Content
January 2024, Volume 18, Issue 1
- 1-14 Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights
by Fares Alharbi & Gautam Siddharth Kashyap & Budoor Ahmad Allehyani - 1-15 An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion
by Zhiqiang Wu - 1-17 Enhancing Legal Protection of Children's Rights in the “Internet Plus”
by Binjing Li & Wendong Yu - 1-17 A Network Security Transmission Model Based on Improved Sparrow Search Algorithm
by Alimire Maimaiti Tuxun & Qingrui Guo - 1-17 Leveraging TenSEAL: A Comparative Study of BFV and CKKS Schemes for Training ML Models on Encrypted IoT Data
by Yancho Basil Wiryen & Noumsi Auguste Vigny & Mvogo Joseph Ngono & Fono Louis Aimé - 1-19 Adaptive Personalized Randomized Response Method Based on Local Differential Privacy
by Dongyan Zhang & Lili Zhang & Zhiyong Zhang & Zhongya Zhang - 1-19 Nudging Data Privacy of Mobile Health Applications in Saudi Arabia
by Abdulhakim Sabur & Ahmad J. Showail - 1-19 An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion
by Zhiqiang Wu & Shuhui Wan - 1-20 A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection
by Yaping Zhang - 1-20 A Multi-Scale Feature Extraction Method Based on Improved Transformer for Intrusion Detection
by Lijun Gu & Zhongye Wang - 1-21 VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs
by Yashu Liu & Xiaoyi Zhao & Xiaohua Qiu & Han-Bing Yan - 1-21 Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer
by Xinyuan Liu & Hongyang He - 1-23 Application of Machine Learning Models for Malware Classification With Real and Synthetic Datasets
by Santosh Joshi & Alexander Perez Pons & Shrirang Ambaji Kulkarni & Himanshu Upadhyay - 1-24 Explaining Privacy Paradox on WeChat: Investigating the Effect of Privacy Fatigue on Personal Information Disclosure Behaviors Among SNS Users
by Miaomiao Dong - 1-25 Network Information Security Monitoring Under Artificial Intelligence Environment
by Longfei Fu & Yibin Liu & Yanjun Zhang & Ming Li - 1-26 Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection
by Zhijie Fan & Bo Yang & Jing Peng & Bingsen Pei & Changsong Zheng & Xin Li - 1-27 RSA and Elliptic Curve Encryption System: A Systematic Literature Review
by Musa Ugbedeojo & Marion O. Adebiyi & Oluwasegun Julius Aroba & Ayodele Ariyo Adebiyi - 1-27 Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals
by Zhiwei Cao & Zhijie Fan & Boan Chen & Zidong Cheng & Shijun Xu & Xin Li - 1-28 An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training
by Yuan Tian & Wendong Wang & Jingyuan He
January 2023, Volume 17, Issue 1
- 1-14 Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks
by Xinqiang Wang & Wenhuan Lu - 1-15 Trajectory Data Publication Based on Differential Privacy
by Zhen Gu & Guoyin Zhang - 1-16 Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm
by Sangita Baruah & Dhruba Jyoti Borah & Vaskar Deka - 1-17 i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
by Sabrine Ennaji & Nabil El Akkad & Khalid Haddouch - 1-18 Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN
by Mallanagouda Biradar & Basavaraj Mathapathi - 1-18 A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques
by Mohamed Guendouz & Abdelmalek Amine - 1-18 Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features
by Zhijie Fan & Zhiwei Cao & Xin Li & Chunmei Wang & Bo Jin & Qianjin Tang - 1-18 A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
by Jinhai Song & Zhiyong Zhang & Kejing Zhao & Qinhai Xue & Brij B. Gupta - 1-22 Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures
by Suman Thapaliya & Pawan Kumar Sharma - 1-23 A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors
by Mathew Nicho & Christopher D. McDermott & Hussein Fakhry & Shini Girija - 1-25 Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies
by Ali Alibeigi & Abu Bakar Munir & Adeleh Asemi - 1-25 Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing
by Romil Rawat & Rajesh Kumar Chakrawarti & Piyush Vyas & José Luis Arias Gonzáles & Ranjana Sikarwar & Ramakant Bhardwaj - 1-27 “Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption
by Chuyi Yan & Haixia Xu & Peili Li - 1-28 Trust and Voice Biometrics Authentication for Internet of Things
by Alec Wells & Aminu Bello Usman
April 2022, Volume 16, Issue 2
- 1-13 A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data
by Kimmi Kumari & Mrunalini M. - 1-15 Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption
by Priyadharshini K. & Aroul Canessane R. - 1-15 ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments
by Kalluri Rama Krishna & C. V. Guru Rao - 1-16 A Novel Chaotic Shark Smell Optimization With LSTM for Spatio-Temporal Analytics in Clustered WSN
by Kusuma S. M. & Veena K. N. & Varun B. V. - 1-17 AEr-Aware Data Aggregation in Wireless Sensor Network Using Hybrid Multi-Verse-Optimized Connected Dominant Set
by Santhoshkumar K. & Suganthi P. - 1-17 Balanced Scheduling Method of Network Information Resources for Cloud Storage
by Xiang Ma & Zhan Li - 1-18 Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
by Anjana S. Chandran - 1-18 K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks
by Tirupathaiah Kanaparthi & Ramesh S. & Ravi Sekhar Yarrabothu - 1-18 Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference
by Hong Wei & Zhiyong Li - 1-18 Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol
by Abhijit Biswas & Dushyanta Dutta - 1-19 Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model
by Chakka S. V. V. S. N. Murty & G. P. Saradhi Varma & Chakravarthy A. S. N. - 1-19 Information Security Situation in Blockchain for Secure SDN Based on Big Data in Smart Communities: Research on Information Security Situation Awareness Based on Big Data and Artificial Intelligence
by Feilu Hang & Linjiang Xie & Zhenhong Zhang & Wei Guo & Hanruo Li - 1-20 Blockchain-Based Educational Management and Secure Software-Defined Networking in Smart Communities
by Bin Fang - 1-20 Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking
by Jintao Chen & Binruo Zhu & Fang Zhao & Ruili Huang - 1-22 Traffic Monitoring and Malicious Detection Multidimensional PCAP Data Using Optimized LSTM RNN
by Leelalakshmi S. & Rameshkumar K.
January 2022, Volume 16, Issue 1
- 1-10 Real-Time Cyber Analytics Data Collection Framework
by Herbert Maosa & Karim Ouazzane & Viktor Sowinski-Mydlarz - 1-12 Fractals for Internet of Things Network Structure Planning
by Alexander Paramonov & Evgeny Tonkikh & Ammar Muthanna & Ibrahim A. Elgendy & Andrey Koucheryavy - 1-14 Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities
by Romil Rawat & Vinod Mahor & Bhagwati Garg & Shrikant Telang & Kiran Pachlasiya & Anil Kumar & Surendra Kumar Shukla & Megha Kuliha - 1-14 A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes
by Yonglei Liu & Kun Hao & Weilong Zhang & Lin Gao & Li Wang - 1-14 Prediction of Phishing Websites Using AI Techniques
by Gururaj H. L. & Prithwijit Mitra & Soumyadip Koner & Sauvik Bal & Francesco Flammini & Janhavi V. & Ravi Kumar V. - 1-15 Anomaly Detection Using System Logs: A Deep Learning Approach
by Rohit Sinha & Rittika Sur & Ruchi Sharma & Avinash K. Shrivastava - 1-15 Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
by R. Lalduhsaka & Nilutpol Bora & Ajoy Kumar Khan - 1-16 A Proposal to Distinguish DDoS Traffic in Flash Crowd Environments
by Anderson Aparecido Alves da Silva & Leonardo Santos Silva & Erica Leandro Bezerra & Adilson Eduardo Guelfi & Claudia de Armas & Marcelo Teixeira de Azevedo & Sergio Takeo Kofuji - 1-16 Impact of Protection Level on Vertically-Differentiated Two-Sided Software Platforms
by Moez Farokhnia Hamedani & Ali Dehghan - 1-16 Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
by Hicham Grari & Khalid Zine-Dine & Khalid Zine-Dine & Ahmed Azouaoui & Siham Lamzabi - 1-17 Network Anomalies Detection Approach Based on Weighted Voting
by Sergey Sakulin & Alexander Alfimtsev & Konstantin Kvitchenko & Leonid Dobkacz & Yuri Kalgin & Igor Lychkov - 1-17 Secure and Flexible Key Protected Identity Framework for Mobile Devices
by Kapil Kant Kamal & Monit Kapoor & Padmaja Joshi - 1-17 Adaptive Deep Rider LSTM-Enabled Objective Functions for RPL Routing in IoT Applications
by Chaudhari D. A. & Dipalee A. Chaudhari & Umamaheswari E. & E. Umamaheswari - 1-17 An Integrated Machine Learning Framework for Fraud Detection: A Comparative and Comprehensive Approach
by Karim Ouazzane & Thekla Polykarpou & Yogesh Patel & Jun Li - 1-17 A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking
by Guoyan Li & Yihui Shang & Yi Liu & Xiangru Zhou - 1-17 A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices
by Na Hua & Juyan Li & Kejia Zhang & Long Zhang - 1-18 An Imperceptible Watermarking Scheme for Medical Image Tamper Detection
by Abdallah Soualmi & Adel Alti & Lamri Laouamer - 1-18 An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques
by Faheem Syeed Masoodi & Iram Abrar & Alwi M. Bamhdi - 1-18 Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
by Bahubali Akiwate & Latha Parthiban - 1-18 Watermarking Images via Counting-Based Secret Sharing for Lightweight Semi-Complete Authentication
by Adnan Gutub - 1-18 Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine
by Mohammad H. Alshayeji & Mousa AlSulaimi & Sa'ed Abed & Reem Jaffal - 1-18 Using Machine Learning in WSNs for Performance Prediction MAC Layer
by El Arbi Abdellaoui Alaoui & Mohamed-Lamine Messai & Anand Nayyar - 1-19 A Quantitative Method for Measuring Health of Authoritative Name Servers
by Sanjay Adiwal & Balaji Rajendran & Pushparaj Shetty D. - 1-19 Examination of Privacy and Security Perceptions of Social Media and Online Shopping Users: A Comparison Between Turkey and the USA
by Erkan Çetintaş & İkram Daştan - 1-19 Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation
by Divyashikha Sethia & Raj Sahu - 1-20 Provably Secure Authentication Approach for Data Security in Cloud Using Hashing, Encryption, and Chebyshev-Based Authentication
by Danish Ahamad & Md Mobin Akhtar & Shabi Alam Hameed & Mahmoud Mohammad Mahmoud Al Qerom - 1-20 Personal Data and the Assemblage Security in Consumer Internet of Things
by Mpho Ngoepe & Mfanasibili Ngwenya - 1-20 Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX
by Liangshun Wu & Hengjin Cai & Han Li - 1-20 Perturbation-Based Fuzzified K-Mode Clustering Method for Privacy Preserving Recommender System
by Abhaya Kumar Sahoo & Srishti Raj & Chittaranjan Pradhan & Bhabani Shankar Prasad Mishra & Rabindra Kumar Barik & Ankit Vidyarthi - 1-20 Intrusion Detection Model Using Temporal Convolutional Network Blend Into Attention Mechanism
by Ping Zhao & Zhijie Fan* & Zhiwei Cao & Xin Li - 1-20 Hiding Information in the DNA Sequence Using DNA Steganographic Algorithms with Double-Layered Security
by Vinodhini R. E. & Malathi P. - 1-20 Hybrid Optimization and Deep Learning for Detecting Fraud Transactions in the Bank
by Chandra Sekhar Kolli & Uma Devi T. - 1-20 An Enhanced Data Anonymization Approach for Privacy Preserving Data Publishing in Cloud Computing Based on Genetic Chimp Optimization
by Sahana Lokesh R. & H.R. Ranganatha - 1-20 Blockchain-Based Data Sharing Approach Considering Educational Data
by Meenu Jain & Manisha Jailia - 1-20 Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
by Faiza Benmenzer & Rachid Beghdad - 1-21 An Ensemble Approach for Feature Selection and Classification in Intrusion Detection Using Extra-Tree Algorithm
by Ankit Rajeshkumar Kharwar & Devendra V. Thakor - 1-21 Image Compression and Encryption Based on Integer Wavelet Transform and Hybrid Hyperchaotic System
by Rajamandrapu Srinivas & Mayur N. - 1-21 Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution
by Mohammed Tayebi & Said El Kafhali - 1-22 Privacy Disclosure in the Real World: An Experimental Study
by Siyu Wang & Nafei Zhu & Jingsha He & Da Teng & Yue Yang - 1-22 A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems
by Balakrishnan Unny R. & Nityesh Bhatt - 1-22 Securing Cloud Virtual Machine Image Using Ethereum Blockchain
by Srijita Basu & Sandip Karmakar & Debasish Bera - 1-23 Lightweight VLSI Architectures for Image Encryption Applications
by A. Prathiba & Suyash Vardhan Srivathshav & Ramkumar P. E. & Rajkamal E. & Kanchana Bhaaskaran V. S. - 1-24 Verifiable Authentication and Issuance of Academic Certificates Using Permissioned Blockchain Network
by Erukala Suresh Babu & B. K. N. Srinivasarao & Ilaiah Kavati & Mekala Srinivasa Rao - 1-24 A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation
by Kakali Chatterjee - 1-24 An Efficient Accountable Oblivious Transfer With Access Control Scheme in the Public Cloud
by Xin Liu & Bin Zhang - 1-24 An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT
by Dipali K. Shende & Yogesh S. Angal & S.C. Patil. - 1-24 Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic-Based Data Protocols
by Ankush Balaram Pawar & Shashikant U. Ghumbre & Rashmi M. Jogdand - 1-24 A Simple and Fast Medical Image Encryption System Using Chaos-Based Shifting Techniques
by Sachikanta Dash & Sasmita Padhy & Bodhisatwa Parija & T. Rojashree & K. Abhimanyu Kumar Patro - 1-25 Machine Learning Interpretability to Detect Fake Accounts in Instagram
by Amine Sallah & El Arbi Abdellaoui Alaoui & Said Agoujil & Anand Nayyar - 1-25 A New Design of Occlusion Invariant Face Recognition Using Optimal Pattern Extraction and CNN with GRU-Based Architecture
by Pankaj Pankaj & Bharti P.K & Brajesh Kumar - 1-26 Predicting Security-Vulnerable Developers Based on Their Techno-Behavioral Characteristics
by M. D. J. S. Goonetillake & Rangana Jayashanka & S. V. Rathnayaka - 1-26 What Drives Information Disclosure in Social Networking Sites: An Empirical Research Within the European Context
by Faruk Arslan & Kallol K. Bagchi & Godwin Udo - 1-26 Infrastructure Cyber-Attack Awareness Training: Effective or Not?
by Garry L. White - 1-27 A Proposal Phishing Attack Detection System on Twitter
by kamel Ahsene Djaballah & Kamel Boukhalfa & Mohamed Amine Guelmaoui & Amir Saidani & Yassine Ramdane - 1-27 CFS-MHA: A Two-Stage Network Intrusion Detection Framework
by Ritinder Kaur & Neha Gupta - 1-28 Dynamic Warnings: An Eye Gaze-Based Approach
by Mini Zeng & Feng Zhu & Sandra Carpenter - 1-28 Cylindrical Curve for Contactless Fingerprint Template Securisation
by Boris Jerson Zannou & Tahirou Djara & Antoine Vianou - 1-28 Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility
by Adnan Gutub - 1-29 Deep Ensemble Model for Detecting Attacks in Industrial IoT
by Bibhuti Bhusana Behera & Binod Kumar Pattanayak & Rajani Kanta Mohanty - 1-31 AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks
by Monica Malik & Khushi Gandhi & Bhawna Narwal - 1-32 Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
by Nitin O. Mathur & Chengcheng Li & Bilal Gonen & Kijung Lee - 1-38 Proxy-3S: A New Security Policies-Based Proxy for Efficient Distributed Virtual Machines Management in Mobile
by Boubakeur Annane & Alti Adel - 1-44 Improved Feature-Level Fusion-Based Biometric System for Genuine and Imposter Identification
by Bharath M. R. & Radhakrishna Rao K. A.
October 2021, Volume 15, Issue 4
- 1-17 A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things
by Anshuman Patel & Devesh Jinwala - 18-30 An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms
by Om Prakash Samantray & Satya Narayan Tripathy - 31-53 A Model to Improve Security Questions Through Individualized Assistance
by Andrew Mangle & Sandip Patel & Sanjay Bapna & XingXing Zu & David Gurzick - 54-78 Finite Time Synchronization of Chaotic Systems Without Linear Term and Its Application in Secure Communication: A Novel Method of Information Hiding and Recovery With Chaotic Signals
by Shuru Liu & Zhanlei Shang & Junwei Lei - 79-97 M-Commerce Security: Assessing the Value of Mobile Applications Used in Controlling Internet Security Cameras at Home and Office – An Empirical Study
by Ahmed Elmorshidy - 98-117 Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm
by Priya C. V. & K. S. Angel Viji - 118-131 Image Encryption Algorithm Based on a Novel 4D Chaotic System
by Sadiq A. Mehdi
July 2021, Volume 15, Issue 3
- 1-18 DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment
by Hongsong Chen & Caixia Meng & Jingjiu Chen - 19-32 Entropy-Based Quantification of Privacy Attained Through User Profile Similarity
by Priti Jagwani & Saroj Kaushik - 33-47 A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies
by Nabil Kannouf & Mohamed Labbi & Yassine Chahid & Mohammed Benabdellah & Abdelmalek Azizi - 48-64 A New Combinational Technique in Image Steganography
by Sabyasachi Pramanik & Debabrata Samanta & Samir Kumar Bandyopadhyay & Ramkrishna Ghosh - 65-82 VerSA: Verifiable and Secure Approach With Provable Security for Fine-Grained Data Distribution in Scalable Internet of Things Networks
by Oladayo Olufemi Olakanmi & Kehinde Oluwasesan Odeyemi - 83-105 ADT: Anonymization of Diverse Transactional Data
by Vartika Puri & Parmeet Kaur & Shelly Sachdeva - 106-128 SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data
by Muraleedharan N. & Janet B.
April 2021, Volume 15, Issue 2
- 1-28 An Improved Separable and Reversible Steganography in Encrypted Grayscale Images
by Manisha Duevedi & Sunil Kumar Muttoo - 29-52 Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud
by Shweta Kaushik & Charu Gandhi - 53-67 Steganography Technique Inspired by Rook
by Abhishek Bansal & Vinay Kumar - 68-86 (p+, α, t)-Anonymity Technique Against Privacy Attacks
by Sowmyarani C. N. & Veena Gadad & Dayananda P. - 87-112 Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain
by Randhir Kumar & Rakesh Tripathi - 113-130 Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO)
by V. Sandeep & Saravanan Kondappan & Amir Anton Jone & Raj Barath S. - 131-144 DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors
by Redha Taguelmimt & Rachid Beghdad - 145-180 Detecting DDoS Attacks in IoT Environment
by Yasmine Labiod & Abdelaziz Amara Korba & Nacira Ghoualmi-Zine - 181-195 Assessing HIPAA Compliance of Open Source Electronic Health Record Applications
by Hossain Shahriar & Hisham M. Haddad & Maryam Farhadi - 196-216 Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization
by Suhas Bhagate & Prakash J. Kulkarni
January 2021, Volume 15, Issue 1
- 1-25 A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network
by Dung Hoang Le & Nguyen Thanh Vu & Tuan Dinh Le - 26-43 Binary Classification of Network-Generated Flow Data Using a Machine Learning Algorithm
by Sikha Bagui & Keenal M. Shah & Yizhi Hu & Subhash Bagui - 44-64 CSMCSM: Client-Server Model for Comprehensive Security in MANETs
by Hatem Mahmoud Salama & Mohamed Zaki Abd El Mageed & Gouda Ismail Mohamed Salama & Khaled Mahmoud Badran - 65-98 IMMAESA: A Novel Evaluation Method of IDPSs' Reactions to Cyber-Attacks on ICSs Using Multi-Objectives Heuristic Algorithms
by Mhamed Zineddine - 99-116 Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making
by Sarra Namane & Nassira Ghoualmi & Mustafa Kaiiali - 117-137 Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery
by Salome James & Gowri Thumbur & Vasudeva Reddy P. - 138-152 Privacy Protection in Enterprise Social Networks Using a Hybrid De-Identification System
by Mohamed Abdou Souidi & Noria Taghezout - 153-172 Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks
by Preetish Ranjan & Abhishek Vaish - 173-189 Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies
by Rawan Baalous & Ronald Poet - 190-212 Data Privacy Protection Algorithm Based on Redundant Slice Technology in Wireless Sensor Networks
by Peng Li & Chao Xu & He Xu
October 2020, Volume 14, Issue 4
- 1-21 A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols
by Noureddine Aribi & Yahia Lebbah - 22-41 An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System
by S. Immaculate Shyla & S.S. Sujatha - 42-56 A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud
by Mohamed Haddadi & Rachid Beghdad - 57-73 DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
by Charu Gupta & Rakesh Kumar Singh & Simran Kaur Bhatia & Amar Kumar Mohapatra - 74-91 Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews
by Andrew R. Besmer & Jason Watson & M. Shane Banks - 92-112 Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective
by Sheshadri Chatterjee - 113-133 A Tweakable Key Alternating Lightweight Cipher for Internet of Things
by Mary Shamala L. & Zayaraz G. & Vivekanandan K. & Vijayalakshmi V.
July 2020, Volume 14, Issue 3
- 1-17 Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network
by Geetika Sarna & M. P. S. Bhatia - 18-37 Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning
by Sharmila Subudhi & Suvasini Panigrahi - 38-49 Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application
by Pranav Vyas & Bhushan Trivedi - 50-71 Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments
by Oussama Hannache & Mohamed Chaouki Batouche - 72-94 An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization
by Pooja Parameshwarappa & Zhiyuan Chen & Gunes Koru - 95-114 Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets
by Ravi Kiran Varma Penmatsa & Akhila Kalidindi & S. Kumar Reddy Mallidi - 115-133 An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions
by J. Rene Beulah & D. Shalini Punithavathani
April 2020, Volume 14, Issue 2
- 1-19 A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks
by Khundrakpam Johnson Singh & Janggunlun Haokip & Usham Sanjota Chanu - 20-40 Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice
by Rui Filipe Silva & Raul Barbosa & Jorge Bernardino - 41-61 A Valid and Correct-by-Construction Formal Specification of RBAC
by Hania Gadouche & Zoubeyr Farah & Abdelkamel Tari - 62-82 Aggregate Searchable Encryption With Result Privacy
by Dhruti P. Sharma & Devesh C. Jinwala - 83-101 Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain
by Giridhar Maji & Sharmistha Mandal & Soumya Sen - 102-115 Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem
by Kouraogo Yacouba & Orhanou Ghizlane & Elhajji Said - 116-142 IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment
by Shelendra Kumar Jain & Nishtha Kesswani
January 2020, Volume 14, Issue 1
- 1-15 Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors
by Amanpreet Kaur & Padam Kumar & Govind P. Gupta - 16-26 Manifold Surveillance Issues in Wireless Network and the Secured Protocol
by Mamata Rath & Bibudhendu Pati & Binod Kumar Pattanayak - 27-43 Comparison of Various DoS Algorithm
by Mainul Hasan & Amogh Venkatanarayan & Inder Mohan & Ninni Singh & Gunjan Chhabra - 44-66 Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE
by Neha Agarwal & Ajay Rana & J.P. Pandey & Amit Agarwal - 67-80 An Improved Intrusion Detection System to Preserve Security in Cloud Environment
by Partha Ghosh & Sumit Biswas & Shivam Shakti & Santanu Phadikar
October 2019, Volume 13, Issue 4
- 1-11 A Quantum Secure Entity Authentication Protocol Design for Network Security
by Surjit Paul & Sanjay Kumar & Rajiv Ranjan Suman - 12-27 Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption
by G. Sravan Kumar & A. Sri Krishna - 28-52 A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set
by N. Syed Siraj Ahmed & Debi Prasanna Acharjya - 53-67 Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions
by Ranu Gupta & Rahul Pachauri & Ashutosh K. Singh - 68-88 Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks
by Asha Jyothi Ch & Narsimha G. - 89-108 An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps
by Pankaj Kumar & Vishnu Sharma & Gaurav Sharma & Tarunpreet Bhatia - 109-138 A Privacy-Aware Data Aggregation Scheme for Smart Grid Based on Elliptic Curve Cryptography With Provable Security Against Internal Attacks
by Ismaila Adeniyi Kamil & Sunday Oyinlola Ogundoyin
July 2019, Volume 13, Issue 3
- 1-30 An Intelligent Surveillance System Based on IoT for Internal Security of a Nation
by Tarun Kumar & Dharmender Singh Kushwaha - 31-47 Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection
by Alok Kumar Shukla & Pradeep Singh - 48-59 Extracting and Summarizing the Commonly Faced Security Issues from Community Question Answering Site
by Abhishek Kumar Singh & Naresh Kumar Nagwani & Sudhakar Pandey - 60-73 A Priority Based Efficient Secure Framework for WBANs
by Vinay Pathak - 74-90 A Secure Cluster Head Selection Mechanism Based on Node's Features and Behavior in Wireless Sensor Networks
by Deepika Agrawal & Sudhakar Pandey & Veena Anand - 91-105 A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT
by Anurag Shukla Shukla & Sarsij Tripathi - 106-122 Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce
by Ashish Kumar Tripathi & Kapil Sharma & Manju Bala
April 2019, Volume 13, Issue 2
- 1-13 Reversible Data Hiding Scheme for Video
by T. Bhaskar & Madhu Oruganti - 14-31 An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments
by Mamdouh Alenezi & Muhammad Usama & Khaled Almustafa & Waheed Iqbal & Muhammad Ali Raza & Tanveer Khan - 32-46 Cyber Defense Maturity Levels and Threat Models for Smart Cities
by Ali Amur Al Shidhani - 47-66 Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies
by Martin Boldt & Kaavya Rekanar - 67-85 Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions
by Marwan Majeed Nayyef & Ali Makki Sagheer - 86-103 A Mathematical Model of HMST Model on Malware Static Analysis
by Satheesh Abimannan & Kumaravelu R. - 104-119 Privacy Preservation Based on Separation Sensitive Attributes for Cloud Computing
by Feng Xu & Mingming Su & Yating Hou
January 2019, Volume 13, Issue 1
- 1-16 Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm
by Oshin Sharma & Hemraj Saini - 17-29 Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence
by Yerra Shankar Rao & Prasant Kumar Nayak & Hemraj Saini & Tarini Charana Panda - 30-45 A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
by Pratiksha Gautam & Hemraj Saini - 46-58 Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET
by Mamata Rath & Binod Kumar Pattanayak - 59-69 Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing
by Pratiksha Gautam & Mohd. Dilshad Ansari & Surender Kumar Sharma - 70-85 Efficient Routing Protocol for Location Privacy Preserving in Internet of Things
by Rajwinder Kaur & Karan Verma & Shelendra Kumar Jain & Nishtha Kesswani - 86-105 A Survey: Intrusion Detection Techniques for Internet of Things
by Sarika Choudhary & Nishtha Kesswani