Login / Signup
Int. J. Inf. Secur. Priv.
2007
2013
2017
2024
2007
2024
Keyphrases
Publications
volume 18, 2024
Zhiqiang Wu
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion.
Int. J. Inf. Secur. Priv.
18 (2024)
Musa Ugbedeojo
,
Marion O. Adebiyi
,
Oluwasegun Julius Aroba
,
Ayodele Ariyo Adebiyi
RSA and Elliptic Curve Encryption System: A Systematic Literature Review.
Int. J. Inf. Secur. Priv.
18 (2024)
Longfei Fu
,
Yibin Liu
,
Yanjun Zhang
,
Ming Li
Network Information Security Monitoring Under Artificial Intelligence Environment.
Int. J. Inf. Secur. Priv.
18 (2024)
Dongyan Zhang
,
Lili Zhang
,
Zhiyong Zhang
,
Zhongya Zhang
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy.
Int. J. Inf. Secur. Priv.
18 (2024)
Yuan Tian
,
Wendong Wang
,
Jingyuan He
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training.
Int. J. Inf. Secur. Priv.
18 (2024)
Abdulhakim Sabur
,
Ahmad Showail
Nudging Data Privacy of Mobile Health Applications in Saudi Arabia.
Int. J. Inf. Secur. Priv.
18 (2024)
Yashu Liu
,
Xiaoyi Zhao
,
Xiaohua Qiu
,
Han-Bing Yan
VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs.
Int. J. Inf. Secur. Priv.
18 (2024)
volume 17, number 1, 2023
Xinqiang Wang
,
Wenhuan Lu
Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Mohamed Guendouz
,
Abdelmalek Amine
A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Alec Wells
,
Aminu Bello Usman
Trust and Voice Biometrics Authentication for Internet of Things.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Chuyi Yan
,
Haixia Xu
,
Peili Li
"Every Dog Has His Day": Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Zhijie Fan
,
Zhiwei Cao
,
Xin Li
,
Chunmei Wang
,
Bo Jin
,
Qianjin Tang
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Suman Thapaliya
,
Pawan Kumar Sharma
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Jinhai Song
,
Zhiyong Zhang
,
Kejing Zhao
,
Qinhai Xue
,
Brij B. Gupta
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Mathew Nicho
,
Christopher D. McDermott
,
Hussein Fakhry
,
Shini Girija
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Zhen Gu
,
Guoyin Zhang
Trajectory Data Publication Based on Differential Privacy.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Sangita Baruah
,
Dhruba Jyoti Borah
,
Vaskar Deka
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Ali Alibeigi
,
Munir Abu Bakar
,
Adeleh Asemi
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Mallanagouda Biradar
,
Basavaraj Mathapathi
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Sabrine Ennaji
,
Nabil El Akkad
,
Khalid Haddouch
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Romil Rawat
,
Rajesh Kumar Chakrawarti
,
Piyush Vyas
,
José Luis Arias-Gonzáles
,
Ranjana Sikarwar
,
Ramakant Bhardwaj
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
volume 16, number 1, 2022
Erukala Suresh Babu
,
B. K. N. Srinivasarao
,
Ilaiah Kavati
,
Mekala Srinivasa Rao
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Rajamandrapu Srinivas
,
N. Mayur
Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Moez Farokhnia Hamedani
,
Ali Dehghan
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
El Arbi Abdellaoui Alaoui
,
Mohamed-Lamine Messai
,
Anand Nayyar
Using Machine Learning in WSNs for Performance Prediction MAC Layer.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Abhaya Kumar Sahoo
,
Srishti Raj
,
Chittaranjan Pradhan
,
Bhabani Shankar Prasad Mishra
,
Rabindra Kumar Barik
,
Ankit Vidyarthi
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Faheem Syeed Masoodi
,
Iram Abrar
,
Alwi M. Bamhdi
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Yonglei Liu
,
Kun Hao
,
Weilong Zhang
,
Lin Gao
,
Li Wang
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Na Hua
,
Juyan Li
,
Kejia Zhang
,
Long Zhang
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Faruk Arslan
,
Kallol Kumar Bagchi
,
Godwin J. Udo
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Liangshun Wu
,
Hengjin Cai
,
Han Li
Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Anderson Aparecido Alves da Silva
,
Leonardo Santos Silva
,
Erica Leandro Bezerra
,
Adilson Eduardo Guelfi
,
Claudia de Armas
,
Marcelo Teixeira de Azevedo
,
Sergio Takeo Kofuji
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Bahubali Akiwate
,
Latha Parthiban
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Kapil Kant Kamal
,
Monit Kapoor
,
Padmaja Joshi
Secure and Flexible Key Protected Identity Framework for Mobile Devices.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Gururaj H. L.
,
Prithwijit Mitra
,
Soumyadip Koner
,
Sauvik Bal
,
Francesco Flammini
,
Janhavi V.
,
Ravi Kumar V.
Prediction of Phishing Websites Using AI Techniques.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
volume 16, number 2, 2022
Chakka S. V. V. S. N. Murty
,
G. P. Saradhi Varma
,
A. S. N. Chakravarthy
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Leelalakshmi S.
,
K. Rameshkumar
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kimmi Kumari
,
Mrunalini Marlakunta
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Jintao Chen
,
Binruo Zhu
,
Fang Zhao
,
Ruili Huang
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Anjana S. Chandran
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Tirupathaiah Kanaparthi
,
Ramesh S.
,
Ravi Sekhar Yarrabothu
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kusuma S. M.
,
Veena K. N.
,
B. V. Varun
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Santhoshkumar K.
,
Suganthi P.
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Bin Fang
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Abhijit Biswas
,
Dushyanta Dutta
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Feilu Hang
,
Linjiang Xie
,
Zhenhong Zhang
,
Wei Guo
,
Hanruo Li
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Priyadharshini Kaliyamoorthy
,
Aroul Canessane Ramalingam
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Xiang Ma
,
Zhan Li
Balanced Scheduling Method of Network Information Resources for Cloud Storage.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kalluri Rama Krishna
,
C. V. Guru Rao
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Hong Wei
,
Zhiyong Li
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference.
Int. J. Inf. Secur. Priv.
16 (2) (2022)