Journal Contents: International Journal of Information Security and Privacy (IJISP)

Volume 15 (2021)
Issue 1
Article 1
Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks (pages 1-23)
Peng Li (Nanjing University of Posts and Telecommunications, China), Chao Xu (Nanjing University of Posts and Telecommunications, China), He Xu (Nanjing University of Posts and Telecommunications, China)
Issue 2
Issue 3
Issue 4
Volume 14 (2020)
Issue 1
Special Issue on Security, Privacy, and Trust in Modern Management
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasth, Ajmer, India), Frank Lin (Central University of Rajasth, Ajmer, India)
Article 1
Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors (pages 1-15)
Amanpreet Kaur (Jaypee Institute of Information Technology, Uttar Pradesh, India), Padam Kumar (Jaypee Institute of Information Technology, Uttar Pradesh, India), Govind P. Gupta (National Institute of Technology Raipur, Raipur, India)
Article 2
Manifold Surveillance Issues in Wireless Network and the Secured Protocol (pages 16-26)
Mamata Rath (Birla School of Management (IT), Birla Global University, Odisha, India), Bibudhendu Pati (Department of Computer Science, Rama Devi Women's University, Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, Odisha, India)
Article 3
Comparison of Various DoS Algorithm (pages 27-43)
Mainul Hasan (University of Petroleum and Energy Studies, Dehradun, India), Amogh Venkatanarayan (University of Petroleum and Energy Studies, Dehradun, India), Inder Mohan (University of Petroleum and Energy Studies, Dehradun, India), Ninni Singh (University of Petroleum and Energy Studies, Dehradun, India), Gunjan Chhabra (University of Petroleum and Energy Studies, Dehradun, India)
Article 4
Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE (pages 44-66)
Neha Agarwal (Amity University, Uttar Pradesh, India), Ajay Rana (Amity University, Uttar Pradesh, India), J.P. Pandey (KNIT, Delhi, India), Amit Agarwal (School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India)
Article 5
An Improved Intrusion Detection System to Preserve Security in Cloud Environment (pages 67-80)
Partha Ghosh (Netaji Subhash Engineering College, MAKAUT, Kolkata, India), Sumit Biswas (Tata Consultancy Services Ltd, Mumbai, India), Shivam Shakti (Netaji Subhash Engineering College, MAKAUT, Kolkata, India), Santanu Phadikar (Maulana Abul Kalam Azad University of Technology, Kolkata, India)
Issue 2
Article 1
A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks (pages 1-19)
Khundrakpam Johnson Singh (National Institute of Technology, Manipur, India), Janggunlun Haokip (National Institute of Technology Manipur, India), Usham Sanjota Chanu (NIELIT, Imphal, India)
Article 2
Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice (pages 20-40)
Rui Filipe Silva (Polytechnic of Coimbra - ISEC, Coimbra, Portugal), Raul Barbosa (University of Coimbra - UC Center for Informatics and Systems of University of Coimbra, Coimbra, Portugal), Jorge Bernardino (Polytechnic of Coimbra - ISEC, Coimbra, Portugal)
Article 3
A Valid and Correct-by-Construction Formal Specification of RBAC (pages 41-61)
Hania Gadouche (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria), Zoubeyr Farah (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria), Abdelkamel Tari (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia., Bejaia, Algeria)
Article 4
Aggregate Searchable Encryption With Result Privacy (pages 62-82)
Dhruti P. Sharma (S.V. National Institute of Technology, Surat, India), Devesh C. Jinwala (S.V. National Institute of Technology, Surat, India)
Article 5
Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain (pages 83-101)
Giridhar Maji (Asansol Polytechnic, Asansol, India), Sharmistha Mandal (Kanyapur Polytechnic, Asansol, India), Soumya Sen (University of Calcutta, Calcutta, India)
Article 6
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem (pages 102-115)
Kouraogo Yacouba (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Orhanou Ghizlane (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Elhajji Said (LabMiA-SI, Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco)
Article 7
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment (pages 116-142)
Shelendra Kumar Jain (Department of Computer Science, Central University of Rajasthan, NH-8, Bandar Sindri, Ajmer, 305817, Rajasthan, India), Nishtha Kesswani (Department of Computer Science, Central University of Rajasthan, NH-8, Bandar Sindri, Ajmer, 305817, Rajasthan, India)
Issue 3
Special Issue on “Machine Learning Techniques for Information Security and Data Privacy”
Editorial Preface
Kanubhai Patel (Faculty of Computer Science and Applications, Charotar University of Science and Technology, Changa, India), Laura Sani (University of Parma, Parma, Italy), Gianfranco Lombardo (Department of Engineering and Architecture, University of Parma, Parma, Italy)
Article 1
Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network (pages 1-17)
Geetika Sarna (Netaji Subhas University of Technology, India), M. P. S. Bhatia (Netaji Subhas University of Technology, India)
Article 2
Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning (pages 18-37)
Sharmila Subudhi (ITER, Siksha 'O' Anusandhan Deemed to be University, India), Suvasini Panigrahi (Veer Surendra Sai University of Technology, India)
Article 3
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application (pages 38-49)
Pranav Vyas (Charotar University of Science and Technology, India), Bhushan Trivedi (GLS University, India)
Article 4
Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments (pages 50-71)
Oussama Hannache (MISC Laboratory, Computer Science Department, University of Constantine 2, Algeria), Mohamed Chaouki Batouche (Information Technology Department, CCIS - RC, Princess Nourah University, Riyadh, Saudi Arabia)
Article 5
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization (pages 72-94)
Pooja Parameshwarappa (University of Maryland, Baltimore County, USA), Zhiyuan Chen (University of Maryland, Baltimore County, USA), Gunes Koru (University of Maryland, Baltimore County, USA)
Article 6
Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets (pages 95-114)
Ravi Kiran Varma Penmatsa (MVGR College of Engineering, India), Akhila Kalidindi (MVGR College of Engineering, India), S. Kumar Reddy Mallidi (Sri Vasavi Engineering College, India)
Article 7
An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions (pages 115-133)
J. Rene Beulah (Saveetha School of Engineering, India), D. Shalini Punithavathani (Government College of Engineering, India)
Issue 4
Article 1
A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols (pages 1-21)
Noureddine Aribi (LITIO Lab., Université Oran1, Oran, Algeria), Yahia Lebbah (LITIO Lab., Université Oran1, Oran, Algeria)
Article 2
An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System (pages 22-41)
S. Immaculate Shyla (Department of Computer Science, S.T. Hindu College, Nagercoil Manonmaniam Sundaranar University, Nagercoil, India), S.S. Sujatha (Department of Computer Science and Application, S.T. Hindu College, Nagercoil Manonmaniam Sundaranar University, Nagercoil, India)
Article 3
A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud (pages 42-56)
Mohamed Haddadi (Département d'Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria), Rachid Beghdad (Département d'Informatique, Faculté des Sciences Exactes, Université de Bejaia, Bejaia, Algeria)
Article 4
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications (pages 57-73)
Charu Gupta (Indira Gandhi Delhi Technical Universiy for Women, Delhi, India), Rakesh Kumar Singh (Indira Gandhi Delhi Technical University for Women, Delhi, India), Simran Kaur Bhatia (Indira Gandhi Delhi Technical University for Women, Delhi, India), Amar Kumar Mohapatra (Indira Gandhi Delhi Technical University for Women, Delhi, India)
Article 5
Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews (pages 74-91)
Andrew R. Besmer (Winthrop University, Rock Hill, USA), Jason Watson (University of North Alabama, Florence, USA), M. Shane Banks (University of North Alabama, Florence, USA)
Article 7
A Tweakable Key Alternating Lightweight Cipher for Internet of Things (pages 113-133)
Mary Shamala L. (Pondicherry Engineering College, Pondicherry, India), Zayaraz G. (Pondicherry Engineering College, Pondicherry, India), Vivekanandan K. (Pondicherry Engineering College, Pondicherry, India), Vijayalakshmi V. (Pondicherry Engineering College, Pondicherry, India)
Volume 13 (2019)
Issue 1
Special Issue on Cyber Security and Privacy in Communication Networks
Guest Editorial Preface
C.P. Gupta (Rajasthan Technical University, Kota, India)
Article 1
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm (pages 1-16)
Oshin Sharma (PES University, Bangalore, India), Hemraj Saini (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India)
Article 2
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence (pages 17-29)
Yerra Shankar Rao (Gandhi Institute of Excellent Technocrafts, Deuliapatna, India), Prasant Kumar Nayak (C. V. Raman College of Engineering, Mahura, India), Hemraj Saini (Jayppe University of Information Technology, Waknaghat, India), Tarini Charana Panda (Department of Mathematics, Ravenshaw University, Cuttack, India)
Article 3
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques (pages 30-45)
Pratiksha Gautam (Jaypee University of Information Technology, Waknaghat, India), Hemraj Saini (Jayppe University of Information Technology, Waknaghat, India)
Article 4
Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET (pages 46-58)
Mamata Rath (Department of Computer Science and Engineering, C.V.Raman College of Engineering, Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India)
Article 5
Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing (pages 59-69)
Pratiksha Gautam (Jaypee University of Information Technology, Waknaghat, India), Mohd. Dilshad Ansari (CMR College of Engineering & Technology, Hyderabad, India), Surender Kumar Sharma (Department of Physics, School of Basic and Applied Science, Galgotias University, Greater Noida, India)
Article 6
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things (pages 70-85)
Rajwinder Kaur (Central University of Rajasthan, Ajmer, India), Karan Verma (Central University of Rajasthan, Ajmer, India), Shelendra Kumar Jain (Central University of Rajasthan, Ajmer, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 7
A Survey: Intrusion Detection Techniques for Internet of Things (pages 86-105)
Sarika Choudhary (Central University of Rajasthan, Ajmer, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Issue 2
Article 1
Reversible Data Hiding Scheme for Video (pages 1-13)
T. Bhaskar (JNTUH, Hyderabad, India), Madhu Oruganti (Department of ECE, Sreenidhi Institute of Science and Technology SNIST, Hyderabad, India)
Article 2
An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments (pages 14-31)
Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Muhammad Usama (Bahria University, Karachi, Pakistan), Khaled Almustafa (Prince Sultan University, Riyadh, Saudi Arabia), Waheed Iqbal (University of the Punjab, Lahore, Pakistan), Muhammad Ali Raza (University of the Punjab, Lahore, Pakistan), Tanveer Khan (COMSATS University, Islamabad, Pakistan)
Article 3
Cyber Defense Maturity Levels and Threat Models for Smart Cities (pages 32-46)
Ali Amur Al Shidhani (The Research Council, Muscat, Oman)
Article 4
Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies (pages 47-66)
Martin Boldt (Blekinge Institute of Technology, Karlskrona, Sweden), Kaavya Rekanar (Blekinge Institute of Technology, Karlskrona, Sweden)
Article 5
Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions (pages 67-85)
Marwan Majeed Nayyef (Anbar University, Baghdad, Iraq), Ali Makki Sagheer (University of Anbar, Baghdad, Iraq)
Article 6
A Mathematical Model of HMST Model on Malware Static Analysis (pages 86-103)
Satheesh Abimannan (VIT University, Vellore, India), Kumaravelu R. (VIT University, Vellore, India)
Article 7
Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing (pages 104-119)
Feng Xu (Nanjing University of Aeronautics and Astronautics, Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, China), Mingming Su (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Yating Hou (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China)
Issue 3
Special Issue on Security and Privacy Issues in Cloud Computing, Big Data and IoT Technology: Current Progress and Future Directions
Guest Editorial Preface
Manu Vardhan (Department of Computer Science and Engineering, National Institute of Technology Raipur, Chhattisgarh, India), Malay Kumar (Department of Computer Science and Engineering, National Institute of Technology Raipur, Chhattisgarh, India)
Article 1
An Intelligent Surveillance System Based on IoT for Internal Security of a Nation (pages 1-30)
Tarun Kumar (CSED, MNNIT Allahabad, Prayagraj, India), Dharmender Singh Kushwaha (CSED, MNNIT Allahabad, Prayagraj, India)
Article 2
Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection (pages 31-47)
Alok Kumar Shukla (NIT Raipur, Raipur, India), Pradeep Singh (NIT Raipur, Raipur, India)
Article 3
Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site (pages 48-59)
Abhishek Kumar Singh (NIT Raipur, Raipur, India), Naresh Kumar Nagwani (National Institute of Technology Raipur, Raipur, India), Sudhakar Pandey (National Institute of Technology Raipur, Raipur, India)
Article 4
A Priority Based Efficient Secure Framework for WBANs (pages 60-73)
Vinay Pathak (JNU, New Delhi, India)
Article 5
A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks (pages 74-90)
Deepika Agrawal (National Institute of Technology Raipur, Raipur, India), Sudhakar Pandey (National Institute of Technology Raipur, Raipur, India), Veena Anand (National Institute of Technology Raipur, Raipur, India)
Article 6
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT (pages 91-105)
Anurag Shukla Shukla (NIT Raipur, Raipur, India), Sarsij Tripathi (NIT Raipur, Raipur, India)
Article 7
Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce (pages 106-122)
Ashish Kumar Tripathi (Delhi Technological University, New Delhi, India), Kapil Sharma (Delhi Technological University, New Delhi, India), Manju Bala (Indraprastha College of Women, New Delhi, India)
Issue 4
Article 1
A Quantum Secure Entity Authentication Protocol Design for Network Security (pages 1-11)
Surjit Paul (IIT Kharagpur, Kharagpur, India), Sanjay Kumar (NIT Jamshedpur, Jamshedpur, India), Rajiv Ranjan Suman (NIT Jamshedpur, Jamshedpur, India)
Article 2
Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption (pages 12-27)
G. Sravan Kumar (Acharya Nagarjuna University, Guntur, India), A. Sri Krishna (RVR & JC College of Engineering, Guntur, India)
Article 3
A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set (pages 28-52)
N. Syed Siraj Ahmed (VIT University, Vellore, India), Debi Prasanna Acharjya (School of Computing Sciences and Engineering,VIT University, Vellore, India)
Article 4
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions (pages 53-67)
Ranu Gupta (Jaypee University of Engineering and Technology, Guna, India), Rahul Pachauri (Jaypee University of Engineering and Technology, Guna, India), Ashutosh K. Singh (Thapar Institute of Engineering and Technology University, Punjab, India)
Article 5
Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks (pages 68-88)
Asha Jyothi Ch (JNTUH College of Engineering, Jagtial, India), Narsimha G. (JNTUH Hyderabad, Hyderabad, India)
Article 6
An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps (pages 89-108)
Pankaj Kumar (School of Computing Science and Engineering, Galgotias University, Delhi, India), Vishnu Sharma (Amity School of Engineering, Amity University, Noida, India), Gaurav Sharma (Département d'Informatique, Université Libre de Bruxelles, Bruxelles, Belgium), Tarunpreet Bhatia (Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Punjab, India)
Article 7
A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks (pages 109-138)
Ismaila Adeniyi Kamil (University of Ibadan, Ibadan, Nigeria), Sunday Oyinlola Ogundoyin (University of Ibadan, Ibadan, Nigeria)
Volume 12 (2018)
Issue 1
Special Issue on Security Mechanisms
Editorial Preface
G. Geetha (Lovely Professional University, Punjab, India)
Article 1
A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security (pages 1-12)
Ranjeet Kumar Singh (National Institute of Technology, Department of Computer Applications, Jamshedpur, India), Dilip Kumar Shaw (National Institute of Technology, Department of Computer Applications, Jamshedpur, India)
Article 2
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification (pages 13-28)
Gautam Kumar (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 3
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET (pages 29-41)
Arun Malik (Lovely Professional University, Punjab, India), Babita Pandey (Lovely Professional University, Punjab, India)
Article 4
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN (pages 42-52)
Geetanjali Rathee (Jaypee University of Information Technology, Solan, India), Hemraj Saini (Jaypee University of Information Technology, Solan, India)
Article 5
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN (pages 53-62)
Gulshan Kumar (Lovely Professional University, Punjab, India), Rahul Saha (Lovely Professional University, Punjab, India), Mandeep Singh (Lovely Professional University, Punjab, India), Mritunjay Kumar Rai (Lovely Professional University, Punjab, India)
Article 6
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor (pages 63-73)
Rajeev Sobti (Lovely Professional University, Punjab, India), Geetha Ganesan (Lovely Professional University, Punjab, India)
Article 7
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation (pages 74-88)
Rajni Mohana (Jaypee University of Information Technology, Solan, India)
Article 8
Breaching Security of Full Round Tiny Encryption Algorithm (pages 89-98)
Puneet Kumar Kaushal (Lovely Professional University, Punjab, India), Rajeev Sobti (Lovely Professional University, Punjab, India)
Issue 2
Special Issue on Security Challenges in Internet of Things (IoT)
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasthan, Ajmer, India), C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Kota, India), Frank Lin (California State University San Bernardino (CSUSB), San Bernardino, USA)
Article 1
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis (pages 1-25)
Malay Kumar (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India), Manu Vardhan (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India)
Article 2
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN (pages 26-37)
Geetanjali Rathee (Jaypee University of Information Technology, India), Hemraj Saini (Jaypee University of Information Technology, India)
Article 3
A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks (pages 38-45)
Jhum Swain (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, Odisha, India), Bibudhendu Pati (Department of Computer Science and Engineering, C. V. Raman College of Engineering, Bhubaneswar, India)
Article 4
An Improvised Framework for Privacy Preservation in IoT (pages 46-63)
Muzzammil Hussain (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India), Neha Kaliya (Department of Computer Science and Engineering, Central University of Rajasthan, Ajmer, India)
Issue 3
Article 1
A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia (pages 1-15)
Noushin Ashrafi (University of Massachusetts Boston, Boston, USA), Jean-Pierre Kuilboer (University of Massachusetts Boston, Boston, USA)
Article 2
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm (pages 16-26)
Bouchra Echandouri (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fouzia Omary (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Fatima Ezzahra Ziani (Faculty of Sciences, Mohammed V University, Rabat, Morocco), Anas Sadak (Faculty of Sciences, Mohammed V University, Rabat, Morocco)
Article 3
Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem (pages 27-41)
Hridoy Jyoti Mahanta (Computer Science and Engineering, Assam University, Silchar, India), Ajoy Kumar Khan (Computer Science and Engineering, Assam University, Silchar, India)
Article 4
A Literature Review on Image Encryption Techniques (pages 42-83)
S Geetha (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), P Punithavathi (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), A Magnus Infanteena (School of Computing Science and Engineering, Vellore Institute of Technology Chennai Campus, Chennai, India), S Siva Sivatha Sindhu (Shan Systems LLC, Jersey City, USA)
Article 5
Blind Image Source Device Identification: Practicality and Challenges (pages 84-99)
Udaya Sameer Venkata (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India), Ruchira Naskar (Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India)
Article 6
Misuse of ‘Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data (pages 100-122)
Benjamin Stark (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heiko Gewald (Neu-Ulm University of Applied Sciences, Neu-Ulm, Germany), Heinrich Lautenbacher (University Hospital Tübingen, Tübingen, Germany), Ulrich Haase (Klinikum Stuttgart, Stuttgart, Germany), Siegmar Ruff (DSM DatenSchutzManagement Schurer GmbH, Tübingen, Germany)
Article 8
Association Rule Hiding in Privacy Preserving Data Mining (pages 141-163)
S. Vijayarani Mohan (Department of Computer Science, Bharathiar University, Coimbatore, India), Tamilarasi Angamuthu (Department of MCA, Kongu Engineering College, Erode, India)
Issue 4
Article 1
Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Ω) (pages 1-23)
Martin Konan (University of Electronic Science and Technology of China (UESTC), Chengdu, China), Wenyong Wang (University of Electronic Science and Technology of China (UESTC), Chengdu, China)
Article 2
VuWaDB: A Vulnerability Workaround Database (pages 24-34)
Atefeh Khazaei (Yazd University, Yazd, Iran), Mohammad Ghasemzadeh (Yazd University, Yazd, Iran), Christoph Meinel (Hasso Plattner Institute, Potsdam, Germany)
Article 3
Securing Multiple Biometric Data Using SVD and Curvelet-Based Watermarking (pages 35-53)
Rohit M. Thanki (C. U. Shah University, Wadhwan City, India), Komal Rajendrakumar Borisagar (Atmiya Institute of Technology and Science, Rajkot, India)
Article 4
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO) (pages 54-67)
Charifa Hanin (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Fouzia Omary (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Souad Elbernoussi (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Khadija Achkoun (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco), Bouchra Echandouri (Faculty of Sciences, Mohammed V University in Rabat, Rabat, Morocco)
Article 5
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain (pages 68-81)
Xueping Liang (Institute of Information Engineering, Chinese Academy of Sciences, China & School of Cyber Security, University of Chinese Academy of Sciences, China & Old Dominion University, USA), Sachin Shetty (Old Dominion University, USA), Deepak K. Tosh (Department of Computer Science, University of Texas at El Paso, USA), Juan Zhao (Tennessee State University, USA), Danyi Li (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Jihong Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Article 6
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards (pages 82-97)
Patryk Szewczyk (Edith Cowan University, Joondalup, Australia), Krishnun Sansurooah (Edith Cowan University, Joondalup, Australia), Patricia A. H. Williams (Flinders University, Adelaide, Australia)
Volume 11 (2017)
Issue 1
Article 1
Privacy and Territoriality Issues in an Online Social Learning Portal (pages 1-17)
Mohd Anwar (North Carolina A&T State University, Greensboro, NC, USA), Peter Brusilovsky (University of Pittsburgh, Pittsburgh, PA, USA)
Article 2
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees (pages 18-34)
Mohamed Amine Boudia (Dr. Moulay Tahar University of Saida, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Dr. Moulay Tahar University of Saida, Saida, Algeria)
Article 3
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN (pages 35-51)
Mukesh Kumar (National Institute of Technology, Hamirpur, India), Kamlesh Dutta (National Institute of Technology, Hamirpur, India)
Article 4
A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes (pages 52-64)
Emmy Mugisha (Nanjing University of Science and Technology, Nanjing, China), Gongxuan Zhang (Nanjing University of Science and Technology, Nanjing, China), Maouadj Zine El Abidine (Nanjing University of Science and Technology, Nanjing, China), Mutangana Eugene (Nanjing University of Science and Technology, Nanjing, China)
Issue 2
Special Issue on Cyber Security and Privacy in Communication Networks (Part 1)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password (pages 1-10)
Prakash Mohan (Karpagam College of Engineering (Autonomous), Coimbatore, India), Saravanakumar Chelliah (St. Joseph's Institute of Technology, Chennai, India)
Article 2
Bit Forwarding 3-Bits Technique for Efficient Modular Exponentiation (pages 11-24)
Satyanarayana Vollala (National Institute of Technology, Tiruchirappalli, India), B. Shameedha Begum (National Institute of Technology, Tiruchirappalli, India), Amit D. Joshi (National Institute of Technology, Tiruchirappalli, India), N. Ramasubramanian (National Institute of Technology, Tiruchirappalli, India)
Article 3
Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies (pages 25-37)
Regner Sabillon (Universitat Oberta de Catalunya, Barcelona, Spain), Jordi Serra-Ruiz (Universitat Oberta de Catalunya, Barcelona, Spain), Victor Cavaller (Universitat Oberta de Catalunya, Barcelona, Spain), Jeimy J. Cano (Universidad de los Andes, Bogota, Colombia)
Article 4
PKI Deployment Challenges and Recommendations for ICS Networks (pages 38-48)
Nandan Rao (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Shubhra Srivastava (ABB Global Industries and Services Pvt Ltd., Bangalore, India), Sreekanth K.S. (ABB Global Industries and Services Pvt Ltd., Bangalore, India)
Article 5
Framework to Secure Browser Using Configuration Analysis (pages 49-63)
Harshad Suryakant Wadkar (Defence Institute of Advanced Technology, Pune, India), Arun Mishra (Defence Institute of Advanced Technology, Pune, India), Arati M. Dixit (Savitribai Phule Pune University, Pune, India)
Issue 3
Special Issue Cyber Security and Privacy in Communication Networks (Part 2)
Guest Editorial Preface
C. P. Gupta (Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority (pages 1-14)
Sarvesh Tanwar (Mody University of Science and Technology, Lakshmangarh, India), Anil Kumar (Mody University of Science and Technology, Lakshmangarh, India)
Article 2
Identification of Cryptographic Vulnerability and Malware Detection in Android (pages 15-28)
Anjali Kumawat (Government Women Engineering College, Ajmer, India), Anil Kumar Sharma (Government Women Engineering College, Ajmer, India), Sunita Kumawat (Government Women Engineering College, Ajmer, India)
Article 3
Malware Detection by Static Checking and Dynamic Analysis of Executables (pages 29-41)
Deepti Vidyarthi (Defence Institute of Advanced Technology, Pune, India), S.P. Choudhary (Defence Institute of Advanced Technology, Pune, India), Subrata Rakshit (Center of Artificial Intelligence & Robotics, Bangalore, India), C.R.S. Kumar (Defence Institute of Advanced Technology, Pune, India)
Article 4
Localization in Wireless Sensor Networks Using Soft Computing Approach (pages 42-53)
Sunil Kumar Singh (National Institute of Technology Patna, Patna, India), Prabhat Kumar (Department of Computer Science and Engineering, National Institute of Technology Patna, Patna, India), Jyoti Prakash Singh (National Institute of Technology Patna, Patna, India)
Article 5
A Secure Cloud Storage using ECC-Based Homomorphic Encryption (pages 54-62)
Daya Sagar Gupta (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India), G. P. Biswas (Indian Institute of Technology (ISM) Dhanbad, Dhanbad, India)
Article 6
Honeypot Baselining for Zero Day Attack Detection (pages 63-74)
Saurabh Chamotra (CDAC, Mohali, India), Rakesh Kumar Sehgal (CDAC, Mohali, India), Ram Swaroop Misra (CDAC, Mohali, India)
Issue 4
Article 1
A Survey on Denial of Service Attacks and Preclusions (pages 1-15)
Nagesh K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sumathy R. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Devakumar P. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sathiyamurthy K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India)
Article 2
Detection of Drive-by Download Attacks Using Machine Learning Approach (pages 16-28)
Monther Aldwairi (Jordan University of Science and Technology, Department of Network Engineering and Security, Irbid, Jordan), Musaab Hasan (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E), Zayed Balbahaith (Zayed University, College of Technological Innovation, Abu Dhabi, U.A.E)
Article 3
Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2 (pages 29-46)
Manish Kumar (Punjabi University, Department of Computer Engineering, Patiala, India), Abhinav Bhandari (Punjabi University, Department of Computer Engineering, Patiala, India)
Article 4
Malware Methodologies and Its Future: A Survey (pages 47-64)
Chandan Kumar Behera (Andhra Univeristy, Visakhapatnam, India), D. Lalitha Bhaskari (Andhra Univeristy, Visakhapatnam, India)
Volume 10 (2016)
Issue 1
Article 1
Combination of Access Control and De-Identification for Privacy Preserving in Big Data (pages 1-27)
Amine Rahmani (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Sciences, Dr. Tahar Moulay University of Saida, Algeria)
Article 2
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry (pages 28-44)
Colin Lai (Macao Polytechnic Institute, Macao), Hung-Lian Tang (Eastern Michigan University, Ypsilanti, MI, USA), J. Michael Tarn (Department of Business Information Systems, Western Michigan University, Kalamazoo, MI, USA), Sock Chung (Eastern Michigan University, Ypsilanti, MI, USA)
Article 3
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining (pages 45-65)
Pawan R. Bhaladhare (SNJB's College of Engineering, Chandwad, India), Devesh C. Jinwala (Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, India)
Issue 2
Article 1
A Smart Grid Security Architecture for Wireless Advanced Metering Infrastructure (AMI) (pages 1-10)
Aftab Ahmad (John Jay College of Criminal Justice, City University of New York (CUNY), New York, NY, USA)
Article 2
Are the Payments System and e-Banking in India Safer than in other SAARC Members? (pages 11-25)
Rituparna Das (University of Petroleum and Energy Studies, Dehradun, India)
Article 3
Analysis of Existing Trust Based Routing Schemes Used in Wireless Network (pages 26-40)
Kajal S. Patel (Government Engineering College, Rajkot, India), Jagdish S. Shah (Government Engineering College, Patan, India)
Article 4
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level (pages 41-63)
Shaikha Alduaij (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Zhiyuan Chen (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA), Aryya Gangopadhyay (University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA)
Issue 3
Special Issue on Security of Information and Networks
Guest Editorial Preface
Atilla Elçi (Electrical and Electronics Engineering Department, Aksaray University, Aksaray, Turkey), Oleg Borisovich Makarevich (Southern Federal University, Taganrog, Russia), Manoj S. Gaur (Malaviya National Institute of Technology, Jaipur, India), Mehmet A. Orgun (Department of Computing, Macquarie University, Sydney, Australia)
Article 1
Threshold Secret Sharing Scheme for Compartmented Access Structures (pages 1-9)
P. Mohamed Fathimal (Manonmaniam Sundaranar University, Tirunelveli, India), P. Arockia Jansi Rani (Manonmaniam Sundaranar University, Tirunelveli, India)
Article 2
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method (pages 10-24)
Nilay R. Mistry (Institute of Forensic Science, Gandhinagar, India), Binoj Koshy (Institute of Forensic Science, Gandhinagar, India), Mohindersinh Dahiya (Institute of Forensic Science, Gandhinagar, India), Chirag Chaudhary (Institute of Forensic Science, Gandhinagar, India), Harshal Patel (Institute of Forensic Science, Gandhinagar, India), Dhaval Parekh (Institute of Forensic Science, Gandhinagar, India), Jaidip Kotak (Institute of Forensic Science, Gandhinagar, India), Komal Nayi (Institute of Forensic Science, Gandhinagar, India), Priyanka Badva (Institute of Forensic Science, Gandhinagar, India)
Article 3
Preventing Identity Disclosure in Social Networks Using Intersected Node (pages 25-41)
Amardeep Singh (PEC University of Technology, Chandigarh, India), Divya Bansal (PEC University of Technology, Chandigarh, India), Sanjeev Sofat (PEC University of Technology, Chandigarh, India)
Article 4
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks (pages 42-66)
Erukala Suresh Babu (K.L. University, Vijayawada, India), C. Nagaraju (Y.V. University, Proddutur, India), M.H.M. Krishna Prasad (J.N.T. University, Kakinada, India)
Article 5
Metamorphic malware detection using opcode frequency rate and decision tree (pages 67-86)
Mahmood Fazlali (Department of Computer Science, Cyberspace Research Institute, Shahid Beheshti University, GC, Tehran, Iran), Peyman Khodamoradi (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Farhad Mardukhi (Department of Computer Engineering, Razi University, Kermanshah, Iran), Masoud Nosrati (Department of Computer Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran), Mohammad Mahdi Dehshibi (Pattern Research Center, Tehran, Iran)
Issue 4
Article 1
Hybrid Intrusion Detection Framework for Ad hoc networks (pages 1-32)
Abdelaziz Amara Korba (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Mehdi Nafaa (Networks and Systems Laboratory (LRS), Badji Mokhtar-Annaba University, Annaba, Algeria), Salim Ghanemi (Embedded Systems Laboratory (LASE), Badji Mokhtar-Annaba University, Annaba, Algeria)
Article 2
A Framework for Protecting Users' Privacy in Cloud (pages 33-43)
Adesina S. Sodiya (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria), Adegbuyi B. (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria)
Article 3
Creating Time-Limited Attributes for Time-Limited Services in Cloud Computing (pages 44-57)
Azin Moradbeikie (International University of Imamreza, Mashhad, Iran), Saied Abrishami (Ferdowsi University of Mashhad, Mashhad, Iran), Hasan Abbasi (International University of Imamreza, Mashhad, Iran)
Article 4
Accurate Classification Models for Distributed Mining of Privately Preserved Data (pages 58-73)
Sumana M. (M. S. Ramaiah Institute of Technology, Bangalore, India), Hareesha K.S. (Manipal Institute of Technology, Udupi, India)
Volume 9 (2015)
Issue 1
Article 1
Client-Side Detection of Clickjacking Attacks (pages 1-25)
Hossain Shahriar (Department of Computer Science, Kennesaw State University, Kennesaw, GA, USA), Hisham M. Haddad (Kennesaw State University, Kennesaw, GA, USA)
Article 2
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour (pages 26-46)
Teodor Sommestad (Swedish Defence Research Agency (FOI), Linköping, Sweden), Henrik Karlzén (Swedish Defence Research Agency (FOI), Linköping, Sweden), Jonas Hallberg (Swedish Defence Research Agency (FOI), Linköping, Sweden)
Article 3
Short Online/Off-line Signature Scheme for Wireless Sensor Networks (pages 47-61)
Anser Ghazzaal Ali Alquraishee (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Jayaprakash Kar (Department of Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Naomie Salim (Faculty of Computing Universiti Teknologi Malaysia, Sekudai, Malaysia)
Article 4
Disassociations in Security Policy Lifecycles (pages 62-77)
Michael Lapke (University of Mary Washington, Fredericksburg, VA, USA), Gurpreet Dhillon (School of Business, Virginia Commonwealth University, Richmond, VA, USA)
Issue 2
Special Issue on Trust, Security and Privacy in Computing and Communications (Part 1)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
Several Oblivious Transfer Variants in Cut-and-Choose Scenario (pages 1-12)
Chuan Zhao (School of Computer Science and Technology, Shandong University, Jinan, China), Han Jiang (School of Computer Science and Technology, Shandong University, Jinan, China), Qiuliang Xu (School of Computer Science and Technology, Shandong University, Jinan, China), Xiaochao Wei (School of Computer Science and Technology, Shandong University, Jinan, China), Hao Wang (School of Computer Science and Technology, Shandong University, Jinan, China)
Article 2
Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective (pages 13-30)
Aminu Bello Usman (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), William Liu (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Quan Bai (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Ajit Narayanan (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Article 3
Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks (pages 31-59)
Weidong Yang (Key Laboratory of Grain Information Processing and Control Ministry of Education, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China), Liming Sun (Beijing Key Laboratory of IOT information security technology, Institute of Information Engineering, CAS, Beijing, China), Zhenqiang Xu (Zhenqiang Xu, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China)
Article 4
Observations on Genderwise Differences among University Students in Information Security Awareness (pages 60-74)
Ali Farooq (Department of Information Technology, University of Turku, Turku, Finland), Johanna Isoaho (Department of Information Technology, University of Turku, Turku, Finland), Seppo Virtanen (Department of Information Technology, University of Turku, Turku, Finland), Jouni Isoaho (Department of Information Technology, University of Turku, Turku, Finland)
Issue 3
Special Issue on Trust, Security, and Privacy in Computing and Communications (Part 2)
Guest Editorial Preface
Zheng Yan (Xidian University, Xi'an, China and Aalto University, Espoo, Finland), Peter Mueller (IBM Research, Zurich, Switzerland), Xinyi Huang (Fujian Normal University, Fuzhou, China), Xiangjian (Sean) He (University of Technology, Sydney, Australia), Marinella Petrocchi (Istituto di Informatica e Telematica, Pisa, Italy)
Article 1
An Efficient, Anonymous and Unlinkable Incentives Scheme (pages 1-20)
Milica Milutinovic (KU Leuven, Leuven, Belgium), Andreas Put (KU Leuven, Leuven, Belgium), Bart De Decker (KU Leuven, Leuven, Belgium)
Article 2
A Novel OpenFlow-Based DDoS Flooding Attack Detection and Response Mechanism in Software-Defined Networking (pages 21-40)
Rui Wang (Shandong University, Jinan, China), Zhiyong Zhang (Shandong University, Jinan, China), Lei Ju (Shandong University, Jinan, China), Zhiping Jia (Shandong University, Jinan, China)
Article 3
Signature Restoration for Enhancing Robustness of FPGA IP Designs (pages 41-56)
Jing Long (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Dafang Zhang (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Wei Liang (College of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China), Xia'an Bi (College of Mathematics and Computer Science, Hunan Normal University, Changsha, China)
Article 4
Authentication in Ubiquitous Networking (pages 57-83)
Abdullah Mohammed Almuhaideb (College of Computer Science and IT, King Faisal University, Alahsa, Saudi Arabia), Bala Srinivasan (Faculty of Information Technology, Monash University, Melbourne, Australia)
Article 5
Software Defined Intelligent Building (pages 84-99)
Rui Yang Xu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Xin Huang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Jie Zhang (Xi'an Jiaotong-Liverpool University, Suzhou, China), Yulin Lu (Xi'an Jiaotong-Liverpool University, Suzhou, China), Ge Wu (University of Wollongong, Australia), Zheng Yan (Aalto University, Espoo, Finland & Xidian University, China)
Issue 4
Article 1
Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group (pages 1-19)
S. Selva Nidhyananthan (Mepco Schlenk Engineering College, Sivakasi, India), Prasad M. (Mepco Schlenk Engineering College, Sivakasi, India), Shantha Selva Kumari R. (Mepco Schlenk Engineering College, Sivakasi, India)
Article 2
A New Meta-Heuristic based on Human Renal Function for Detection and Filtering of SPAM (pages 26-58)
Mohamed Amine Boudia (GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria, Saida, Algeria)
Article 3
Secure Group Message Transfer Stegosystem (pages 59-76)
Mahinder Pal Singh Bhatia (Department of Computer Engineering, Netaji Subhas Institute of Technology, New Delhi, India), Manjot Kaur Bhatia (Department of Computer Science, University of Delhi, New Delhi, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India)
Volume 8 (2014)
Issue 1
Article 1
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective (pages 1-18)
Mathew Nicho (University of Dubai, Dubai, UAE), Shafaq Khan (University of Dubai, Dubai, UAE)
Article 2
A Covert Communication Model-Based on Image Steganography (pages 19-37)
Mamta Juneja (UIET, Panjab University, Chandigarh, India)
Article 3
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System (pages 38-61)
Prashanta Kumar Patra (Department of CSE, College of Engineering and Technology, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India), Padma Lochan Pradhan (Department of CSE, Central Institute of Technology, Raipur, India)
Article 4
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks (pages 62-78)
Aymen Akremi (CES Research Unit, National School of Engineers of Sfax, Sfax, Tunisia), Hassen Sallay (Al Imam Mohammad Ibn Saud Islamic University. (IMSIU), Riyadh, Saudi Arabia), Mohsen Rouached (College of Computers and Information Technology, Taif University, Taif, Saudi Arabia)
Issue 2
Article 1
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks (pages 1-18)
M. Poongodi (Anna University, Chennai, India), S. Bose (Anna University, Chennai, India)
Article 2
Classification of DOS Attacks Using Visualization Technique (pages 19-32)
Mohamed Cheikh (Computer Science Department, Constantine 2 University, Constantine, Algeria), Salima Hacini (TLSI department, Constantine 2 University, Constantine, Algeria), Zizette Boufaida (Computer Science Department, Constantine 2 University, Constantine, Algeria)
Article 3
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study (pages 33-54)
Xiang Fang (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA), Sooun Lee (Department of Information Systems and Analytics, Miami University, Oxford, OH, USA)
Article 4
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution (pages 55-68)
Vinay Kumar (Vivekananda Institute of Professional Studies, Guru Gobind Singh Indraprastha University, Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India), Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, Delhi, India)
Issue 3
Article 1
Users' Perception of Security for Mobile Communication Technology (pages 1-12)
Mohanad Halaweh (University of Dubai, UAE)
Article 2
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services (pages 13-38)
Wiem Hammami (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia), Ilhem Souissi (National School of Computer Science, Tunis, Tunisia), Lamjed Ben Said (Higher Institute of Management of Tunis, University of Tunis, Tunis, Tunisia)
Article 3
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment (pages 39-62)
Janakiramaiah Bonam (DVR & Dr HS MIC College of Technology, Kanchikacherla, India), Ramamohan Reddy (Sri Venkateswara University, Tirupati, India)
Article 4
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems (pages 63-76)
Xiaojun Wang (Dublin City University, Dublin, Ireland), Brendan Cronin (Dublin City University, Dublin, Ireland)
Issue 4
Article 1
A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System (pages 1-25)
Chikh Ramdane (Sétif 1 University, Sétif, Algeria), Salim Chikhi (MISC Laboratory, Constantine 2 University, Constantine, Algeria)
Article 2
Toward Proactive Mobile Tracking Management (pages 26-43)
Hella Kaffel Ben Ayed (National School of Computer Science, University of Manouba, Manouba, Tunisia), Asma Hamed (National School of Computer Science, University of Manouba, Manouba, Tunisia)
Article 3
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems (pages 44-61)
Amr Ali-Eldin (Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt), Jan Van Den Berg (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands), Semir Daskapan (Faculty of Technology, Policy and Management, Delft University of Technology, Delft, Netherlands)
Article 4
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks (pages 62-102)
Piotr Książak (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), William Farrelly (Department of Computing, Letterkenny Institute of Technology, Letterkenny, Ireland), Kevin Curran (Faculty of Computing & Engineering, Ulster University, Londonderry, UK)
Volume 7 (2013)
Issue 1
Article 1
Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users (pages 1-15)
Nigel Martin (Research School of Accounting and Business Information Systems, The Australian National University, Canberra, ACT, Australia), John Rice (Department of International Business and Asian Studies, Griffith University, Southport, QLD, Australia)
Article 2
Child Security in Cyberspace Through Moral Cognition (pages 16-29)
Satya Prakash (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Abhishek Vaish (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Natalie Coul (School of Computing & Engineering Systems, University of Abertay Dundee, Dundee, UK), SaravanaKumar G (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), T.N. Srinidhi (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India), Jayaprasad Botsa (Indian Institute of Information Technology, Allahabad, Uttar Pradesh, India)
Article 3
Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach (pages 30-44)
Mathews Z. Nkhoma (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam), Duy P. T. Dang (Department of Business IT & Logistics, RMIT University Vietnam, Ho Chi Minh City, Vietnam)
Article 4
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes (pages 45-62)
Ousmane Amadou Dia (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA), Csilla Farkas (Department of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA)
Article 5
Computational Complexity Analysis for a Class of Symmetric Cryptosystems Using Simple Arithmetic Operations and Memory Access Time (pages 63-75)
Walid Y. Zibideh (Qualcomm, San Diego, CA, USA), Mustafa M. Matalgah (Department of Electrical Engineering, University of Mississippi, University, MS, USA)
Issue 2
Article 1
Development of A Formal Security Model for Electronic Voting Systems (pages 1-28)
Katharina Bräunlich (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany), Rüdiger Grimm (Department of Information Systems Research, University of Koblenz-Landau, Koblenz, Germany)
Article 2
Malware Detection and Prevention System Based on Multi-Stage Rules (pages 29-43)
Ammar Alazab (School of Information Technology, Deakin University, Burwood, VIC, Australia), Michael Hobbs (School of Information Technology, Deakin University, Burwood, VIC, Australia), Jemal Abawajy (School of Information Technology, Deakin University, Burwood, VIC, Australia), Ansam Khraisat (Ballarat University, Mt Helen, VIC, Australia)
Article 3
Robust Image Data Hiding Technique for Copyright Protection (pages 44-56)
Siddharth Singh (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India), Tanveer J. Siddiqui (Department of Electronics & Communication, University of Allahabad, Allahabad, Uttar Pradesh, India)
Article 4
Formal Verification of Secrecy, Coercion Resistance and Verifiability Properties for a Remote Electronic Voting Protocol (pages 57-85)
Khaoula Marzouki (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Amira Radhouani (LIP2-LR99ES18, Faculty of Science of Tunis, Tunis-El Manar University, Tunis, Tunisia), Narjes Ben Rajeb (INSAT, LIP2-LR99ES18, Carthage University, Tunis, Tunisia)
Law, Policy and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Book Review
Ken Krechmer (University of Colorado, Boulder, CO, USA)
Issue 3
Article 1
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm (pages 1-15)
Omar Banimelhem (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Lo’ai Tawalbeh (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan), Moad Mowafi (Department of Network Engineering and Security, Jordan University of Science and Technology, Irbid, Jordan), Mohammed Al-Batati (Department of Computer Engineering, Jordan University of Science and Technology, Irbid, Jordan)
Article 2
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA (pages 16-35)
Daniela Simić-Draws (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Stephan Neumann (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Anna Kahlert (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Philipp Richter (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany), Rüdiger Grimm (Institut für Wirtschafts- und Verwaltungsinformatik, Universität Koblenz-Landau, Koblenz, Germany), Melanie Volkamer (Center for Advanced Security Research Darmstadt, Technische Universität Darmstadt, Darmstadt, Germany), Alexander Roßnagel (Projektgruppe verfassungsverträgliche Technikgestaltung (Provet), Universität Kassel, Kassel, Germany, Kassel, Germany)
Article 3
A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain (pages 36-52)
Esraa Omran (Gulf University for Science & Technology, Kuwait City, Kuwait), Tyrone Grandison (Proficiency Labs, Ashland, OR, USA), David Nelson (Faculty of Applied Sciences, University of Sunderland, Sunderland, UK), Albert Bokma (Avedas Information Management, Karlsruhe, Germany)
Article 4
dDelega: Trust Management for Web Services (pages 53-67)
Michele Tomaiuolo (Department of Information Engineering, University of Parma, Parma, Italy)
Issue 4
Article 1
Secure Communication: A Proposed Public Key Watermark System (pages 1-10)
Shadi R. Masadeh (Department of Computer Networks , Al-Isra University, Amman, Jordan,), Shadi Aljawarneh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Ashraf Odeh (Faculty of Information Technology, Al-Isra University Postoffice Amman, Jordan), Abdullah Alhaj (Faculty of Information Technology, University of Jordan, Aqaba, Jordan)
Article 2
Implementation of Improved Hash and Mapping Modified Low Power Parallel Bloom Filter Design (pages 11-21)
K. Saravanan (Department of Electronics and Communication, Nehru Institute of Technology, Coimbatore, Tamil Nadu, India), A. Senthilkumar (Department of Electrical and Electronics, Dr. Mahalingam College of Engineering and Technology, Pollachi, Tamil Nadu, India)
Article 3
A Survey of Security Standards Applicable to Health Information Systems (pages 22-36)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, Center for Cyber Defense (a CAE/IAE), North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 4
An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines (pages 37-52)
Srinivasa K G (Department of Computer Science and Engineering, M. S. Ramaiah Institute of Technology, Bangalore, Karnataka, India)
Article 5
False Alarm Reduction Using Adaptive Agent-Based Profiling (pages 53-74)
Salima Hacini (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria), Zahia Guessoum (LIP6, Pierre et Marie Curie University, Paris, France), Mohamed Cheikh (Lire Laboratory, TLSI Department, Constantine2 University, Constantine, Algeria)
Volume 6 (2012)
Issue 1
Article 1
Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce (pages 1-13)
S. Srinivasan (Texas A&M International University, USA), Robert Barker (University of Louisville, USA)
Article 2
Designing a Secure Cloud Architecture: The SeCA Model (pages 14-32)
Thijs Baars (Utrecht University, The Netherlands), Marco Spruit (Utrecht University, The Netherlands)
Article 3
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs (pages 33-56)
Pei-Yuan Shen (Queensland University of Technology, Australia), Maolin Tang (Queensland University of Technology, Australia), Vicky Liu (Queensland University of Technology, Australia), William Caelli (Queensland University of Technology, Australia)
Article 4
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM (pages 57-76)
Z. Cliffe Schreuders (Leeds Metropolitan University, UK), Tanya McGill (Murdoch University, Australia), Christian Payne (Murdoch University, Australia)
Issue 2
Article 1
Safety Measures for Social Computing in Wiki Learning Environment (pages 1-15)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK), Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia), Joaquim Celestino Júnior (State University of Ceará, Brazil), Rodziah Latih (Universiti Kebangsaan Malaysia, Malaysia), Abdullah Mohd Zin (Universiti Kebangsaan Malaysia, Malaysia)
Article 2
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification (pages 16-33)
Dongjin Kim (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA)
Article 3
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking (pages 34-52)
Roli Bansal (University of Delhi, India), Priti Sehgal (University of Delhi, India), Punam Bedi (University of Delhi, India)
Article 4
ECFS: An Enterprise-Class Cryptographic File System for Linux (pages 53-63)
U. S. Rawat (Jaypee University of Engineering & Technology, India), Shishir Kumar (Jaypee University of Engineering & Technology, India)
Article 5
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption (pages 64-94)
Shaik Shakeel Ahamad (Institute for Development and Research in Banking Technology and University of Hyderabad, India), V. N. Sastry (Institute for Development and Research in Banking Technology and University of Hyderabad, India), Siba K. Udgata (Institute for Development and Research in Banking Technology and University of Hyderabad, India)
Issue 3
Article 1
A Comparative Survey on Cryptology-Based Methodologies (pages 1-37)
Allan Rwabutaza (ATR Center, Wright State University, USA), Ming Yang (Southern Polytechnic State University, USA), Nikolaos Bourbakis (ATR Center, Wright State University, USA)
Article 2
Article 3
Critical Evaluation of RFID Security Protocols (pages 56-74)
Azam Zavvari (Universiti Kebangsaan Malaysia, Malaysia), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia, & Kingston University, UK)
Article 4
Investing in IT Security: How to Determine the Maximum Threshold (pages 75-87)
Amanda Eisenga (Lutgert College of Business, Florida Gulf Coast University, USA), Travis L. Jones (Lutgert College of Business, Florida Gulf Coast University, USA), Walter Rodriguez (Lutgert College of Business, Florida Gulf Coast University, USA)
Article 5
A Practical Approach of Fairness in E-Procurement (pages 88-110)
Debajyoti Konar (Presidency University, India), Chandan Mazumdar (Jadavpur University, India)
Issue 4
Article 1
A Full Review of Attacks and Countermeasures in Wireless Sensor Networks (pages 1-39)
Pejman Niksaz (Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Yazd, Iran), Mohammad Javad Kargar (Department of Computer Engineering, Islamic Azad University, Maybod Branch, Maybod, Iran)
Article 2
A Survey of U.S. Laws for Health Information Security & Privacy (pages 40-54)
Francis Akowuah (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Xiaohong Yuan (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Jinsheng Xu (Department of Computer Science, North Carolina A&T State University, Greensboro, NC, USA), Hong Wang (Department of Management, North Carolina A&T State University, Greensboro, NC, USA)
Article 3
Secure Data Hiding Using Eight Queens Solutions (pages 55-70)
Sunil Kumar Muttoo (Department of Computer Science, University of Delhi, New Delhi, India), Vinay Kumar (Department of IT, Vivekanand Institute of Professional Studies, New Delhi, India), Abhishek Bansal (Department of Computer Science, Indira Gandhi National Tribal University, Amarkantak, India)
Article 4
Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization (pages 71-93)
Ming Yang (Department of Information Technology, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Chih-Cheng Hung (Anyang Normal University, Anyang, China & Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA), Edward Jung (Department of Computer Science and Software Engineering, Center for Biometric Research, Southern Polytechnic State University, GA, USA)
Article 5
CITS: The Cost of IT Security Framework (pages 94-116)
Marco Spruit (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands), Wouter de Bruijn (Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands)
Volume 5 (2011)
Issue 1
Article 1
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment (pages 1-13)
Devon Bennett (University of East London, UK), Hamid Jahankhani (University of East London, UK), Mohammad Dastbaz (University of East London, UK), Hossein Jahankhani (University of East London, UK)
Article 2
A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis (pages 14-32)
A. Bhattarai (University of Memphis, USA), D. Dasgupta (University of Memphis, USA)
Article 3
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications (pages 33-49)
Ioana Lasc (University of Limerick, Ireland), Reiner Dojen (University of Limerick, Ireland), Tom Coffey (University of Limerick, Ireland)
Article 4
Information Privacy: Implementation and Perception of Laws and Corporate Policies by CEOs and Managers (pages 50-66)
Garry L. White (Texas State University – San Marcos, USA), Francis A. Méndez Mediavilla (Texas State University – San Marcos, USA), Jaymeen R. Shah (Texas State University – San Marcos, USA)
Issue 2
Article 1
User Perceptions of Security Technologies (pages 1-12)
Douglas M. Kline (University of North Carolina Wilmington, USA), Ling He (Saginaw Valley State University, USA), Ulku Yaylacicegi (University of North Carolina Wilmington, USA)
Article 2
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree (pages 13-32)
Golam Kaosar (Victoria University, Australia), Xun Yi (Victoria University, Australia)
Article 3
A Mark-Up Language for the Specification of Information Security Governance Requirements (pages 33-53)
Anirban Sengupta (Jadavpur University, India), Chandan Mazumdar (Jadavpur University, India)
Article 4
On the Security of Self-Certified Public Keys (pages 54-60)
Cheng-Chi Lee (Fu Jen Catholic University, Taiwan), Min-Shiang Hwang (Asia University, Taiwan), I-En Liao (National Chung Hsing University, Taiwan)
Issue 3
Article 1
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card (pages 1-18)
Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK), Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Laleh Golafshan (Department of Computer Engineering and IT, Science and Research Branch, Islamic Azad University, Fars, Iran), Mona Taghavi (Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran)
Article 2
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems (pages 19-35)
Harold Pardue (University of South Alabama, USA), Jeffrey P. Landry (University of South Alabama, USA), Alec Yasinsac (University of South Alabama, USA)
Article 3
Intrusion Detection Algorithm for MANET (pages 36-49)
S. Srinivasan (Texas A&M International University, USA), S. P. Alampalayam (APS Technologies, USA)
Article 4
An Integrated Security Governance Framework for Effective PCI DSS Implementation (pages 50-67)
Mathew Nicho (University of Dubai, UAE), Hussein Fakhry (University of Dubai, UAE), Charles Haiber (Kent State University at Stark, USA)
Issue 4
Article 1
A Privacy Agreement Negotiation Model in B2C E-Commerce Transactions (pages 1-7)
Murthy V. Rallapalli (IBM and Stevens Institute of Technology, USA)
Article 2
A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements (pages 8-30)
O. T. Arogundade (Chinese Academy of Sciences, China), A. T. Akinwale (University of Agriculture, Abeokuta, Nigeria), Z. Jin (Peking University, China), X. G. Yang (Chinese Academy of Sciences, China)
Article 3
Evaluating the Quality and Usefulness of Data Breach Information Systems (pages 31-46)
Benjamin Ngugi (Suffolk University, USA), Jafar Mana (Suffolk University, USA), Lydia Segal (Suffolk University, USA)
Article 4
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework (pages 47-58)
Hassen Sallay (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Mohsen Rouached (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Adel Ammar (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Ouissem Ben Fredj (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Khalid Al-Shalfan (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia), Majdi Ben Saad (Imam Muhamad Ibn Saud Islamic University, Saudi Arabia)
Volume 4 (2010)
Issue 1
Article 1
Provable Security for Outsourcing Database Operations (pages 1-17)
Sergei Evdokimov (Humboldt-Universität zu Berlin, Germany), Matthias Fischmann (Humboldt-Universität zu Berlin, Germany), Oliver Günther (Humboldt-Universität zu Berlin, Germany)
Article 2
A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections (pages 18-31)
Ran Tao (Louisiana State University, USA), Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Bin Li (Louisiana State University, USA)
Article 3
A Keystroke Biometric Systemfor Long-Text Input (pages 32-60)
Charles C. Tappert (Pace University, USA), Sung-Hyuk Cha (Pace University, USA), Mary Villani (Pace University, USA), Robert S. Zack (Pace University, USA)
Article 4
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements (pages 61-92)
Surya B. Yadav (Texas Tech University, USA)
Article 5
Are Online Privacy Policies Readable? (pages 93-116)
M. Sumeeth (University of Alberta, Canada), R. I. Singh (University of Alberta, Canada), J. Miller (University of Alberta, Canada)
Issue 2
Article 1
Protecting User Privacy Better with Query l-Diversity (pages 1-18)
Fuyu Liu (University of Central Florida, USA), Kien A. Hua (University of Central Florida, USA)
Article 2
Globalization and Data Privacy: An Exploratory Study (pages 19-35)
Robert L. Totterdale (Robert Morris University, USA)
Article 3
Security Issues for Cloud Computing (pages 36-48)
Kevin Hamlen (The University of Texas at Dallas, USA), Murat Kantarcioglu (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
Global Information Security Factors (pages 49-60)
Garry White (Texas State University - San Marcos, USA), Ju Long (Texas State University - San Marcos, USA)
Issue 3
Article 1
The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise (pages 1-21)
Munir Majdalawieh (American University of Sharjah, United Arab Emirates)
Article 2
Policy Enforcement System for Inter-Organizational Data Sharing (pages 22-39)
Mamoun Awad (UAE University, UAE), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 3
Goals and Practices in Maintaining Information Systems Security (pages 40-50)
Zippy Erlich (The Open University of Israel, Israel), Moshe Zviran (Tel-Aviv University, Israel)
Article 4
Factors Influencing College Students’ Use of Computer Security (pages 51-60)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA), Robert W. Stone (University of Idaho, USA)
Issue 4
Article 1
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments (pages 1-20)
Feng W. Zhu (The University of Alabama in Huntsville, USA), Sandra Carpenter (The University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co., USA), Matt Mutka (Michigan State University, USA)
Article 2
Hiding Message in Map Along Pre-Hamiltonian Path (pages 21-34)
Sunil Kumar Muttoo (University of Delhi, India), Vinay Kumar (National Informatics Centre, India)
Article 3
Probabilistic Inference Channel Detection and Restriction Applied to Patients’ Privacy Assurance (pages 35-59)
Bandar Alhaqbani (Queensland University of Technology, Australia), Colin Fidge (Queensland University of Technology, Australia)
Volume 3 (2009)
Issue 1
Article 1
Re-Evaluation of On-Line Hot Topic Discovery Model (pages 1-10)
Hui-min Ye (University of Vermont, USA), Sushil K. Sharma (Ball State University, USA), Huinan Xu (Ernst & Young, USA)
Article 2
Understanding User Behavior towards Passwords through Acceptance and Use Modelling (pages 11-29)
Lee Novakovic (Murdoch University, Australia), Tanya McGill (Murdoch University, Australia), Michael Dixon (Murdoch University, Australia)
Article 3
Without Permission: Privacy on the Line (pages 30-44)
Joanne H. Pratt (Joanne H. Pratt Associates, USA), Sue Conger (University of Dallas, USA)
Article 4
Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce (pages 45-64)
Hamid R. Nemati (The University of North Carolina at Greensboro, USA), Thomas Van Dyke (The University of North Carolina, USA)
Article 5
Large Key Sizes and the Security of Password-Based Cryptography (pages 65-72)
Kent D. Boklan (Queens College, USA)
Issue 2
Article 1
Information Systems Security Assurance Management at Municipal Software Solutions, Inc. (pages 1-9)
Virginia Franke Kleist (West Virginia University, USA), Bonnie Morris (West Virginia University, USA), James W. Denton (West Virginia University, USA)
Article 2
A Chronicle of a Journey: An E-Mail Bounce Back System (pages 10-41)
Alex Kosachev (The University of North Carolina at Greensboro, USA), Hamid R. Nemati (The University of North Carolina at Greensboro, USA)
Article 3
Data Privacy and Security: HIPAA and Small Business Compliance (pages 42-53)
James Suleiman (University of Southern Maine, USA), Terry Huston (IT Consultant, Canada)
Article 4
PCI Compliance: Overcoming the Challenges (pages 54-67)
Benjamin Ngugi (Suffolk University, USA), Gina Vega (Salem State College, USA), Glenn Dardick (Longwood University, USA)
Article 6
Information Security by Words Alone: The Case for Strong Security Policies (pages 84-89)
Kirk P. Arnett (Mississippi State University, USA), Gary F. Templeton (Mississippi State University, USA), David A. Vance (Olivet Nazarene University, USA)
Article 7
The Social Organization of a Criminal Hacker Network: A Case Study (pages 90-104)
Yong Lu (Pennsylvania State University, USA)
Issue 3
Article 1
Security and Privacy Issues in Secure E-Mail Standards and Services (pages 1-13)
Lei Chen (Sam Houston State University, USA), Wen-Chen Hu (University of North Dakota, USA), Ming Yang (Jacksonville State University, USA), Lei Zhang (Frostburg State University, USA)
Article 2
Applied Cryptography for Security and Privacy in Wireless Sensor Networks (pages 14-36)
Dulal C. Kar (Texas A&M University-Corpus Christi, USA), Hung L. Ngo (Texas A&M University-Corpus Christi, USA), Geetha Sanapala (Texas A&M University-Corpus Christi, USA)
Article 3
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy (pages 37-54)
Ming Yang (Jacksonville State University, USA), Monica Trifas (Jacksonville State University, USA), Guillermo Francia III (Jacksonville State University, USA), Lei Chen (Sam Houston State University, USA)
Article 4
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks (pages 55-75)
Ramakrishna Thurimella (University of Denver, USA), William Mitchell (University of Denver, USA)
Article 5
Fair Electronic Exchange Based on Fingerprint Biometrics (pages 76-106)
Harkeerat Bedi (University of Tennessee at Chattanooga, USA), Li Yang (University of Tennessee at Chattanooga, USA)
Article 6
Secure and Private Service Discovery in Pervasive Computing Environments (pages 107-122)
Feng Zhu (University of Alabama in Huntsville, USA), Wei Zhu (Intergraph Co, USA)
Issue 4
Article 1
Preserving Privacy in Mining Quantitative Associations Rules (pages 1-17)
Madhu V. Ahluwalia (University of Maryland Baltimore County, USA), Aryya Gangopadhyay (University of Maryland Baltimore County, USA), Zhiyuan Chen (University of Maryland Baltimore County, USA)
Article 2
A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents (pages 18-28)
Hamidreza Amouzegar (K. N. Toosi University of Technology, Iran), Mohammad Jafar Tarokh (K. N. Toosi University of Technology, Iran), Anahita Naghilouye Hidaji (Infotech Pars Company, Iran)
Article 3
PAKE on the Web (pages 29-42)
Xunhua Wang (James Madison University, USA), Hua Lin (University of Virginia, USA)
Article 4
Three Models to Measure Information Security Compliance (pages 43-67)
Wasim A Al-Hamdani (Kentucky State University, USA)
Article 5
Do You Know Where Your Data Is? A Study of the Effect of Enforcement Strategies on Privacy Policies (pages 68-95)
Ian Reay (University of Alberta, Canada), Patricia Beatty (University of Alberta, Canada), Scott Dick (University of Alberta, Canada), James Miller (University of Alberta, Canada)
Volume 2 (2008)
Issue 1
Article 2
Life Cycle Pattern Study of Malicious Codes (pages 26-41)
June Wei (University of West Florida, USA), Randall C. Reid (University of West Florida, USA), Hongmei Zhang (University of South Carolina, USA)
Article 3
An Empirical Investigation of an Individual's Perceived Need for Privacy and Security (pages 42-53)
Taner Pirim (Mississsippi Center for Supercomputing Research, USA), Tabitha James (Virginia Polytechnic Institute and State University, USA), Katherine Boswell (University of Louisiana at Monroe, USA), Brian Reithel (University of Mississippi, USA), Reza Barkhi (Virginia Polytechnic Institute and State University, USA)
Article 4
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids (pages 54-79)
Syed Naqvi (Centre of Excellence in Information and Communication Technologies, Belgium)
Article 5
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use (pages 80-90)
S.E. Kruck (James Madison University, USA), Faye P. Teer (James Madison University, USA)
Issue 2
Article 1
Memory-Based Antiforensic Tools and Techniques (pages 1-13)
Hamid Jahankhani (University of East London, UK), Elidon Beqiri (University of East London, UK)
Article 2
A Secure and Trustful E-Ordering Architecture (TOES) for Small and Medium Size Enterprises (SEMs) (pages 14-30)
Spyridon Papastergiou (University of Pireaus, Greece), Despina Polemi (University of Pireaus, Greece)
Article 3
Trust-Based Usage Control in Collaborative Environment (pages 31-45)
Li Yang (University of Tennessee at Chattanooga, USA), Chang Phuong (University of Tennessee at Chattanooga, USA), Amy Novobilski (University of Tennessee at Chattanooga, USA), Raimund K. Ege (North Illinois University, USA)
Article 4
Spam Classification Based on E-Mail Path Analysis (pages 46-69)
Srikanth Palla (University of North Texas, USA), Ram Dantu (University of North Texas, USA), João W. Cangussu (University of Texas at Dallas, USA)
Article 5
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study (pages 70-82)
John A. Cassini (Université d’Angers, France), B.Dawn Medlin (Appalachian State University, USA), Adriana Romaniello (Universidad Rey Juan Carlos, Spain)
Issue 3
Article 1
The Impact of Privacy Legislation on Patient Care (pages 1-17)
Jeff Barnett (University of Victoria, Canada)
Article 2
Using Statistical Texture Analysis for Medical Image Tamper Proofing (pages 18-27)
Samia Boucherkha (Mentouri University, Algeria), Mohamed Benmohamed (Mentouri University, Algeria)
Article 3
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes (pages 28-44)
Tamas S. Gal (Univeristy of Maryland Baltimore County (UMBC), USA), Zhiyuan Chen (Univeristy of Maryland Baltimore County (UMBC), USA), Aryya Gangopadhyay (Univeristy of Maryland Baltimore County (UMBC), USA)
Article 4
Electronic Medical Records, HIPAA, and Patient Privacy (pages 45-54)
Jingquan Li (Texas A&M University-Kingsville, USA), Michael J. Shaw (University of Illinois at Urbana-Champaign, USA)
Article 5
Protecting Patient Information in Outsourced Telehealth Services: Bolting on Security when it cannot be Baked in (pages 55-70)
Patricia Y. Logan (Marshall University Graduate College, USA), Debra Noles (Marshall University Graduate College, USA)
Article 6
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? (pages 71-83)
B. Dawn Medlin (Appalachian State University, USA), Joseph A. Cazier (Appalachian State University, USA), Daniel P. Foulk (Appalachian State University, USA)
Article 7
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health (pages 84-97)
E. Vance Wilson (University of Toledo, USA), David D. Dobrzykowski (University of Toledo, USA), Joseph A. Cazier (Appalachian State University, USA)
Issue 4
Article 1
On Access-Unrestricted Data Anonymity and Privacy Inference Disclosure Control (pages 1-21)
Zude Li (University of Western Ontario, Canada), Xiaojun Ye (Tsinghua University, China)
Article 2
A Decentralized Security Framework for Web-Based Social Networks (pages 22-53)
Barbara Carminati (Universita degli Studi dell’Insubria, Italy), Elena Ferrari (Universita degli Studi dell’Insubria, Italy), Andrea Perego (Universita degli Studi dell’Insubria, Italy)
Article 3
SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors (pages 54-66)
Li Yang (University of Tennessee at Chattanooga, USA), Lu Peng (Louisiana State University, USA), Balachandran Ramadass (Louisiana State University, USA)
Article 4
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries (pages 67-90)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Yashaswini Harsha Kumar (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA)
Article 5
Will it be Disclosure or Fabrication of Personal Information? An Examination of Persuasion Strategies on Prospective Employees (pages 91-109)
Xun Li (University of Kentucky, USA), Radhika Santhanam (University of Kentucky, USA)
Volume 1 (2007)
Issue 1
Article 1
Trustworthy Web Services: An Experience-Based Model for Trustworthiness Evaluation (pages 1-17)
Stephen J.H. Yang (National Central University, Taiwan), Blue C.W. Lan (National Central University, Taiwan), James S.F. Hsieh (Ulead Systems Inc., Taiwan), Jen-Yao Chung (IBM T. J. Watson Research Center, USA)
Article 2
Administering the Semantic Web: Confidentiality, Privacy, and Trust Management (pages 18-34)
Bhavani Thuraisingham (The University of Texas at Dallas, USA), Natasha Tsybulnik (The University of Texas at Dallas, USA), Ashraful Alam (The University of Texas at Dallas, USA)
Article 3
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication (pages 35-46)
Song Han (Curtin University of Technology, Australia), Vidyasagar Potdar (Curtin University of Technology, Australia), Elizabeth Chang (Curtin University of Technology, Australia), Tharam Dillon (University of Technology, Australia)
Article 4
Privacy-Preserving Data Mining and the Need for Confluence of Research and Practice (pages 47-63)
Lixin Fu (The University of North Carolina at Greensboro, USA), Hamid Nemati (The University of North Carolina at Greensboro, USA), Fereidoon Sadri (The University of North Carolina at Greensboro, USA)
Article 5
Privacy and Security in the Age of Electronic Customer Relationship Management (pages 65-86)
Nicholas C. Romano Jr. (Oklahoma State University, USA), Jerry Fjermestad (New Jersey Institute of Technology, USA)
Issue 2
Article 1
On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text (pages 1-12)
Dieter Bartmann (Universität Regensburg, Germany), Idir Bakdi (Universität Regensburg, Germany), Michael Achatz (Universität Regensburg, Germany)
Article 2
Privacy-Preserving Clustering to Uphold Business Collaboration: A Dimensionality Reduction Based Transformation Approach (pages 13-36)
Stanley R.M. Oliveira (Embrapa Informática Agropecuária, Brazil), Osmar R. Zaïane (University of Alberta, Canada)
Article 3
Information Security Effectiveness: Conceptualization and Validation of a Theory (pages 37-60)
Kenneth J. Knapp (US Air Force Academy, USA), Thomas E. Marshall (Auburn University, USA), R. Kelly Rainer Jr. (Auburn University, USA), F. Nelson Ford (Auburn University, USA)
Article 4
The Role of Privacy Risk in IT Acceptance: An Empirical Study (pages 61-73)
Joseph A. Cazier (Appalachian State University, USA), E. Vance Wilson (University of Wisconsin-Milwaukee, USA), B. Dawn Medlin (Appalachian State University, USA)
Article 5
Issue 3
Article 1
A Projection of the Future Effects of Quantum Computation on Information Privacy (pages 1-12)
Geoff Skinner (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia), Elizabeth Chang (Centre for Extended Enterprise and Business Intelligence Curtin University of Technology, Australia)
Article 2
Information Systems Security: Cases of Network Administrator Threats (pages 13-25)
Hamid Jahankhani (University of East London, UK), Shantha Fernando (University of Moratuwa, Sri Lanka), Mathews Z. Nkhoma (University of East London, UK), Haralambos Mouratidis (University of East London, UK)
Article 3
A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection (pages 26-46)
Vishal Vatsa (Indian Institute of Technology, India), Shamik Sural (Indian Institute of Technology, India), A. K. Majumdar (Indian Institute of Technology, India)
Article 4
Defeating Active Phishing Attacks for Web-Based Transactions (pages 47-60)
Xin Luo (Virginia State University, USA), Tan Teik Guan (Data Security Systems Solutions Pte Ltd, Singapore)
Article 5
A Semi-fragile Image Watermarking using Wavelet Inter Coefficient Relations (pages 61-75)
Latha Parameswaran (AMRITA University, India), K. Anbumani (Karunya University, India)
Issue 4
Article 1
An Ontology of Information Security (pages 1-23)
Almut Herzog (Linkopings Universitet, Sweden), Nahid Shahmehri (Linkopings Universitet, Sweden), Claudiu Duma (Linkopings Universitet, Sweden)
Article 2
Towards Autonomous User Privacy Control (pages 24-46)
Amr Ali Eldin (Delft University of Technology, The Netherlands), Rene Wagenaar (Delft University of Technology, The Netherlands)
Article 3
E-Mail Worm Detection Using Data Mining (pages 47-61)
Mohammad M. Masud (The University of Texas at Dallas, USA), Latifur Khan (The University of Texas at Dallas, USA), Bhavani Thuraisingham (The University of Texas at Dallas, USA)
Article 4
A Simulation Model of Information Systems Security (pages 62-74)
Norman Pendegraft (University of Idaho, USA), Mark Rounds (University of Idaho, USA)
Article 5
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions (pages 75-86)
Kirk P. Arnett (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA), Allen C. Johnston (University of Alabama Birmingham, USA), Jongki Kim (Pusan National University, Republic of Korea), Hajin Hwang (Catholic University of Daegu, Republic of Korea)