Back
Journal of Information Security
ISSN Online: 2153-1242
Google-based IF: 2.08  Citations h5-index & Ranking
Submission
Top Cited Articles
(208 articles with 3278 citations as of March 2017)

Sort by:
Malware Analysis and Classification: A Survey ,JIS,Vol.5 No.2, 2014
Ekta Gandotra Divya Bansal Sanjeev Sofat
Citations: 308(Details)
ISO/IEC 27000, 27001 and 27002 for Information Security Management ,JIS,Vol.4 No.2, 2013
Georg Disterer
Citations: 215(Details)
Design of the Blockchain Smart Contract: A Use Case for Real Estate ,JIS,Vol.9 No.3, 2018
Ioannis Karamitsos Maria Papadaki Nedaa Baker Al Barghuthi
Citations: 94(Details)
Evaluation of Electrocardiogram for Biometric Authentication ,JIS,Vol.3 No.1, 2012
Yogendra Narain Singh S K Singh
Citations: 93(Details)
A Comparison of Link Layer Attacks on Wireless Sensor Networks ,JIS,Vol.2 No.2, 2011
Shahriar Mohammadi Reza Ebrahimi Atani Hossein Jadidoleslamy
Citations: 87(Details)
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model ,JIS,Vol.6 No.1, 2015
Lawrence A. Gordon Martin P. Loeb William Lucyshyn Lei Zhou
Citations: 78(Details)
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks ,JIS,Vol.4 No.3, 2013
Shweta Tripathi Brij Gupta Ammar Almomani Anupama Mishra Suresh Veluru
Citations: 63(Details)
New Approach for Fast Color Image Encryption Using Chaotic Map ,JIS,Vol.2 No.4, 2011
Kamlesh Gupta Sanjay Silakari
Citations: 62(Details)
Feature Selection for Intrusion Detection Using Random Forest ,JIS,Vol.7 No.3, 2016
Md. Al Mehedi Hasan Mohammed Nasser Shamim Ahmad Khademul Islam Molla
Citations: 57(Details)
A Novel Solution to Handle DDOS Attack in MANET ,JIS,Vol.4 No.3, 2013
Meghna Chhabra Brij Gupta Ammar Almomani
Citations: 52(Details)
Investing in Cybersecurity: Insights from the Gordon-Loeb Model ,JIS,Vol.7 No.2, 2016
Lawrence A. Gordon Martin P. Loeb Lei Zhou
Citations: 52(Details)
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models ,JIS,Vol.3 No.4, 2012
Alfredo Maesa Fabio Garzia Michele Scarpiniti Roberto Cusani
Citations: 51(Details)
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems ,JIS,Vol.2 No.1, 2011
Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti
Citations: 46(Details)
Secure Spread-Spectrum Watermarking for Telemedicine Applications ,JIS,Vol.2 No.2, 2011
Basant Kumar Harsh Vikram Singh Surya Pal Singh Anand Mohan
Citations: 45(Details)
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing ,JIS,Vol.4 No.2, 2013
Abou-el-ela Abdou Hussien Nermin Hamza Hesham A. Hefny
Citations: 42(Details)
Hardware Performance Evaluation of SHA-3 Candidate Algorithms ,JIS,Vol.3 No.2, 2012
Yaser Jararweh Lo’ai Tawalbeh Hala Tawalbeh Abidalrahman Moh’d
Citations: 42(Details)
Game Theory Based Network Security ,JIS,Vol.1 No.1, 2010
Yi Luo Ferenc Szidarovszky Youssif Al-Nashif Salim Hariri
Citations: 40(Details)
Face Recognition across Time Lapse Using Convolutional Neural Networks ,JIS,Vol.7 No.3, 2016
Hachim El Khiyari Harry Wechsler
Citations: 40(Details)
Digital Forensics and Cyber Crime Datamining ,JIS,Vol.3 No.3, 2012
K. K. Sindhu B. B. Meshram
Citations: 40(Details)
Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures ,JIS,Vol.4 No.4, 2013
Jörg Uffen Nico Kaemmerer Michael H. Breitner
Citations: 39(Details)
Mobile Phishing Attacks and Mitigation Techniques ,JIS,Vol.6 No.3, 2015
Hossain Shahriar Tulin Klintic Victor Clincy
Citations: 35(Details)
A Comparative Study of Email Forensic Tools ,JIS,Vol.6 No.2, 2015
Vamshee Krishna Devendran Hossain Shahriar Victor Clincy
Citations: 34(Details)
Proposed Framework for Security Risk Assessment ,JIS,Vol.2 No.2, 2011
Zakaria I. Saleh Heba Refai Ahmad Mashhour
Citations: 32(Details)
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network ,JIS,Vol.2 No.1, 2011
Shaojun Zhang Shanshan Song
Citations: 31(Details)
Category-Based Intrusion Detection Using PCA ,JIS,Vol.3 No.4, 2012
Gholam Reza Zargar Tania Baghaie
Citations: 30(Details)
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture ,JIS,Vol.3 No.4, 2012
Amir Mohamed Talib Rodziah Atan Rusli Abdullah Masrah Azrifah Azmi Murad
Citations: 30(Details)
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat ,JIS,Vol.4 No.1, 2013
Rita M. Barrios
Citations: 25(Details)
Privacy Preserving Scheme for Location-Based Services ,JIS,Vol.3 No.2, 2012
Youssef Gahi Mouhcine Guennoun Zouhair Guennoun Khalil El-Khatib
Citations: 25(Details)
A Visual Cryptography Based Digital Image Copyright Protection ,JIS,Vol.3 No.2, 2012
Adel Hammad Abusitta
Citations: 24(Details)
Anomalous Network Packet Detection Using Data Stream Mining ,JIS,Vol.2 No.4, 2011
Zachary Miller William Deitrick Wei Hu
Citations: 24(Details)
Simultaneous Hashing of Multiple Messages ,JIS,Vol.3 No.4, 2012
Shay Gueron Vlad Krasnov
Citations: 24(Details)
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment ,JIS,Vol.1 No.2, 2010
Sanjeev Kumar Orifiel Gomez
Citations: 24(Details)
iPhone Security Analysis ,JIS,Vol.1 No.2, 2010
Vaibhav Ranchhoddas Pandya Mark Stamp
Citations: 23(Details)
Control Framework for Secure Cloud Computing ,JIS,Vol.6 No.1, 2015
Harshit Srivastava Sathish Alampalayam Kumar
Citations: 23(Details)
Security Policy Management Process within Six Sigma Framework ,JIS,Vol.3 No.1, 2012
Vijay Anand Jafar Saniie Erdal Oruklu
Citations: 22(Details)
Unsupervised Multi-Level Non-Negative Matrix Factorization Model: Binary Data Case ,JIS,Vol.3 No.4, 2012
Qingquan Sun Peng Wu Yeqing Wu Mengcheng Guo Jiang Lu
Citations: 21(Details)
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy ,JIS,Vol.5 No.4, 2014
Joseph Elias Mbowe Irina Zlotnikova Simon S. Msanjila George S. Oreku
Citations: 21(Details)
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication ,JIS,Vol.3 No.3, 2012
Archana Tiwari Manisha Sharma
Citations: 21(Details)
Perception on Cyber Terrorism: A Focus Group Discussion Approach ,JIS,Vol.3 No.3, 2012
Rabiah Ahmad Zahri Yunos Shahrin Sahib Mariana Yusoff
Citations: 21(Details)
On Secure Digital Image Watermarking Techniques ,JIS,Vol.2 No.4, 2011
Manjit Thapa Sandeep Kumar Sood
Citations: 19(Details)
A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS ,JIS,Vol.3 No.2, 2012
Ahmad Bakhtiyari Shahri Zuraini Ismail
Citations: 19(Details)
A Forensic Traceability Index in Digital Forensic Investigation ,JIS,Vol.4 No.1, 2013
Siti Rahayu Selamat Shahrin Sahib Nor Hafeizah Robiah Yusof Mohd Faizal Abdollah
Citations: 19(Details)
The Application of Mixed Method in Developing a Cyber Terrorism Framework ,JIS,Vol.3 No.3, 2012
Rabiah Ahmad Zahri Yunos
Citations: 19(Details)
Digital Evidence for Database Tamper Detection ,JIS,Vol.3 No.2, 2012
Shweta Tripathi Bandu Baburao Meshram
Citations: 18(Details)
Key Incorporation Scheme for Cancelable Biometrics ,JIS,Vol.2 No.4, 2011
Eliza Yingzi Du Kai Yang Zhi Zhou
Citations: 18(Details)
A Comparison of Malware Detection Techniques Based on Hidden Markov Model ,JIS,Vol.7 No.3, 2016
Saja Alqurashi Omar Batarfi
Citations: 18(Details)
Tanimoto Based Similarity Measure for Intrusion Detection System ,JIS,Vol.2 No.4, 2011
Alok Sharma Sunil Pranit Lal
Citations: 17(Details)
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets ,JIS,Vol.6 No.3, 2015
Bhavesh Borisaniya Dhiren Patel
Citations: 17(Details)
Determinants in Human Gait Recognition ,JIS,Vol.3 No.2, 2012
Tahir Amin Dimitrios Hatzinakos
Citations: 16(Details)
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm ,JIS,Vol.6 No.2, 2015
Omer K. Jasim Safia Abbas El-Sayed M. Horbaty Abdel-Badeeh M. Salem
Citations: 16(Details)
Public Key Infrastructure: A Survey ,JIS,Vol.6 No.1, 2015
Aysha Albarqi Ethar Alzaid Fatimah Al Ghamdi Somaya Asiri Jayaprakash Kar
Citations: 16(Details)
Watermarking Images in the Frequency Domain by Exploiting Self-Inverting Permutations ,JIS,Vol.4 No.2, 2013
Maria Chroni Angelos Fylakis Stavros D. Nikolopoulos
Citations: 14(Details)
Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms ,JIS,Vol.9 No.2, 2018
Lawrence A. Gordon Martin P. Loeb William Lucyshyn Lei Zhou
Citations: 14(Details)
Effective and Extensive Virtual Private Network ,JIS,Vol.2 No.1, 2011
Tarek S. Sobh Yasser Aly
Citations: 14(Details)
Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks ,JIS,Vol.2 No.1, 2011
Sanjeev Kumar Raja Sekhar Reddy Gade
Citations: 13(Details)
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform ,JIS,Vol.2 No.2, 2011
Yasunari Yoshitomi Taro Asada Yohei Kinugawa Masayoshi Tabuse
Citations: 13(Details)
Cybersecurity: A Statistical Predictive Model for the Expected Path Length ,JIS,Vol.7 No.3, 2016
Pubudu Kalpani Kaluarachchi Chris P. Tsokos Sasith M. Rajasooriya
Citations: 13(Details)
Enhancing Mobile Cloud Computing Security Using Steganography ,JIS,Vol.7 No.4, 2016
Hassan Reza Madhuri Sonawane
Citations: 13(Details)
Cyber Security: Nonlinear Stochastic Models for Predicting the Exploitability ,JIS,Vol.8 No.2, 2017
Sasith M. Rajasooriya Chris. P. Tsokos Pubudu Kalpani Kaluarachchi
Citations: 12(Details)
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs ,JIS,Vol.3 No.3, 2012
Aziz Baayer Nourddine Enneya Mohammed Elkoutbi
Citations: 12(Details)
Security & Privacy Implications in the Placement of Biometric-Based ID Card for Rwanda Universities ,JIS,Vol.6 No.2, 2015
Eugen Harinda Etienne Ntagwirumugara
Citations: 12(Details)
I-PRESENTTM: An Involutive Lightweight Block Cipher ,JIS,Vol.5 No.3, 2014
Muhammad Reza Z’aba Norziana Jamil Mohd Ezanee Rusli Md. Zaini Jamaludin Ahmad Azlan Mohd Yasir
Citations: 12(Details)
Age Invariant Face Recognition Using Convolutional Neural Networks and Set Distances ,JIS,Vol.8 No.3, 2017
Hachim El Khiyari Harry Wechsler
Citations: 11(Details)
State of the Art for String Analysis and Pattern Search Using CPU and GPU Based Programming ,JIS,Vol.3 No.4, 2012
Mario Góngora-Blandón Miguel Vargas-Lombardo
Citations: 11(Details)
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation ,JIS,Vol.7 No.4, 2016
Sasith M. Rajasooriya Chris P. Tsokos Pubudu Kalpani Kaluarachchi
Citations: 11(Details)
Social Engineering Threat and Defense: A Literature Survey ,JIS,Vol.9 No.4, 2018
Islam Abdalla Mohamed Abass 1 1
Citations: 11(Details)
Palm Vein Authentication Based on the Coset Decomposition Method ,JIS,Vol.6 No.3, 2015
Mohamed Sayed
Citations: 10(Details)
Digital Image Watermarking Based on Mixed Error Correcting Code ,JIS,Vol.3 No.2, 2012
Yonghong Chen Jiancong Chen
Citations: 10(Details)
A j-Lanes Tree Hashing Mode and j-Lanes SHA-256 ,JIS,Vol.4 No.1, 2013
Shay Gueron
Citations: 10(Details)
The “Iterated Weakest Link” Model of Adaptive Security Investment ,JIS,Vol.7 No.2, 2016
Rainer Böhme Tyler Moore
Citations: 10(Details)
A Secure Robust Gray Scale Image Steganography Using Image Segmentation ,JIS,Vol.7 No.3, 2016
Mohammed J. Bawaneh Atef A. Obeidat
Citations: 10(Details)
Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey ,JIS,Vol.8 No.4, 2017
Asmah Muallem Sachin Shetty Jan Wei Pan Juan Zhao Biswajit Biswal
Citations: 10(Details)
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks ,JIS,Vol.5 No.3, 2014
Rodolfo Baez Junior Sanjeev Kumar
Citations: 10(Details)
Data Stream Subspace Clustering for Anomalous Network Packet Detection ,JIS,Vol.3 No.3, 2012
Zachary Miller Wei Hu
Citations: 10(Details)
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms ,JIS,Vol.2 No.1, 2011
Tao Xu Chunxiao Yi
Citations: 9(Details)
Fast Forgery Detection with the Intrinsic Resampling Properties ,JIS,Vol.1 No.1, 2010
Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou
Citations: 9(Details)
A Socio-Technical Approach to Cyber Risk Management and Impact Assessment ,JIS,Vol.4 No.1, 2013
Konstantinia Charitoudi Andrew Blyth
Citations: 9(Details)
Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption ,JIS,Vol.9 No.2, 2018
Marwan Ali Albahar Olayemi Olawumi Keijo Haataja Pekka Toivanen
Citations: 9(Details)
Proactive Security Mechanism and Design for Firewall ,JIS,Vol.2 No.3, 2011
Saleem-Ullah Lar Xiaofeng Liao Aqeel ur Rehman MA Qinglu
Citations: 9(Details)
Eliminating Forgers Based on Intra Trial Variability in Online Signature Verification Using Handglove and Photometric Signals ,JIS,Vol.1 No.1, 2010
Andrews Samraj Shohel Sayeed Loo Chu Kiong Nikos E. Mastorokis
Citations: 8(Details)
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy ,JIS,Vol.3 No.1, 2012
Yuji Waizumi Hiroshi Tsunoda Masashi Tsuji Yoshiaki Nemoto
Citations: 8(Details)
RFID Applications: Prospects and Challenges in Bangladesh ,JIS,Vol.4 No.2, 2013
Abdul Kadar Muhammad Masum Faruk Bhuiyan Kazi Golam Azam
Citations: 8(Details)
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry ,JIS,Vol.5 No.4, 2014
Shawn Josette Roberts
Citations: 8(Details)
Web Search Query Privacy, an End-User Perspective ,JIS,Vol.8 No.1, 2017
Kato Mivule
Citations: 8(Details)
Conventional and Improved Digital Signature Scheme: A Comparative Study ,JIS,Vol.6 No.1, 2015
Alaa D. Alrehily Asmaa F. Alotaibi Suzan B. Almutairy Mashael S. Alqhtani Jayaprakash Kar
Citations: 8(Details)
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation ,JIS,Vol.9 No.4, 2018
Sabah Alzahrani Liang Hong
Citations: 7(Details)
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model ,JIS,Vol.7 No.2, 2016
Scott Farrow Jules Szanton
Citations: 7(Details)
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis ,JIS,Vol.8 No.3, 2017
John Babu Sridevi Rangu Pradyusha Manogna
Citations: 7(Details)
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment ,JIS,Vol.3 No.1, 2012
Ilung Pranata Geoff Skinner Rukshan Athauda
Citations: 7(Details)
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET ,JIS,Vol.3 No.1, 2012
Tat Wing Chim Jeanno Chin Long Cheung Siu Ming Yiu Lucas Chi Kwong Hui Victor On Kwok Li
Citations: 7(Details)
A Robust Method to Detect Hidden Data from Digital Images ,JIS,Vol.3 No.2, 2012
Romany F. Mansour W. F. Awwad A. A. Mohammed
Citations: 7(Details)
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks ,JIS,Vol.3 No.2, 2012
Ming Tong Tao Chen Wei Zhang Linna Dong
Citations: 6(Details)
Vulnerabilities of LDAP As An Authentication Service ,JIS,Vol.2 No.4, 2011
Charlie Obimbo Benjamin Ferriman
Citations: 6(Details)
The Study of Secure Congestion Control for TCP in Ad Hoc Networks ,JIS,Vol.9 No.1, 2018
Weinan Zhang Li Lin Li Du
Citations: 6(Details)
Study of the Security Enhancements in Various E-Mail Systems ,JIS,Vol.6 No.1, 2015
Afnan S. Babrahem Eman T. Alharbi Aisha M. Alshiky Saja S. Alqurashi Jayaprakash Kar
Citations: 6(Details)
On the Significance of Cryptography as a Service ,JIS,Vol.9 No.4, 2018
Nick Rahimi Jacob J. Reed Bidyut Gupta
Citations: 6(Details)
Do ICMP Security Attacks Have Same Impact on Servers? ,JIS,Vol.8 No.3, 2017
Ganesh Reddy Gunnam Sanjeev Kumar
Citations: 6(Details)
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack ,JIS,Vol.7 No.4, 2016
Koushicaa Sundar Sanjeev Kumar
Citations: 6(Details)
Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth ,JIS,Vol.6 No.3, 2015
Parves Kamal Saad Mustafiz Faisal Md. Abdur Rahman Raihan Taher
Citations: 6(Details)
A Survey of Cloud Computing Detection Techniques against DDoS Attacks ,JIS,Vol.9 No.1, 2018
Sabah Alzahrani Liang Hong
Citations: 6(Details)
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing ,JIS,Vol.8 No.3, 2017
Asma Alotaibi Ahmed Barnawi Mohammed Buhari
Citations: 6(Details)
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems ,JIS,Vol.9 No.4, 2018
Ali Alqazzaz Ibrahim Alrashdi Esam Aloufi Mohamed Zohdy Hua Ming
Citations: 6(Details)
A New Steganography Method Based on the Complex Pixels ,JIS,Vol.3 No.3, 2012
Amin Hashemi Pour Ali Payandeh
Citations: 6(Details)
Quantifying Malware Evolution through Archaeology ,JIS,Vol.6 No.2, 2015
Jeremy D. Seideman Bilal Khan Cesar Vargas
Citations: 6(Details)
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks ,JIS,Vol.6 No.2, 2015
Sanjeev Kumar Senior Member Raja Sekhar Reddy Gade
Citations: 6(Details)
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers ,JIS,Vol.7 No.3, 2016
Sai Kiran Mukkavilli Sachin Shetty Liang Hong
Citations: 6(Details)
Camera and Voice Control Based Location Services and Information Security on Android ,JIS,Vol.7 No.3, 2016
Jitendra G. Chouhan Nikhil Kumar Singh Prashant S. Modi Keyurbhai A. Jani Bhavin N. Joshi
Citations: 5(Details)
Data Compression for Next Generation Phasor Data Concentrators (PDCs) in a Smart Grid ,JIS,Vol.7 No.5, 2016
Erwan Olivo Mitch Campion Prakash Ranganathan
Citations: 5(Details)
Handwritten Numeric and Alphabetic Character Recognition and Signature Verification Using Neural Network ,JIS,Vol.9 No.3, 2018
Md. Hasan Hasnain Nashif Md. Badrul Alam Miah Ahsan Habib Autish Chandra Moulik Md. Shariful Islam Mohammad Zakareya Arafat Ullah Md. Atiqur Rahman Md. Al Hasan
Citations: 5(Details)
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment ,JIS,Vol.8 No.1, 2017
Ahmad Fayez S. Althobaiti
Citations: 5(Details)
An Intelligent Model for Online Recruitment Fraud Detection ,JIS,Vol.10 No.3, 2019
Bandar Alghamdi Fahad Alharby
Citations: 5(Details)
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification ,JIS,Vol.9 No.1, 2018
Sharmila Bista Roshan Chitrakar
Citations: 5(Details)
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System ,JIS,Vol.5 No.4, 2014
Indraneel Mukhopadhyay Mohuya Chakraborty
Citations: 5(Details)
Multiresolution Video Watermarking Algorithm Exploiting the Block-Based Motion Estimation ,JIS,Vol.7 No.4, 2016
Salwa A. K. Mostafa Abdelrahman Ali
Citations: 5(Details)
Security and Privacy Challenges in Cyber-Physical Systems ,JIS,Vol.8 No.4, 2017
Fahd AlDosari
Citations: 5(Details)
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem ,JIS,Vol.3 No.1, 2012
Rasim Alguliyev Saadat Nazirova
Citations: 5(Details)
2D Conjugate Maps of DNA Sequences ,JIS,Vol.4 No.4, 2013
Qinxian Bu Jeffrey Z. J. Zheng
Citations: 5(Details)
Non-Homogeneous Stochastic Model for Cyber Security Predictions ,JIS,Vol.9 No.1, 2018
Pubudu Kalpani Kaluarachchi Chris P. Tsokos Sasith M. Rajasooriya
Citations: 5(Details)
False Positive Responses Optimization for Intrusion Detection System ,JIS,Vol.5 No.2, 2014
Jalal Baayer Boubker Regragui Aziz Baayer
Citations: 5(Details)
Peak-Shaped-Based Steganographic Technique for MP3 Audio ,JIS,Vol.4 No.1, 2013
Raffaele Pinardi Fabio Garzia Roberto Cusani
Citations: 4(Details)
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression ,JIS,Vol.2 No.3, 2011
Shinichi Murata Yasunari Yoshitomi Hiroaki Ishii
Citations: 4(Details)
Exploring the Effects of Gap-Penalties in Sequence-Alignment Approach to Polymorphic Virus Detection ,JIS,Vol.8 No.4, 2017
Vijay Naidu Jacqueline Whalley Ajit Narayanan
Citations: 4(Details)
Is Public Co-Ordination of Investment in Information Security Desirable? ,JIS,Vol.7 No.2, 2016
Christos Ioannidis David Pym Julian Williams
Citations: 4(Details)
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability ,JIS,Vol.1 No.2, 2010
V. Prashyanusorn Y. Fujii S. Kaviya S. Mitatha P. P. Yupapin
Citations: 4(Details)
An Efficient Trusted Computing Base for MANET Security ,JIS,Vol.5 No.4, 2014
Somya D. Mohanty Vinay Thotakura Mahalingam Ramkumar
Citations: 4(Details)
Authenticated Key Agreement Protocols: A Comparative Study ,JIS,Vol.6 No.1, 2015
Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar
Citations: 4(Details)
Illegal Access Detection in the Cloud Computing Environment ,JIS,Vol.5 No.2, 2014
Rasim Alguliev Fargana Abdullaeva
Citations: 4(Details)
Awareness of the Potential Threat of Cyberterrorism to the National Security ,JIS,Vol.5 No.4, 2014
Abdulrahman Alqahtani
Citations: 3(Details)
Information Security and the Theory of Unfaithful Information ,JIS,Vol.6 No.4, 2015
Aizhan Pernebekovna Pernebekova Beisenkulov Ayazbi Ahbergenovich
Citations: 3(Details)
Authenticated Privacy Preserving Pairing-Based Scheme for Remote Health Monitoring Systems ,JIS,Vol.8 No.1, 2017
Kambombo Mtonga Eun Jun Yoon Hyun Sung Kim
Citations: 3(Details)
On the Use of k-NN in Anomaly Detection ,JIS,Vol.9 No.1, 2018
Theocharis Tsigkritis George Groumas Moti Schneider
Citations: 3(Details)
Identifier Migration for Identity Continuance in Single Sign-On ,JIS,Vol.3 No.4, 2012
Yoshio Kakizaki Kazunari Maeda Keiichi Iwamura
Citations: 3(Details)
Keyboard Dependency of Personal Identification Performance by Keystroke Dynamics in Free Text Typing ,JIS,Vol.6 No.3, 2015
Yoshitomo Matsubara Toshiharu Samura Haruhiko Nishimura
Citations: 3(Details)
Which Bit Is Better in Least Significant Bit? ,JIS,Vol.6 No.3, 2015
Fatin E. M. Al-Obaidi Ali Jassim Mohamed Ali
Citations: 3(Details)
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks ,JIS,Vol.5 No.1, 2014
Vivaksha Jariwala Vishal Singh Prafulla Kumar Devesh C. Jinwala
Citations: 3(Details)
Random but System-Wide Unique Unlinkable Parameters ,JIS,Vol.3 No.1, 2012
Peter Schartner
Citations: 3(Details)
Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks ,JIS,Vol.5 No.4, 2014
Waleed S. Alnumay
Citations: 3(Details)
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack ,JIS,Vol.6 No.2, 2015
Eman Alharbi Noha Alsulami Omar Batarfi
Citations: 3(Details)
Effect of Network Traffic on IPS Performance ,JIS,Vol.3 No.2, 2012
Shahriar Mohammadi Vahid Allahvakil Mojtaba Khaghani
Citations: 2(Details)
McAfee SecurityCenter Evaluation under DDoS Attack Traffic ,JIS,Vol.2 No.3, 2011
Sirisha Surisetty Student Member Sanjeev Kumar
Citations: 2(Details)
Security of Password Hashing in Cloud ,JIS,Vol.10 No.2, 2019
Parves Kamal
Citations: 2(Details)
Authentication Method Using a Discrete Wavelet Transform for a Digital Moving Image ,JIS,Vol.7 No.1, 2016
Ren Fujii Yasunari Yoshitomi Taro Asada Masayoshi Tabuse
Citations: 2(Details)
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy ,JIS,Vol.8 No.4, 2017
Zhenpeng Liu Yawei Dong Xuan Zhao Bin Zhang
Citations: 2(Details)
A Comparative Study and Performance Analysis of ATM Card Fraud Detection Techniques ,JIS,Vol.10 No.3, 2019
Md. Mijanur Rahman Anuva Rani Saha
Citations: 2(Details)
Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm ,JIS,Vol.9 No.1, 2018
Sayed Afzal Mortaza Rizvi Sanjay Pratap Singh Chauhan
Citations: 2(Details)
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture ,JIS,Vol.10 No.2, 2019
Nick Rahimi John Nolen Bidyut Gupta
Citations: 2(Details)
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons ,JIS,Vol.4 No.3, 2013
Mario Marco Corbelli Fabio Garzia Roberto Cusani
Citations: 2(Details)
Web Security and Log Management: An Application Centric Perspective ,JIS,Vol.4 No.3, 2013
Andrew Mwaura Kahonge William Okello-Odongo Evans K. Miriti Elisha Abade
Citations: 2(Details)
The Extended Tanh Method for Compactons and Solitons Solutions for the CH(n,2n – 1,2n,–n) Equations ,JIS,Vol.3 No.3, 2012
Xinqian Lin Shengqiang Tang Wentao Huang
Citations: 2(Details)
Secure Messaging Implementation in OpenSC ,JIS,Vol.3 No.4, 2012
Maurizio Talamo Maulahikmah Galinium Christian H. Schunck Franco Arcieri
Citations: 2(Details)
Extending the Strand Space Method with Timestamps: Part I the Theory ,JIS,Vol.1 No.2, 2010
Yongjian Li Jun Pang
Citations: 2(Details)
On the Matrix and Additive Communication Channels ,JIS,Vol.5 No.4, 2014
Vladimir Leontiev Garib Movsisyan Arthur Osipyan Zhirayr Margaryan
Citations: 2(Details)
Trusted Heartbeat Framework for Cloud Computing ,JIS,Vol.7 No.3, 2016
Dipen Contractor Dhiren Patel Shreya Patel
Citations: 2(Details)
How Secure Having IoT Devices in Our Homes? ,JIS,Vol.11 No.2, 2020
Debora Estrada Lo’ai Tawalbeh Robert Vinaja
Citations: 2(Details)
Profile Generation Methods for Reinforcing Robustness of Keystroke Authentication in Free Text Typing ,JIS,Vol.6 No.2, 2015
Yoshitomo Matsubara Toshiharu Samura Haruhiko Nishimura
Citations: 1(Details)
Security Analysis of Subspace Network Coding ,JIS,Vol.9 No.1, 2018
Yantao Liu Yasser Morgan
Citations: 1(Details)
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents ,JIS,Vol.3 No.4, 2012
Thomas Djotio Ndié Claude Tangha Guy Bertrand Fopak
Citations: 1(Details)
Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes ,JIS,Vol.6 No.3, 2015
Abou-el-ela Abdou Hussien Nagy Ramadan Darwish Hesham A. Hefny
Citations: 1(Details)
Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology ,JIS,Vol.6 No.4, 2015
Yogesh K. Meghrajani Himanshu S. Mazumdar
Citations: 1(Details)
On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering ,JIS,Vol.8 No.3, 2017
Iorliam Aamo Shangbum F. Caleb
Citations: 1(Details)
Feedback Reliability Ratio of an Intrusion Detection System ,JIS,Vol.3 No.3, 2012
Usha Banerjee Gaurav Batra K. V. Arya
Citations: 1(Details)
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network ,JIS,Vol.10 No.3, 2019
Akinjide A. Akinola Adeyemi A. Adekoya Ayoade O. Kuye Abiodun Ayodeji
Citations: 1(Details)
Encrypted CDMA Audio Network ,JIS,Vol.5 No.3, 2014
Alfredo A. Ortega Víctor A. Bettachini Pablo I. Fierens José Ignacio Alvarez-Hamelin
Citations: 1(Details)
Comparative Study of Different Cryptographic Algorithms ,JIS,Vol.11 No.3, 2020
Baha Eldin Hamouda Hassan Hamouda
Citations: 1(Details)
On Addition of Sets in Boolean Space ,JIS,Vol.7 No.4, 2016
Vladimir Leontiev Garib Movsisyan Zhirayr Margaryan
Citations: 1(Details)
Associated Risks in Mobile Applications Permissions ,JIS,Vol.10 No.2, 2019
Mohammed Al Jutail Mousa Al-Akhras Abdulaziz Albesher
Citations: 1(Details)
Passwords Management via Split-Key ,JIS,Vol.7 No.3, 2016
Kenneth Giuliani V. Kumar Murty Guangwu Xu
Citations: 1(Details)
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection ,JIS,Vol.11 No.1, 2020
Yasamin Alagrash Azhar Drebee Nedda Zirjawi 1 1 1 1
Citations: 1(Details)
A Fair Electronic Cash System with Identity-Based Group Signature Scheme ,JIS,Vol.3 No.2, 2012
Khalid. O. Elaalim Shoubao Yang
Citations: 1(Details)
Reference Encryption for Access Right Segregation and Domain Representation ,JIS,Vol.3 No.2, 2012
Lanfranco Lopriore
Citations: 1(Details)
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context ,JIS,Vol.9 No.3, 2018
Maduhu Mshangi Edephonce Ngemera Nfuka Camilius Sanga
Citations: 1(Details)
 
 
Top