default search action
International Journal of Information Security and Privacy, Volume 17
Volume 17, Number 1, 2023
- Suman Thapaliya, Pawan Kumar Sharma:
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures. 1-22 - Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias-Gonzáles, Ranjana Sikarwar, Ramakant Bhardwaj:
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing. 1-25 - Mallanagouda Biradar, Basavaraj Mathapathi:
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN. 1-18 - Zhen Gu, Guoyin Zhang:
Trajectory Data Publication Based on Differential Privacy. 1-15 - Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch:
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. 1-17 - Ali Alibeigi, Munir Abu Bakar, Adeleh Asemi:
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies. 1-25 - Sangita Baruah, Dhruba Jyoti Borah, Vaskar Deka:
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm. 1-16 - Mohamed Guendouz, Abdelmalek Amine:
A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques. 1-18 - Mathew Nicho, Christopher D. McDermott, Hussein Fakhry, Shini Girija:
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors. 1-23 - Zhijie Fan, Zhiwei Cao, Xin Li, Chunmei Wang, Bo Jin, Qianjin Tang:
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features. 1-18 - Chuyi Yan, Haixia Xu, Peili Li:
"Every Dog Has His Day": Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption. 1-27 - Jinhai Song, Zhiyong Zhang, Kejing Zhao, Qinhai Xue, Brij B. Gupta:
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet. 1-18 - Alec Wells, Aminu Bello Usman:
Trust and Voice Biometrics Authentication for Internet of Things. 1-28 - Xinqiang Wang, Wenhuan Lu:
Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks. 1-14
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.