default search action
Information Security Journal: A Global Perspective, Volume 28
Volume 28, Numbers 1-2, 2019
- Shivi Garg, Rakesh Kumar Singh, Amar Kumar Mohapatra:
Analysis of software vulnerability classification based on different technical parameters. 1-19 - Lanfranco Lopriore:
Key management in wireless sensor networks. 20-34 - Milap J. Bhuva, Sanjay Singh:
Symmetric key-based authenticated encryption protocol. 35-45 - Mikhail Styugin:
Protection from reconnaissance for establishing information security systems. 46-54
Volume 28, Number 3, 2019
- Akhyari Nasir, Ruzaini Abdullah Arshah, Mohd Rashid Ab Hamid:
A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions. 55-80 - Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, Stefanos Gritzalis:
A comprehensive cybersecurity learning platform for elementary education. 81-106
Volume 28, Numbers 4-5, 2019
- Sayed Mohammad Hossein Mirshahjafari, Behrouz Shahgholi Ghahfarokhi:
Sinkhole+CloneID: A hybrid attack on RPL performance and detection method. 107-119 - Karima Djebaili, Lamine Melkemi:
Two dimensional ElGamal public key cryptosystem. 120-126 - Rita Ismailova, Gulshat Muhametjanova, Tunç Durmus Medeni, Ihsan Tolga Medeni, Demet Soylu, Omar Azimbek Dossymbekuly:
Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan. 127-135 - Paul Joseph, Jasmine Norman:
Forensic corpus data reduction techniques for faster analysis by eliminating tedious files. 136-147
Volume 28, Number 6, 2019
- N. B. Gayathri, Thumbur Gowri, Punugu Vasudeva Reddy:
Secure and efficient certificateless aggregate signature scheme from bilinear pairings. 149-163 - Ashutosh Bahuguna, Raj Kishor Bisht, Jeetendra Pande:
Assessing cybersecurity maturity of organizations: An empirical investigation in the Indian context. 164-177 - Hossain Shahriar, Chi Zhang, Stephen Dunn, Robert Bronte, Atef Sahlan, Khaled Tarmissi:
Mobile anti-phishing: Approaches and challenges. 178-193
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.