Sign in
Int. J. Inf. Secur. Priv.
2007
2012
2018
2023
2007
2023
Keyphrases
Publications
volume 17, number 1, 2023
Ali Alibeigi
,
Munir Abu Bakar
,
Adeleh Asemi
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Suman Thapaliya
,
Pawan Kumar Sharma
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Sabrine Ennaji
,
Nabil El Akkad
,
Khalid Haddouch
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Mallanagouda Biradar
,
Basavaraj Mathapathi
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Zhen Gu
,
Guoyin Zhang
Trajectory Data Publication Based on Differential Privacy.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Romil Rawat
,
Rajesh Kumar Chakrawarti
,
Piyush Vyas
,
José Luis Arias-Gonzáles
,
Ranjana Sikarwar
,
Ramakant Bhardwaj
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
volume 16, number 1, 2022
Erukala Suresh Babu
,
B. K. N. Srinivasarao
,
Ilaiah Kavati
,
Mekala Srinivasa Rao
Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Rajamandrapu Srinivas
,
N. Mayur
Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Moez Farokhnia Hamedani
,
Ali Dehghan
Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Faheem Syeed Masoodi
,
Iram Abrar
,
Alwi M. Bamhdi
An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Na Hua
,
Juyan Li
,
Kejia Zhang
,
Long Zhang
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Faruk Arslan
,
Kallol Kumar Bagchi
,
Godwin J. Udo
What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Liangshun Wu
,
Hengjin Cai
,
Han Li
Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Kapil Kant Kamal
,
Monit Kapoor
,
Padmaja Joshi
Secure and Flexible Key Protected Identity Framework for Mobile Devices.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Gururaj H. L.
,
Prithwijit Mitra
,
Soumyadip Koner
,
Sauvik Bal
,
Francesco Flammini
,
Janhavi V.
,
Ravi Kumar V.
Prediction of Phishing Websites Using AI Techniques.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
M. D. J. S. Goonetillake
,
Rangana Jayashanka
,
S. V. Rathnayaka
Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
El Arbi Abdellaoui Alaoui
,
Mohamed-Lamine Messai
,
Anand Nayyar
Using Machine Learning in WSNs for Performance Prediction MAC Layer.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Abhaya Kumar Sahoo
,
Srishti Raj
,
Chittaranjan Pradhan
,
Bhabani Shankar Prasad Mishra
,
Rabindra Kumar Barik
,
Ankit Vidyarthi
Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Yonglei Liu
,
Kun Hao
,
Weilong Zhang
,
Lin Gao
,
Li Wang
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Anderson Aparecido Alves da Silva
,
Leonardo Santos Silva
,
Erica Leandro Bezerra
,
Adilson Eduardo Guelfi
,
Claudia de Armas
,
Marcelo Teixeira de Azevedo
,
Sergio Takeo Kofuji
A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Bahubali Akiwate
,
Latha Parthiban
Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Romil Rawat
,
Vinod Kumar Mahor
,
Bhagwati Garg
,
Shrikant Telang
,
Kiran Pachlasiya
,
Anil Kumar
,
Surendra Kumar Shukla
,
Megha Kuliha
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Hicham Grari
,
Khalid Zine-Dine
,
Ahmed Azouaoui
,
Siham Lamzabi
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Amine Sallah
,
El Arbi Abdellaoui Alaoui
,
Said Agoujil
,
Anand Nayyar
Machine Learning Interpretability to Detect Fake Accounts in Instagram.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Ankit Rajeshkumar Kharwar
,
Devendra V. Thakor
An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Sergey Sakulin
,
Alexander Alfimtsev
,
Konstantin Kvitchenko
,
Leonid Dobkacz
,
Yuri Kalgin
,
Igor I. Lychkov
Network Anomalies Detection Approach Based on Weighted Voting.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Boubakeur Annane
,
Adel Alti
Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
R. Balakrishnan Unny
,
Nityesh Bhatt
A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Abdallah Soualmi
,
Adel Alti
,
Lamri Laouamer
An Imperceptible Watermarking Scheme for Medical Image Tamper Detection.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Mpho Ngoepe
,
Mfanasibili Ngwenya
Personal Data and the Assemblage Security in Consumer Internet of Things.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Karim Ouazzane
,
Thekla Polykarpou
,
Yogesh Patel
,
Jun Li
An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Sahana Lokesh R.
,
H. R. Ranganatha
An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Kamel Ahsene Djaballah
,
Kamel Boukhalfa
,
Mohamed Amine Guelmaoui
,
Amir Saidani
,
Yassine Ramdane
A Proposal Phishing Attack Detection System on Twitter.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Siyu Wang
,
Nafei Zhu
,
Jingsha He
,
Da Teng
,
Yue Yang
Privacy Disclosure in the Real World: An Experimental Study.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
Sanjay Adiwal
,
Balaji Rajendran
,
Pushparaj Shetty D
A Quantitative Method for Measuring Health of Authoritative Name Servers.
Int. J. Inf. Secur. Priv.
16 (1) (2022)
volume 16, number 2, 2022
Santhoshkumar K.
,
Suganthi P.
AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Tirupathaiah Kanaparthi
,
Ramesh S.
,
Ravi Sekhar Yarrabothu
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Leelalakshmi S.
,
K. Rameshkumar
Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Jintao Chen
,
Binruo Zhu
,
Fang Zhao
,
Ruili Huang
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kimmi Kumari
,
Mrunalini Marlakunta
A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Anjana S. Chandran
Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Abhijit Biswas
,
Dushyanta Dutta
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kusuma S. M.
,
Veena K. N.
,
B. V. Varun
A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Feilu Hang
,
Linjiang Xie
,
Zhenhong Zhang
,
Wei Guo
,
Hanruo Li
Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Chakka S. V. V. S. N. Murty
,
G. P. Saradhi Varma
,
A. S. N. Chakravarthy
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Bin Fang
Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Priyadharshini Kaliyamoorthy
,
Aroul Canessane Ramalingam
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Xiang Ma
,
Zhan Li
Balanced Scheduling Method of Network Information Resources for Cloud Storage.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Kalluri Rama Krishna
,
C. V. Guru Rao
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments.
Int. J. Inf. Secur. Priv.
16 (2) (2022)
Hong Wei
,
Zhiyong Li
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference.
Int. J. Inf. Secur. Priv.
16 (2) (2022)