Back
Journal of Information Security
ISSN Online: 2153-1242
Google-based IF: 1.90  Citations h5-index & Ranking
Submission
Top Cited Articles
(198 articles with 2640 citations as of March 2017)

Sort by:
Malware Analysis and Classification: A Survey ,JIS,Vol.5 No.2, 2014
Ekta Gandotra Divya Bansal Sanjeev Sofat
Citations: 219(Details)
ISO/IEC 27000, 27001 and 27002 for Information Security Management ,JIS,Vol.4 No.2, 2013
Georg Disterer
Citations: 168(Details)
Evaluation of Electrocardiogram for Biometric Authentication ,JIS,Vol.3 No.1, 2012
Yogendra Narain Singh S K Singh
Citations: 85(Details)
A Comparison of Link Layer Attacks on Wireless Sensor Networks ,JIS,Vol.2 No.2, 2011
Shahriar Mohammadi Reza Ebrahimi Atani Hossein Jadidoleslamy
Citations: 80(Details)
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model ,JIS,Vol.6 No.1, 2015
Lawrence A. Gordon Martin P. Loeb William Lucyshyn Lei Zhou
Citations: 65(Details)
New Approach for Fast Color Image Encryption Using Chaotic Map ,JIS,Vol.2 No.4, 2011
Kamlesh Gupta Sanjay Silakari
Citations: 56(Details)
Design of the Blockchain Smart Contract: A Use Case for Real Estate ,JIS,Vol.9 No.3, 2018
Ioannis Karamitsos Maria Papadaki Nedaa Baker Al Barghuthi
Citations: 51(Details)
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks ,JIS,Vol.4 No.3, 2013
Shweta Tripathi Brij Gupta Ammar Almomani Anupama Mishra Suresh Veluru
Citations: 48(Details)
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models ,JIS,Vol.3 No.4, 2012
Alfredo Maesa Fabio Garzia Michele Scarpiniti Roberto Cusani
Citations: 46(Details)
Investing in Cybersecurity: Insights from the Gordon-Loeb Model ,JIS,Vol.7 No.2, 2016
Lawrence A. Gordon Martin P. Loeb Lei Zhou
Citations: 41(Details)
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing ,JIS,Vol.4 No.2, 2013
Abou-el-ela Abdou Hussien Nermin Hamza Hesham A. Hefny
Citations: 40(Details)
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems ,JIS,Vol.2 No.1, 2011
Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti
Citations: 40(Details)
A Novel Solution to Handle DDOS Attack in MANET ,JIS,Vol.4 No.3, 2013
Meghna Chhabra Brij Gupta Ammar Almomani
Citations: 39(Details)
Game Theory Based Network Security ,JIS,Vol.1 No.1, 2010
Yi Luo Ferenc Szidarovszky Youssif Al-Nashif Salim Hariri
Citations: 38(Details)
Secure Spread-Spectrum Watermarking for Telemedicine Applications ,JIS,Vol.2 No.2, 2011
Basant Kumar Harsh Vikram Singh Surya Pal Singh Anand Mohan
Citations: 37(Details)
Hardware Performance Evaluation of SHA-3 Candidate Algorithms ,JIS,Vol.3 No.2, 2012
Yaser Jararweh Lo’ai Tawalbeh Hala Tawalbeh Abidalrahman Moh’d
Citations: 37(Details)
Feature Selection for Intrusion Detection Using Random Forest ,JIS,Vol.7 No.3, 2016
Md. Al Mehedi Hasan Mohammed Nasser Shamim Ahmad Khademul Islam Molla
Citations: 37(Details)
Digital Forensics and Cyber Crime Datamining ,JIS,Vol.3 No.3, 2012
K. K. Sindhu B. B. Meshram
Citations: 34(Details)
Face Recognition across Time Lapse Using Convolutional Neural Networks ,JIS,Vol.7 No.3, 2016
Hachim El Khiyari Harry Wechsler
Citations: 32(Details)
Mobile Phishing Attacks and Mitigation Techniques ,JIS,Vol.6 No.3, 2015
Hossain Shahriar Tulin Klintic Victor Clincy
Citations: 31(Details)
A Comparative Study of Email Forensic Tools ,JIS,Vol.6 No.2, 2015
Vamshee Krishna Devendran Hossain Shahriar Victor Clincy
Citations: 30(Details)
Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures ,JIS,Vol.4 No.4, 2013
Jörg Uffen Nico Kaemmerer Michael H. Breitner
Citations: 29(Details)
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network ,JIS,Vol.2 No.1, 2011
Shaojun Zhang Shanshan Song
Citations: 28(Details)
Category-Based Intrusion Detection Using PCA ,JIS,Vol.3 No.4, 2012
Gholam Reza Zargar Tania Baghaie
Citations: 27(Details)
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture ,JIS,Vol.3 No.4, 2012
Amir Mohamed Talib Rodziah Atan Rusli Abdullah Masrah Azrifah Azmi Murad
Citations: 26(Details)
Proposed Framework for Security Risk Assessment ,JIS,Vol.2 No.2, 2011
Zakaria I. Saleh Heba Refai Ahmad Mashhour
Citations: 26(Details)
Anomalous Network Packet Detection Using Data Stream Mining ,JIS,Vol.2 No.4, 2011
Zachary Miller William Deitrick Wei Hu
Citations: 24(Details)
A Visual Cryptography Based Digital Image Copyright Protection ,JIS,Vol.3 No.2, 2012
Adel Hammad Abusitta
Citations: 24(Details)
iPhone Security Analysis ,JIS,Vol.1 No.2, 2010
Vaibhav Ranchhoddas Pandya Mark Stamp
Citations: 23(Details)
Simultaneous Hashing of Multiple Messages ,JIS,Vol.3 No.4, 2012
Shay Gueron Vlad Krasnov
Citations: 23(Details)
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment ,JIS,Vol.1 No.2, 2010
Sanjeev Kumar Orifiel Gomez
Citations: 22(Details)
Privacy Preserving Scheme for Location-Based Services ,JIS,Vol.3 No.2, 2012
Youssef Gahi Mouhcine Guennoun Zouhair Guennoun Khalil El-Khatib
Citations: 21(Details)
Control Framework for Secure Cloud Computing ,JIS,Vol.6 No.1, 2015
Harshit Srivastava Sathish Alampalayam Kumar
Citations: 21(Details)
Perception on Cyber Terrorism: A Focus Group Discussion Approach ,JIS,Vol.3 No.3, 2012
Rabiah Ahmad Zahri Yunos Shahrin Sahib Mariana Yusoff
Citations: 21(Details)
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case ,JIS,Vol.3 No.4, 2012
Qingquan Sun Peng Wu Yeqing Wu Mengcheng Guo Jiang Lu
Citations: 21(Details)
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat ,JIS,Vol.4 No.1, 2013
Rita M. Barrios
Citations: 19(Details)
On Secure Digital Image Watermarking Techniques ,JIS,Vol.2 No.4, 2011
Manjit Thapa Sandeep Kumar Sood
Citations: 19(Details)
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication ,JIS,Vol.3 No.3, 2012
Archana Tiwari Manisha Sharma
Citations: 19(Details)
A Forensic Traceability Index in Digital Forensic Investigation ,JIS,Vol.4 No.1, 2013
Siti Rahayu Selamat Shahrin Sahib Nor Hafeizah Robiah Yusof Mohd Faizal Abdollah
Citations: 18(Details)
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS ,JIS,Vol.3 No.2, 2012
Ahmad Bakhtiyari Shahri Zuraini Ismail
Citations: 18(Details)
Security Policy Management Process within Six Sigma Framework ,JIS,Vol.3 No.1, 2012
Vijay Anand Jafar Saniie Erdal Oruklu
Citations: 18(Details)
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy ,JIS,Vol.5 No.4, 2014
Joseph Elias Mbowe Irina Zlotnikova Simon S. Msanjila George S. Oreku
Citations: 17(Details)
The Application of Mixed Method in Developing a Cyber Terrorism Framework ,JIS,Vol.3 No.3, 2012
Rabiah Ahmad Zahri Yunos
Citations: 16(Details)
Determinants in Human Gait Recognition ,JIS,Vol.3 No.2, 2012
Tahir Amin Dimitrios Hatzinakos
Citations: 15(Details)
Digital Evidence for Database Tamper Detection ,JIS,Vol.3 No.2, 2012
Shweta Tripathi Bandu Baburao Meshram
Citations: 15(Details)
Tanimoto Based Similarity Measure for Intrusion Detection System ,JIS,Vol.2 No.4, 2011
Alok Sharma Sunil Pranit Lal
Citations: 14(Details)
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations ,JIS,Vol.4 No.2, 2013
Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos
Citations: 13(Details)
A Comparison of Malware Detection Techniques Based on Hidden Markov Model ,JIS,Vol.7 No.3, 2016
Saja Alqurashi Omar Batarfi
Citations: 13(Details)
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets ,JIS,Vol.6 No.3, 2015
Bhavesh Borisaniya Dhiren Patel
Citations: 12(Details)
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities ,JIS,Vol.6 No.2, 2015
Eugen Harinda Etienne Ntagwirumugara
Citations: 12(Details)
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs ,JIS,Vol.3 No.3, 2012
Aziz Baayer Nourddine Enneya Mohammed Elkoutbi
Citations: 12(Details)
Key Incorporation Scheme for Cancelable Biometrics ,JIS,Vol.2 No.4, 2011
Eliza Yingzi Du Kai Yang Zhi Zhou
Citations: 12(Details)
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks ,JIS,Vol.2 No.1, 2011
Sanjeev Kumar Raja Sekhar Reddy Gade
Citations: 12(Details)
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform ,JIS,Vol.2 No.2, 2011
Yasunari Yoshitomi Taro Asada Yohei Kinugawa Masayoshi Tabuse
Citations: 11(Details)
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming ,JIS,Vol.3 No.4, 2012
Mario Góngora-Blandón Miguel Vargas-Lombardo
Citations: 11(Details)
Cybersecurity: A Statistical Predictive Model for the Expected Path Length ,JIS,Vol.7 No.3, 2016
Pubudu Kalpani Kaluarachchi Chris P. Tsokos Sasith M. Rajasooriya
Citations: 11(Details)
I-PRESENTTM: An Involutive Lightweight Block Cipher ,JIS,Vol.5 No.3, 2014
Muhammad Reza Z’aba Norziana Jamil Mohd Ezanee Rusli Md. Zaini Jamaludin Ahmad Azlan Mohd Yasir
Citations: 10(Details)
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks ,JIS,Vol.5 No.3, 2014
Rodolfo Baez Junior Sanjeev Kumar
Citations: 10(Details)
Public Key Infrastructure: A Survey ,JIS,Vol.6 No.1, 2015
Aysha Albarqi Ethar Alzaid Fatimah Al Ghamdi Somaya Asiri Jayaprakash Kar
Citations: 10(Details)
A j-Lanes Tree Hashing Mode and j-Lanes SHA-256 ,JIS,Vol.4 No.1, 2013
Shay Gueron
Citations: 10(Details)
Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms ,JIS,Vol.9 No.2, 2018
Lawrence A. Gordon Martin P. Loeb William Lucyshyn Lei Zhou
Citations: 10(Details)
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability ,JIS,Vol.8 No.2, 2017
Sasith M. Rajasooriya Chris. P. Tsokos Pubudu Kalpani Kaluarachchi
Citations: 10(Details)
Enhancing Mobile Cloud Computing Security Using Steganography ,JIS,Vol.7 No.4, 2016
Hassan Reza Madhuri Sonawane
Citations: 10(Details)
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation ,JIS,Vol.7 No.4, 2016
Sasith M. Rajasooriya Chris P. Tsokos Pubudu Kalpani Kaluarachchi
Citations: 9(Details)
Effective and Extensive Virtual Private Network ,JIS,Vol.2 No.1, 2011
Tarek S. Sobh Yasser Aly
Citations: 9(Details)
Fast Forgery Detection with the Intrinsic Resampling Properties ,JIS,Vol.1 No.1, 2010
Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou
Citations: 9(Details)
Digital Image Watermarking Based on Mixed Error Correcting Code ,JIS,Vol.3 No.2, 2012
Yonghong Chen Jiancong Chen
Citations: 9(Details)
Palm Vein Authentication Based on the Coset Decomposition Method ,JIS,Vol.6 No.3, 2015
Mohamed Sayed
Citations: 9(Details)
The “Iterated Weakest Link” Model of Adaptive Security Investment ,JIS,Vol.7 No.2, 2016
Rainer Böhme Tyler Moore
Citations: 9(Details)
Age Invariant Face Recognition Using Convolutional Neural Networks and Set Distances ,JIS,Vol.8 No.3, 2017
Hachim El Khiyari Harry Wechsler
Citations: 9(Details)
A Socio-Technical Approach to Cyber Risk Management and Impact Assessment ,JIS,Vol.4 No.1, 2013
Konstantinia Charitoudi Andrew Blyth
Citations: 8(Details)
Data Stream Subspace Clustering for Anomalous Network Packet Detection ,JIS,Vol.3 No.3, 2012
Zachary Miller Wei Hu
Citations: 8(Details)
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals ,JIS,Vol.1 No.1, 2010
Andrews Samraj Shohel Sayeed Loo Chu Kiong Nikos E. Mastorokis
Citations: 8(Details)
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms ,JIS,Vol.2 No.1, 2011
Tao Xu Chunxiao Yi
Citations: 8(Details)
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy ,JIS,Vol.3 No.1, 2012
Yuji Waizumi Hiroshi Tsunoda Masashi Tsuji Yoshiaki Nemoto
Citations: 8(Details)
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm ,JIS,Vol.6 No.2, 2015
Omer K. Jasim Safia Abbas El-Sayed M. Horbaty Abdel-Badeeh M. Salem
Citations: 8(Details)
A Secure Robust Gray Scale Image Steganography Using Image Segmentation ,JIS,Vol.7 No.3, 2016
Mohammed J. Bawaneh Atef A. Obeidat
Citations: 7(Details)
Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey ,JIS,Vol.8 No.4, 2017
Asmah Muallem Sachin Shetty Jan Wei Pan Juan Zhao Biswajit Biswal
Citations: 7(Details)
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry ,JIS,Vol.5 No.4, 2014
Shawn Josette Roberts
Citations: 7(Details)
RFID Applications: Prospects and Challenges in Bangladesh ,JIS,Vol.4 No.2, 2013
Abdul Kadar Muhammad Masum Faruk Bhuiyan Kazi Golam Azam
Citations: 7(Details)
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET ,JIS,Vol.3 No.1, 2012
Tat Wing Chim Jeanno Chin Long Cheung Siu Ming Yiu Lucas Chi Kwong Hui Victor On Kwok Li
Citations: 7(Details)
Web Search Query Privacy, an End-User Perspective ,JIS,Vol.8 No.1, 2017
Kato Mivule
Citations: 7(Details)
Conventional and Improved Digital Signature Scheme: A Comparative Study ,JIS,Vol.6 No.1, 2015
Alaa D. Alrehily Asmaa F. Alotaibi Suzan B. Almutairy Mashael S. Alqhtani Jayaprakash Kar
Citations: 7(Details)
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model ,JIS,Vol.7 No.2, 2016
Scott Farrow Jules Szanton
Citations: 6(Details)
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis ,JIS,Vol.8 No.3, 2017
John Babu Sridevi Rangu Pradyusha Manogna
Citations: 6(Details)
A New Steganography Method Based on the Complex Pixels ,JIS,Vol.3 No.3, 2012
Amin Hashemi Pour Ali Payandeh
Citations: 6(Details)
A Robust Method to Detect Hidden Data from Digital Images ,JIS,Vol.3 No.2, 2012
Romany F. Mansour W. F. Awwad A. A. Mohammed
Citations: 6(Details)
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment ,JIS,Vol.3 No.1, 2012
Ilung Pranata Geoff Skinner Rukshan Athauda
Citations: 6(Details)
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks ,JIS,Vol.3 No.2, 2012
Ming Tong Tao Chen Wei Zhang Linna Dong
Citations: 6(Details)
Vulnerabilities of LDAP As An Authentication Service ,JIS,Vol.2 No.4, 2011
Charlie Obimbo Benjamin Ferriman
Citations: 6(Details)
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack ,JIS,Vol.7 No.4, 2016
Koushicaa Sundar Sanjeev Kumar
Citations: 6(Details)
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks ,JIS,Vol.6 No.2, 2015
Sanjeev Kumar Senior Member Raja Sekhar Reddy Gade
Citations: 6(Details)
Do ICMP Security Attacks Have Same Impact on Servers? ,JIS,Vol.8 No.3, 2017
Ganesh Reddy Gunnam Sanjeev Kumar
Citations: 6(Details)
The Study of Secure Congestion Control for TCP in Ad Hoc Networks ,JIS,Vol.9 No.1, 2018
Weinan Zhang Li Lin Li Du
Citations: 5(Details)
Security and Privacy Challenges in Cyber-Physical Systems ,JIS,Vol.8 No.4, 2017
Fahd AlDosari
Citations: 5(Details)
A Survey of Cloud Computing Detection Techniques against DDoS Attacks ,JIS,Vol.9 No.1, 2018
Sabah Alzahrani Liang Hong
Citations: 5(Details)
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem ,JIS,Vol.3 No.1, 2012
Rasim Alguliyev Saadat Nazirova
Citations: 5(Details)
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System ,JIS,Vol.5 No.4, 2014
Indraneel Mukhopadhyay Mohuya Chakraborty
Citations: 5(Details)
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing ,JIS,Vol.8 No.3, 2017
Asma Alotaibi Ahmed Barnawi Mohammed Buhari
Citations: 5(Details)
Study of the Security Enhancements in Various E-Mail Systems ,JIS,Vol.6 No.1, 2015
Afnan S. Babrahem Eman T. Alharbi Aisha M. Alshiky Saja S. Alqurashi Jayaprakash Kar
Citations: 5(Details)
Proactive Security Mechanism and Design for Firewall ,JIS,Vol.2 No.3, 2011
Saleem-Ullah Lar Xiaofeng Liao Aqeel ur Rehman MA Qinglu
Citations: 5(Details)
2D Conjugate Maps of DNA Sequences ,JIS,Vol.4 No.4, 2013
Qinxian Bu Jeffrey Z. J. Zheng
Citations: 5(Details)
An Efficient Trusted Computing Base for MANET Security ,JIS,Vol.5 No.4, 2014
Somya D. Mohanty Vinay Thotakura Mahalingam Ramkumar
Citations: 4(Details)
Illegal Access Detection in the Cloud Computing Environment ,JIS,Vol.5 No.2, 2014
Rasim Alguliev Fargana Abdullaeva
Citations: 4(Details)
False Positive Responses Optimization for Intrusion Detection System ,JIS,Vol.5 No.2, 2014
Jalal Baayer Boubker Regragui Aziz Baayer
Citations: 4(Details)
Peak-Shaped-Based Steganographic Technique for MP3 Audio ,JIS,Vol.4 No.1, 2013
Raffaele Pinardi Fabio Garzia Roberto Cusani
Citations: 4(Details)
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability ,JIS,Vol.1 No.2, 2010
V. Prashyanusorn Y. Fujii S. Kaviya S. Mitatha P. P. Yupapin
Citations: 4(Details)
Camera and Voice Control Based Location Services and Information Security on Android ,JIS,Vol.7 No.3, 2016
Jitendra G. Chouhan Nikhil Kumar Singh Prashant S. Modi Keyurbhai A. Jani Bhavin N. Joshi
Citations: 4(Details)
Authenticated Key Agreement Protocols: A Comparative Study ,JIS,Vol.6 No.1, 2015
Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar
Citations: 4(Details)
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers ,JIS,Vol.7 No.3, 2016
Sai Kiran Mukkavilli Sachin Shetty Liang Hong
Citations: 4(Details)
Non-Homogeneous Stochastic Model for Cyber Security Predictions ,JIS,Vol.9 No.1, 2018
Pubudu Kalpani Kaluarachchi Chris P. Tsokos Sasith M. Rajasooriya
Citations: 4(Details)
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems ,JIS,Vol.9 No.4, 2018
Ali Alqazzaz Ibrahim Alrashdi Esam Aloufi Mohamed Zohdy Hua Ming
Citations: 4(Details)
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption ,JIS,Vol.9 No.2, 2018
Marwan Ali Albahar Olayemi Olawumi Keijo Haataja Pekka Toivanen
Citations: 3(Details)
Handwritten Numeric and Alphabetic Character Recognition and Signature Verification Using Neural Network ,JIS,Vol.9 No.3, 2018
Md. Hasan Hasnain Nashif Md. Badrul Alam Miah Ahsan Habib Autish Chandra Moulik Md. Shariful Islam Mohammad Zakareya Arafat Ullah Md. Atiqur Rahman Md. Al Hasan
Citations: 3(Details)
Exploring the Effects of Gap-Penalties in Sequence-Alignment Approach to Polymorphic Virus Detection ,JIS,Vol.8 No.4, 2017
Vijay Naidu Jacqueline Whalley Ajit Narayanan
Citations: 3(Details)
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing ,JIS,Vol.6 No.3, 2015
Yoshitomo Matsubara Toshiharu Samura Haruhiko Nishimura
Citations: 3(Details)
Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth ,JIS,Vol.6 No.3, 2015
Parves Kamal Saad Mustafiz Faisal Md. Abdur Rahman Raihan Taher
Citations: 3(Details)
Multiresolution Video Watermarking Algorithm Exploiting the Block-Based Motion Estimation ,JIS,Vol.7 No.4, 2016
Salwa A. K. Mostafa Abdelrahman Ali
Citations: 3(Details)
Authenticated Privacy Preserving Pairing-Based Scheme for Remote Health Monitoring Systems ,JIS,Vol.8 No.1, 2017
Kambombo Mtonga Eun Jun Yoon Hyun Sung Kim
Citations: 3(Details)
Which Bit Is Better in Least Significant Bit? ,JIS,Vol.6 No.3, 2015
Fatin E. M. Al-Obaidi Ali Jassim Mohamed Ali
Citations: 3(Details)
Identifier Migration for Identity Continuance in Single Sign-On ,JIS,Vol.3 No.4, 2012
Yoshio Kakizaki Kazunari Maeda Keiichi Iwamura
Citations: 3(Details)
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression ,JIS,Vol.2 No.3, 2011
Shinichi Murata Yasunari Yoshitomi Hiroaki Ishii
Citations: 3(Details)
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack ,JIS,Vol.6 No.2, 2015
Eman Alharbi Noha Alsulami Omar Batarfi
Citations: 3(Details)
Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks ,JIS,Vol.5 No.4, 2014
Waleed S. Alnumay
Citations: 3(Details)
Quantifying Malware Evolution through Archaeology ,JIS,Vol.6 No.2, 2015
Jeremy D. Seideman Bilal Khan Cesar Vargas
Citations: 3(Details)
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment ,JIS,Vol.8 No.1, 2017
Ahmad Fayez S. Althobaiti
Citations: 2(Details)
Awareness of the Potential Threat of Cyberterrorism to the National Security ,JIS,Vol.5 No.4, 2014
Abdulrahman Alqahtani
Citations: 2(Details)
Information Security and the Theory of Unfaithful Information ,JIS,Vol.6 No.4, 2015
Aizhan Pernebekovna Pernebekova Beisenkulov Ayazbi Ahbergenovich
Citations: 2(Details)
Authentication Method Using a Discrete Wavelet Transform for a Digital Moving Image ,JIS,Vol.7 No.1, 2016
Ren Fujii Yasunari Yoshitomi Taro Asada Masayoshi Tabuse
Citations: 2(Details)
Web Security and Log Management: An Application Centric Perspective ,JIS,Vol.4 No.3, 2013
Andrew Mwaura Kahonge William Okello-Odongo Evans K. Miriti Elisha Abade
Citations: 2(Details)
Trusted Heartbeat Framework for Cloud Computing ,JIS,Vol.7 No.3, 2016
Dipen Contractor Dhiren Patel Shreya Patel
Citations: 2(Details)
Is Public Co-Ordination of Investment in Information Security Desirable? ,JIS,Vol.7 No.2, 2016
Christos Ioannidis David Pym Julian Williams
Citations: 2(Details)
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons ,JIS,Vol.4 No.3, 2013
Mario Marco Corbelli Fabio Garzia Roberto Cusani
Citations: 2(Details)
On the Matrix and Additive Communication Channels ,JIS,Vol.5 No.4, 2014
Vladimir Leontiev Garib Movsisyan Arthur Osipyan Zhirayr Margaryan
Citations: 2(Details)
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks ,JIS,Vol.5 No.1, 2014
Vivaksha Jariwala Vishal Singh Prafulla Kumar Devesh C. Jinwala
Citations: 2(Details)
Secure Messaging Implementation in OpenSC ,JIS,Vol.3 No.4, 2012
Maurizio Talamo Maulahikmah Galinium Christian H. Schunck Franco Arcieri
Citations: 2(Details)
Extending the Strand Space Method with Timestamps: Part I the Theory ,JIS,Vol.1 No.2, 2010
Yongjian Li Jun Pang
Citations: 2(Details)
Random but System-Wide Unique Unlinkable Parameters ,JIS,Vol.3 No.1, 2012
Peter Schartner
Citations: 2(Details)
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n,2n – 1,2n,–n) Equations ,JIS,Vol.3 No.3, 2012
Xinqian Lin Shengqiang Tang Wentao Huang
Citations: 2(Details)
Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm ,JIS,Vol.9 No.1, 2018
Sayed Afzal Mortaza Rizvi Sanjay Pratap Singh Chauhan
Citations: 2(Details)
Social Engineering Threat and Defense: A Literature Survey ,JIS,Vol.9 No.4, 2018
Islam Abdalla Mohamed Abass 1 1
Citations: 2(Details)
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy ,JIS,Vol.8 No.4, 2017
Zhenpeng Liu Yawei Dong Xuan Zhao Bin Zhang
Citations: 2(Details)
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation ,JIS,Vol.9 No.4, 2018
Sabah Alzahrani Liang Hong
Citations: 2(Details)
On the Significance of Cryptography as a Service ,JIS,Vol.9 No.4, 2018
Nick Rahimi Jacob J. Reed Bidyut Gupta
Citations: 1(Details)
On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering ,JIS,Vol.8 No.3, 2017
Iorliam Aamo Shangbum F. Caleb
Citations: 1(Details)
Associated Risks in Mobile Applications Permissions ,JIS,Vol.10 No.2, 2019
Mohammed Al Jutail Mousa Al-Akhras Abdulaziz Albesher
Citations: 1(Details)
On the Use of k-NN in Anomaly Detection ,JIS,Vol.9 No.1, 2018
Theocharis Tsigkritis George Groumas Moti Schneider
Citations: 1(Details)
On Addition of Sets in Boolean Space ,JIS,Vol.7 No.4, 2016
Vladimir Leontiev Garib Movsisyan Zhirayr Margaryan
Citations: 1(Details)
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques ,JIS,Vol.10 No.3, 2019
Md. Mijanur Rahman Anuva Rani Saha
Citations: 1(Details)
Data Compression for Next Generation Phasor Data Concentrators (PDCs) in a Smart Grid ,JIS,Vol.7 No.5, 2016
Erwan Olivo Mitch Campion Prakash Ranganathan
Citations: 1(Details)
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context ,JIS,Vol.9 No.3, 2018
Maduhu Mshangi Edephonce Ngemera Nfuka Camilius Sanga
Citations: 1(Details)
An Intelligent Model for Online Recruitment Fraud Detection ,JIS,Vol.10 No.3, 2019
Bandar Alghamdi Fahad Alharby
Citations: 1(Details)
Security Analysis of Subspace Network Coding ,JIS,Vol.9 No.1, 2018
Yantao Liu Yasser Morgan
Citations: 1(Details)
Security of Password Hashing in Cloud ,JIS,Vol.10 No.2, 2019
Parves Kamal
Citations: 1(Details)
Effect of Network Traffic on IPS Performance ,JIS,Vol.3 No.2, 2012
Shahriar Mohammadi Vahid Allahvakil Mojtaba Khaghani
Citations: 1(Details)
A Fair Electronic Cash System with Identity-Based Group Signature Scheme ,JIS,Vol.3 No.2, 2012
Khalid. O. Elaalim Shoubao Yang
Citations: 1(Details)
Reference Encryption for Access Right Segregation and Domain Representation ,JIS,Vol.3 No.2, 2012
Lanfranco Lopriore
Citations: 1(Details)
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents ,JIS,Vol.3 No.4, 2012
Thomas Djotio Ndié Claude Tangha Guy Bertrand Fopak
Citations: 1(Details)
McAfee SecurityCenter Evaluation under DDoS Attack Traffic ,JIS,Vol.2 No.3, 2011
Sirisha Surisetty Student Member Sanjeev Kumar
Citations: 1(Details)
Feedback Reliability Ratio of an Intrusion Detection System ,JIS,Vol.3 No.3, 2012
Usha Banerjee Gaurav Batra K. V. Arya
Citations: 1(Details)
Passwords Management via Split-Key ,JIS,Vol.7 No.3, 2016
Kenneth Giuliani V. Kumar Murty Guangwu Xu
Citations: 1(Details)
Profile Generation Methods for Reinforcing Robustness of Keystroke Authentication in Free Text Typing ,JIS,Vol.6 No.2, 2015
Yoshitomo Matsubara Toshiharu Samura Haruhiko Nishimura
Citations: 1(Details)
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes ,JIS,Vol.6 No.3, 2015
Abou-el-ela Abdou Hussien Nagy Ramadan Darwish Hesham A. Hefny
Citations: 1(Details)
Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology ,JIS,Vol.6 No.4, 2015
Yogesh K. Meghrajani Himanshu S. Mazumdar
Citations: 1(Details)
 
 
Top