pages 37-60)
Kenneth J. Knapp (US Air Force Academy, USA), Thomas E. Marshall (Auburn University, USA), R. Kelly Rainer Jr. (Auburn University, USA), F. Nelson Ford (Auburn University, USA)
Article 4
The Role of Privacy Risk in IT Acceptance: An Empirical Study (pages 61-73)
Joseph A. Cazier (Appalachian State University, USA), E. Vance Wilson (University of Wisconsin-Milwaukee, USA), B. Dawn Medlin (Appalachian State University, USA)
Article 5
Issue 3
Article 1
A Projection of the Future Effects of Quantum Computation on Information Privacy (pages 1-12)
Geoff Skinner (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia), Elizabeth Chang (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia)
Article 2
Information Systems Security: Cases of Network Administrator Threats (pages 13-25)
Hamid Jahankhani (University of East London, UK), Shantha Fernando (University of Moratuwa, Sri Lanka), Mathews Z. Nkhoma (University of East London, UK), Haralambos Mouratidis (University of East London, UK)
Article 3
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection (pages 26-46)
Vishal Vatsa (Indian Institute of Technology, India), Shamik Sural (Indian Institute of Technology, India), A. K. Majumdar (Indian Institute of Technology, India)
Article 4
Defeating Active Phishing Attacks for Web-Based Transactions (pages 47-60)
Xin Luo (Virginia State University, USA), Tan Teik Guan (Data Security Systems Solutions Pte Ltd, Singapore)
Article 5
A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations (pages 61-75)
Latha Parameswaran (AMRITA University, India), K. Anbumani (Karunya University, India)
Issue 4
Article 1
An Ontology of Information Security (pages 1-23)
Almut Herzog (Linkopings Universitet, Sweden), Nahid Shahmehri (Linkopings Universitet, Sweden), Claudiu Duma (Linkopings Universitet, Sweden)
Article 2
Towards Autonomous User Privacy Control (pages 24-46)
Amr Ali Eldin (Delft University of Technology, The Netherlands), Rene Wagenaar (Delft University of Technology, The Netherlands)
Article 3
E-Mail Worm Detection Using Data Mining (pages 47-61)
Mohammad M. Masud (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
A Simulation Model of Information Systems Security (pages 62-74)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA)
Article 5
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions (pages 75-86)
Kirk P. Arnett (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA), Allen C. Johnston (University of Alabama Birmingham, USA), Jongki Kim (Pusan National University, Republic of Korea), Hajin Hwang (Catholic University of Daegu, Republic of Korea)