default search action
Information Security Journal: A Global Perspective, Volume 25
Volume 25, Numbers 1-3, 2016
- Tsung-Yi Chen, Hsiao-Chuan Shen:
A network behavior evaluation method for improving interactive security in virtual network worlds. 1-17 - Nour Moustafa, Jill Slay:
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. 18-31 - Rita Ismailova, Gulshat Muhametjanova:
Cyber crime risk awareness in Kyrgyz Republic. 32-38 - Sanjay Sareen, Sandeep K. Sood, Sunil Kumar Gupta:
Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. 39-53 - Marcus A. Thompson, Michael J. Ryan, Jill Slay, Alan C. McLucas:
Harmonized taxonomies for security and resilience. 54-67 - Zouheir Trabelsi:
Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network. 68-82 - Jeyasingam Nivethan, Mauricio Papa:
On the use of open-source firewalls in ICS/SCADA systems. 83-93 - Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Graphical One-Time Password (GOTPass): A usability evaluation. 94-108 - Vedrana Krivokuca, Waleed H. Abdulla:
Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern. 109-123 - Maged H. Wafy:
Visibility enhancements of gray and color images with size invariant visual cryptography. 124-135 - Junaid Latief Shah:
A novel approach for securing IPv6 link local communication. 136-150
Volume 25, Numbers 4-6, 2016
- George Hatzivasilis, George Floros, Ioannis Papaefstathiou, Charalampos Manifavas:
Lightweight authenticated encryption for embedded on-chip systems. 151-161 - Rafik Hamza, Faiza Titouna:
A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. 162-179 - Vishnu Venukumar, Vinod Pathari:
A survey of applications of threshold cryptography - proposed and practiced. 180-190 - Milad Taleby Ahvanooey, Hassan Dana Mazraeh, Seyed Hashem Tabasi:
An innovative technique for web text watermarking (AITW). 191-196 - Anupam Kumar Bairagi, Rahamatullah Khondoker, Rafiqul Islam:
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures. 197-212 - Deep Chandra Mishra, R. K. Sharma:
An approach for security of color image data in coordinate, geometric, and frequency domains. 213-234 - R. Ranjith Kumar, S. Jayasudha, S. Pradeep:
Efficient and secure data hiding in encrypted images: A new approach using chaos. 235-246 - Davneet Kaur, Sheetal Kalra:
Five-tier barrier anti-phishing scheme using hybrid approach. 247-260 - Vedrana Krivokuca, Waleed H. Abdulla:
Noninvertible fingerprint transforms: Categorization of design mechanisms and discussion of evaluation techniques. 261-279 - Zhiying Wang, Nianxin Wang, Xiang Su, Shilun Ge:
Differentiated management strategies on cloud computing data security driven by data value. 280-294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.