default search action
International Journal of Information Security and Privacy, Volume 8
Volume 8, Number 1, 2014
- Mathew Nicho, Shafaq Khan:
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective. 1-18 - Mamta Juneja:
A Covert Communication Model-Based on Image Steganography. 19-37 - Prashanta Kumar Patra, Padma Lochan Pradhan:
An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System. 38-61 - Aymen Akremi, Hassen Sallay, Mohsen Rouached:
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks. 62-78
Volume 8, Number 2, 2014
- M. Poongodi, Sundan Bose:
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks. 1-18 - Mohamed Cheikh, Salima Hacini, Zizette Boufaïda:
Classification of DOS Attacks Using Visualization Technique. 19-32 - Xiang Fang, Sooun Lee:
Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam): An Exploratory Study. 33-54 - Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo:
Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution. 55-68
Volume 8, Number 3, 2014
- Mohanad Halaweh:
Users' Perception of Security for Mobile Communication Technology. 1-12 - Wiem Hammami, Ilhem Souissi, Lamjed Ben Said:
A New Fuzzy-Based Approach for Anonymity Quantification in E-Services. 13-38 - Janakiramaiah Bonam, Ramamohan Reddy:
Balanced Approach for Hiding Sensitive Association Rules in Data Sharing Environment. 39-62 - Xiaojun Wang, Brendan Cronin:
TCP/IP Reassembly in Network Intrusion Detection and Prevention Systems. 63-76
Volume 8, Number 4, 2014
- Chikh Ramdane, Salim Chikhi:
A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. 1-25 - Hella Kaffel Ben Ayed, Asma Hamed:
Toward Proactive Mobile Tracking Management. 26-43 - Amr Ali Eldin, Jan van den Berg, Semir Daskapan:
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems. 44-61 - Piotr Ksiazak, William Farrelly, Kevin Curran:
A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks. 62-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.