Journal Navigation
Special Issue on Advance Research in Model Driven Security, Privacy, and Forensic of Smart Devices
Volume 9
Gulshan Shrivastava, Nhu Nguyen Gia, Mohamed Salim Bouhlel, Kavita Sharma
Published: Jan 1, 2018
DOI: 10.4018/IJISMD.2018010101
Volume 9
Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true potential. It is hard to tackle due to operational constraints of networks. Worms have become an emergent... Show More
Download Sample (PDF): Article
Cite Article

MLA

Ojha, Rudra Pratap, et al. "Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks." IJISMD vol.9, no.1 2018: pp.1-20. http://doi.org/10.4018/IJISMD.2018010101

APA

Ojha, R. P., Srivastava, P. K., & Sanyal, G. (2018). Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks. International Journal of Information System Modeling and Design (IJISMD), 9(1), 1-20. http://doi.org/10.4018/IJISMD.2018010101

Chicago

Ojha, Rudra Pratap, Pramod Kumar Srivastava, and Goutam Sanyal. "Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 1-20. http://doi.org/10.4018/IJISMD.2018010101

Export Reference

Mendeley
Published: Jan 1, 2018
DOI: 10.4018/IJISMD.2018010102
Volume 9
Rajib Ghosh, Partha Pratim Roy, Prabhat Kumar
Secure authentication is a vital component for device security. The most basic form of authentication is by using passwords. With the evolution of smart devices, selecting stronger and unbreakable... Show More
Download Sample (PDF): Article
Cite Article

MLA

Ghosh, Rajib, et al. "Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features." IJISMD vol.9, no.1 2018: pp.21-55. http://doi.org/10.4018/IJISMD.2018010102

APA

Ghosh, R., Roy, P. P., & Kumar, P. (2018). Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features. International Journal of Information System Modeling and Design (IJISMD), 9(1), 21-55. http://doi.org/10.4018/IJISMD.2018010102

Chicago

Ghosh, Rajib, Partha Pratim Roy, and Prabhat Kumar. "Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 21-55. http://doi.org/10.4018/IJISMD.2018010102

Export Reference

Mendeley
Published: Jan 1, 2018
DOI: 10.4018/IJISMD.2018010103
Volume 9
Sumit Kumar Yadav, Kavita Sharma, Arushi Arora
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS... Show More
Download Sample (PDF): Article
Cite Article

MLA

Yadav, Sumit Kumar, et al. "Security Integration in DDoS Attack Mitigation Using Access Control Lists." IJISMD vol.9, no.1 2018: pp.56-76. http://doi.org/10.4018/IJISMD.2018010103

APA

Yadav, S. K., Sharma, K., & Arora, A. (2018). Security Integration in DDoS Attack Mitigation Using Access Control Lists. International Journal of Information System Modeling and Design (IJISMD), 9(1), 56-76. http://doi.org/10.4018/IJISMD.2018010103

Chicago

Yadav, Sumit Kumar, Kavita Sharma, and Arushi Arora. "Security Integration in DDoS Attack Mitigation Using Access Control Lists," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 56-76. http://doi.org/10.4018/IJISMD.2018010103

Export Reference

Mendeley
Published: Jan 1, 2018
DOI: 10.4018/IJISMD.2018010104
Volume 9
Nisha Rathee, Rajender Singh Chhillar
Smart mobile pay applications on smart devices have been considered as the most efficient and secure mode of contactless payment. To safeguard customer credit/ debit card details, testing of mobile... Show More
Download Sample (PDF): Article
Cite Article

MLA

Rathee, Nisha, and Rajender Singh Chhillar. "Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm." IJISMD vol.9, no.1 2018: pp.77-91. http://doi.org/10.4018/IJISMD.2018010104

APA

Rathee, N. & Chhillar, R. S. (2018). Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm. International Journal of Information System Modeling and Design (IJISMD), 9(1), 77-91. http://doi.org/10.4018/IJISMD.2018010104

Chicago

Rathee, Nisha, and Rajender Singh Chhillar. "Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 77-91. http://doi.org/10.4018/IJISMD.2018010104

Export Reference

Mendeley
Published: Jan 1, 2018
DOI: 10.4018/IJISMD.2018010105
Volume 9
Vinod Vijaykumar Kimbahune, Arvind V. Deshpande, Parikshit N. Mahalle
The computational complexity of the next generation internet (NGI) is increasing at a faster rate. Due to the large scale of ubiquitous devices, effective and secure communication and addressing... Show More
Download Sample (PDF): Article
Cite Article

MLA

Kimbahune, Vinod Vijaykumar, et al. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach." IJISMD vol.9, no.1 2018: pp.92-121. http://doi.org/10.4018/IJISMD.2018010105

APA

Kimbahune, V. V., Deshpande, A. V., & Mahalle, P. N. (2018). A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach. International Journal of Information System Modeling and Design (IJISMD), 9(1), 92-121. http://doi.org/10.4018/IJISMD.2018010105

Chicago

Kimbahune, Vinod Vijaykumar, Arvind V. Deshpande, and Parikshit N. Mahalle. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 92-121. http://doi.org/10.4018/IJISMD.2018010105

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
All inquiries regarding IJISMD should be directed to the attention of:

Dr. Mehdi Khosrow-Pour
Editor-in-Chief
International Journal of Information System Modeling and Design
Email:journaleditor@igi-global.comm

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100