Sign in
J. Internet Serv. Inf. Secur.
2011
2015
2019
2023
2011
2023
Keyphrases
Publications
volume 13, number 1, 2023
K. Malathi
,
R. Anandan
,
J. Frank Vijay
Cloud Environment Task Scheduling Optimization of Modified Genetic Algorithm.
J. Internet Serv. Inf. Secur.
13 (1) (2023)
Lil oja
,
P. Ranjana
An Intrusion Detection System Using a Machine Learning Approach in IOT-based Smart Cities.
J. Internet Serv. Inf. Secur.
13 (1) (2023)
Rahmawan Santoso
,
Tandiyo Rahayu
,
Sugi Harto
,
Heny Setyawati
Software Development Tools with Android Base for Skills Data Collection in Physical Education.
J. Internet Serv. Inf. Secur.
13 (1) (2023)
Latifah Alamer
Intelligent Health Risk and Disease Prediction Using Optimized Naive Bayes Classifier.
J. Internet Serv. Inf. Secur.
13 (1) (2023)
volume 13, number 2, 2023
Meryem Ammi
Cyber Threat Hunting Case Study using MISP.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Madhavi M
,
Sasirooba T.
,
Kranthi Kumar G.
Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Laith Abdul Raheem Al anzy
,
Ahmed Aizaldeen Abdullah
,
Ali Kahtan Lilo Aquraishi
IoT Cloud System Based Dual Axis Solar Tracker Using Arduino.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
K. Vimal Kumar Stephen
,
V. Mathivanan
,
Antonio Rutaf Manalang
,
Prajith Udinookkaran
,
Rudiardo Percival Niñalga De Vera
,
Mohammed Tariq Shaikh
,
Faiza Rashid Ammar Al-Harthy
IOT-Based Generic Health Monitoring with Cardiac Classification Using Edge Computing.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Mahmoud E. Farfoura
,
Osama Ahmed Khashan
,
Hani Omar
,
Yazn Alshamaila
,
Nader Abdel Karim
,
Hsiao-Ting Tseng
,
Mohammad Alshinwan
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Varshavardhini S
An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
B. S. Venkatesh Prasad
,
H. R. Roopashree
Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Mohamed El Bekri
Dynamic Inertia Weight Particle Swarm Optimization for Anomaly Detection: A Case of Precision Irrigation.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Richard Romero
,
Raúl A. Sánchez-Ancajima
,
Javier A. López-Céspedes
,
Miguel A. Saavedra-López
,
Segundo Juan Sanchez Tarrillo
,
Ronald M. Hernández
Security Model for a Central Bank in Latin America using Blockchain.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Alaa Obeidat
,
Rola Yaqbeh
Business Project Management Using Genetic Algorithm for the Marketplace Administration.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Matthew Evans Audric Rengkung
,
Arya Wicaksana
RSA Prime Factorization on IBM Qiskit.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Akila R.
,
S. Revathi
Fine Grained Analysis of Intention for Social Media Reviews Using Distance Measure and Deep Learning Technique.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Kritsanapong Somsuk
,
Sarutte Atsawaraungsuk
,
Chanwit Suwannapong
,
Suchart Khummanee
,
Chalida Sanemueang
The Variant of Digital Signature Algorithm for Constant Message.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
J. Brindha Merin
,
W. Aisha Banu
,
K. Fahima Sanobar Shalin
Semantic Annotation Based Effective and Quality Oriented Web Service Discovery.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
Zulfani Sesmiarni
,
Gusnita Darmawati
,
Yulifda Elin Yuspita
,
Saiful Yeri
,
Ilian Ikhsan
Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning.
J. Internet Serv. Inf. Secur.
13 (2) (2023)
volume 12, number 1, 2022
Ozan Akin
,
Umut Can Gulmez
,
Ozan Sazak
,
Osman Ufuk Yagmur
,
Pelin Angin
GreenSlice: An Energy-Efficient Secure Network Slicing Framework.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
Ilsun You
2022 Letter from the Editor-in-Chief.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
Jongmo Kim
,
Kunyoung Kim
,
Gi-Yoon Jeon
,
Mye M. Sohn
Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogeneous Networks.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
Hideaki Moriyama
,
Toshihiro Yamauchi
,
Masaya Sato
,
Hideo Taniguchi
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
Ajung Im
,
Sandi Rahmadika
,
Yong-Hwan Lee
,
Bonam Kim
,
Ilsun You
A Note on Enactment of Blockchain for HACCP-based Cooperative Model.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
Jianhua Yang
,
Lixin Wang
,
Suhev Shakya
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions.
J. Internet Serv. Inf. Secur.
12 (1) (2022)
volume 12, number 2, 2022
Arjun Choudhary
,
Gaurav Choudhary
,
Kapil Pareek
,
Chetanya Kunndra
,
Jatin Luthra
,
Nicola Dragoni
Emerging Cyber Security Challenges after COVID Pandemic: A Survey.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
Ye Neung Kim
,
Seok Min Ko
,
TaeGuen Kim
Hidden Markov Model based Anomaly Detection Method for In-vehicle Network.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
Minhye Seo
Authentication for V2X Communication in an Open-Source Plug-and-Play Platform.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
Pierre-Henri Thevenon
,
Sébastien Riou
,
Duc-Minh Tran
,
Maxime Puys
,
Nikolaos Foivos Polychronou
,
Mustapha El-Majihi
,
Camille Sivelle
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
Mumtahina Ahmed
,
Mohammad Shahadat Hossain
,
Raihan Ul Islam
,
Karl Andersson
Explainable Text Classification Model for COVID-19 Fake News Detection.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
Alexander N. Ndife
,
Yodthong Mensin
,
Wattanapong Rakwichian
,
Paisarn Muneesawang
Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning.
J. Internet Serv. Inf. Secur.
12 (2) (2022)
volume 12, number 3, 2022
Md. Amiruzzaman
,
Mahnaz Rafia Islam
,
Md. Rajibul Islam
,
Rizal Mohd Nor
Analysis of COVID-19: An infectious disease spread.
J. Internet Serv. Inf. Secur.
12 (3) (2022)
Anthony Cheuk Tung Lai
,
Ping Fan Ke
,
Kelvin Chan
,
Siu Ming Yiu
,
Dongsun Kim
,
Wai Kin Wong
,
Shuai Wang
,
Joseph Muppala
,
Alan Ho
RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks.
J. Internet Serv. Inf. Secur.
12 (3) (2022)
Mi Hyeon Jeon
,
Sang Uk Shin
Blockchain-based fair and secure protocol for decentralized data trading.
J. Internet Serv. Inf. Secur.
12 (3) (2022)
Yousik Lee
,
Samuel Woo
Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics.
J. Internet Serv. Inf. Secur.
12 (3) (2022)
Jose-Luis Cabra
,
Carlos Parra
,
Luis Trujillo
Earprint touchscreen sensoring comparison between hand-crafted features and transfer learning for smartphone authentication.
J. Internet Serv. Inf. Secur.
12 (3) (2022)
Jaewon Choi
,
Xiuping Zhang
Classifications of restricted web streaming contents based on convolutional neural network and long short-term memory (CNN-LSTM).
J. Internet Serv. Inf. Secur.
12 (3) (2022)
volume 12, number 4, 2022
A. Sonya
A Data Integrity and Security Approach for Health Care Data in Cloud Environment.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Sherin Eliyas
,
P. Ranjana
Gamification: Is E-next Learning's Big Thing.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Musaddak M. Abdul Zahra
,
Laith A. Abdul-Rahaim
Performance of RoF-MMW-WDM Backhaul System based on Hybrid Optical OFDM Transportation Enabling 128-QAM Format for B5G Communication Networks.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
P. Vijayan
,
P. Anbalagan
,
Selvakumar S
An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Fata Nidaul Khasanah
,
Dhian Tyas Untari
,
David Nurmanto
,
Budi Satria
,
Tulus Sukreni
,
Timorora Sandha Perdhana
Beta Testing Techniques in Non-Functional Testing of Gamified Learning Applications for Lecture Learning Media During the Covid-19 Pandemic.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Saahira Ahamed
,
Ebtesam Shadadi
,
Latifah Alamer
,
Mousa Khubrani
Deep Anomaly Net: Detecting Moving Object Abnormal Activity Using Tensor Flow.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
R. Suganthi
,
K. Prabha
An Adaptive Density Peak Clustering with Swarm Intelligence Algorithm for Detection of Overlapping Communities in Social Networks.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Nana Kwame Gyamfi
,
Nikolaj Goranin
,
Dainius Ceponis
,
Antanas Cenys
Malware Detection Using Convolutional Neural Network, A Deep Learning Framework: Comparative Analysis.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Manvitha Gali
,
Aditya Mahamkali
A Distributed Deep Meta Learning based Task Offloading Framework for Smart City Internet of Things with Edge-Cloud Computing.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
V. Hemasree
,
K. Sundeep Kumar
Facial Skin Texture and Distributed Dynamic Kernel Support Vector Machine (DDKSVM) Classifier for Age Estimation in Facial Wrinkles.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Raúl A. Sánchez-Ancajima
,
Sarajane Marques Peres
,
Javier A. López-Céspedes
,
José L. Saly-Rosas-Solano
,
Ronald M. Hernández
,
Miguel A. Saavedra-López
Gesture Phase Segmentation Dataset: An Extension for Development of Gesture Analysis Models.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
Margret Anouncia Savarimuthu
,
Renita Raymond
Transformation Requirement Pattern for Capturing Data-Intensive Applications Requirements.
J. Internet Serv. Inf. Secur.
12 (4) (2022)
A. Radhika
,
M. Syed Masood
Crop Yield Prediction by Integrating Et-DP Dimensionality Reduction and ABP-XGBOOST Technique.
J. Internet Serv. Inf. Secur.
12 (4) (2022)