default search action
Security and Privacy, Volume 1
Volume 1, Number 1, January 2018
- Mohammad S. Obaidat:
Inaugural Editorial: A Message from the Founding Editor-in-Chief. - Jack Patterson, Mohammad S. Obaidat:
Submission and citation practices and Security and Privacy's commitment to integrity and ethics.
- Miloud Mihoubi, Abdellatif Rahmoun, Pascal Lorenz
, Noureddine Lasla:
An effective Bat algorithm for node localization in distributed wireless sensor network. - El Habib Boudjema, Christèle Faure, Mathieu Sassolas, Lynda Mokdad
:
Detection of security vulnerabilities in C language applications. - Hadeer Ahmed, Issa Traoré
, Sherif Saad:
Detecting opinion spams and fake news using text classification. - Achillefs Moschos, Georgios I. Papadimitriou, Petros Nicopolitidis
:
Proactive encryption of personal area networks and small office-home office networks under advanced encryption standard application. - Ahcene Teniou
, Boucif Amar Bensaber:
Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks. - Chandrashekhar Meshram
, Mohammad S. Obaidat, Sarita Gajbhiye Meshram:
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Volume 1, Number 2, March 2018
- Dariush Abbasinezhad-Mood, Morteza Nikooghadam
:
Efficient design and extensive hardware evaluation of an anonymous data aggregation scheme for smart grid. - Eslam G. AbdAllah
, Mohammad Zulkernine, Hossam S. Hassanein:
DADI: Defending against distributed denial of service in information-centric networking routing and caching. - Hooman Asadian
, Hamid Haj Seyed Javadi
:
Identification of Sybil attacks on social networks using a framework based on user interactions.
- Yuchia Tseng, Farid Naït-Abdesselam
, Ashfaq Khokhar:
A comprehensive 3-dimensional security analysis of a controller in software-defined networking. - Musa G. Samaila
, Miguel Neto, Diogo A. B. Fernandes, Mário M. Freire
, Pedro R. M. Inácio:
Challenges of securing Internet of Things devices: A survey.
Volume 1, Number 3, May 2018
Editorial
- Isaac Woungang, Sanjay Kumar Dhurandher, Joel J. P. C. Rodrigues, Ahmed Awad:
Special Issue on security and privacy in Internet of Things and cloud computing systems.
- Michael Martin Losavio
, Kam-Pui Chow
, Andras Koltay, Joshua James
:
The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. - Alexander Oppermann
, Federico Grasso Toro, Florian Thiel, Jean-Pierre Seifert:
Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control. - Maninder Singh Raniyal, Isaac Woungang
, Sanjay Kumar Dhurandher, Sherif Saad Ahmed:
Passphrase protected device-to-device mutual authentication schemes for smart homes. - Alfredo J. Perez
, Sherali Zeadally, Jonathan Cochran:
A review and an empirical analysis of privacy policy and notices for consumer Internet of things.
Volume 1, Number 4, July 2018
- Chandramohan Dhasarathan
, Rajaguru Dayalan, Vengattaraman Thirumal, Dhavachelvan Ponnurangam:
A coordinator-specific privacy-preserving model for E-health monitoring using artificial bee colony approach. - Eslam G. AbdAllah
, Mohammad Zulkernine, Hossam S. Hassanein:
Preventing unauthorized access in information centric networking. - Ala Arman
, Sara Foresti, Giovanni Livraga, Pierangela Samarati
:
Cloud plan selection under requirements of multiple applications. - Paulo Angelo Alves Resende
, André Costa Drummond:
Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling. - Nitesh K. Bharadwaj
, Upasna Singh:
Significant data region identification and analysis using k -means in large storage drive forensics.
- Rongxin Bao, Zhikui Chen
, Mohammad S. Obaidat:
Challenges and techniques in Big data security and privacy: A review.
Volume 1, Number 5, September 2018
- Anyembe Andrew Omala
, Ikram Ali
, Fagen Li:
Heterogeneous signcryption with keyword search for wireless body area network. - Dariush Abbasinezhad-Mood, Morteza Nikooghadam
:
Design and microcontroller-based hardware performance analysis of a security-enhanced lightweight communication scheme for smart grid. - Paulo Angelo Alves Resende
, André Costa Drummond:
HTTP and contact-based features for Botnet detection. - Ali M. Allam
:
A secret key establishment in frequency division duplex communication systems under active attacker.
- Lei Chen
:
Security and privacy on physical layer for wireless sensing: A survey. - Sudeep Tanwar
, Jayneel Vora, Sudhanshu Tyagi
, Neeraj Kumar, Mohammad S. Obaidat:
A systematic review on security issues in vehicular ad hoc network.
Volume 1, Number 6, November 2018
- Issa Traoré, Mohammed Alshahrani, Mohammad S. Obaidat:
State of the art and perspectives on traditional and emerging biometrics: A survey.
- Sanjeev Kumar
, Amarpal Singh, Manoj Kumar
:
Covert information sharing with novel fuzzy adaptive edge detection. - Sunday Oyinlola Ogundoyin
:
An anonymous and privacy-preserving scheme for efficient traffic movement analysis in intelligent transportation system. - Sridhar Venkatesan, Massimiliano Albanese
, Cho-Yu Jason Chiang, Angelo Sapello, Ritu Chadha:
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets. - Dipankar Dey
, Debasis Giri
, Biswapati Jana
, Tanmoy Maitra
, Ram N. Mohapatra:
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption. - Shobhit Sinha
, SK Hafizul Islam
, Mohammad S. Obaidat
:
A comparative study and analysis of some pseudorandom number generator algorithms.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.