Volume 12
November 2020, Volume 12, Number 6
Hybrid Chaotic Method for Medical Images Ciphering
Seham Muawadh Ali Ebrahim, Modern Academy for Engineering and Information Technology, Egypt |
The Brazilian Law on Personal Data Protection
Jonatas S. de Souza1, 2, Jair M. Abe1, Luiz A. de Lima1, 2 and Nilson A. de Souza2, 3, 1Paulista University, São Paulo, Brazil, 2National Association of Data Privacy Professionals, ANPPD, Brazil, 3São Paulo State Supplementary Pension Foundation, PREVCOM, Brazil |
September 2020, Volume 12, Number 5
Secured AODV to Protect WSN Against Malicious Intrusion
Saad Al-Ahmadi and Abdulrahman Alseqyani, King Saud University, Saudi Arabia |
July 2020, Volume 12, Number 4
Enhanced Authentication for Web-Based Security using Keystroke Dynamics
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1, 1Universiti Teknikal Malaysia Melaka, Malaysia, 2Infineon Technologies Melaka, Malaysia |
A Proposed Model for Dimensionality Reduction to Improve the Classification Capability
of Intrusion Protection Systems Hajar Elkassabi, Mohammed Ashour and Fayez Zaki, Mansoura University, Egypt |
Effective Method for Managing Automation and Monitoring in Multi-cloud Computing: Panacea
for Multi-cloud Security Snags Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2, 1IEEE Computer Society, Connecticut Section, USA, 2Federal Polytechnic Nekede, Nigeria |
May 2020, Volume 12, Number 3
Ontology-based Model for Security Assessment: Predicting Cyberattacks through Threat Activity Analysis Pavel Yermalovich and Mohamed Mejri, Université Laval, Canada |
Advanced Multimedia Platform based on Big Data and Artificial Intelligence Improving Cybersecurity Alessandro Massaro1*, Gaetano Panarosa1, Nicola Savino1, Simone Buonopane2 and Angelo Galiano1, 1Dyrecta Lab, IT Research Laboratory, Italy, 2Spacertron srl, Italy |
An Empirical Analysis of Email Forensics Tools Ahmad Ghafarian, Ash Mady and Kyung Park, University of North Georgia, USA |
PDMLP: Phishing Detection using Multilayer Perceptron Saad Al-Ahmadi and Tariq Lasloum, King Saud University, Saudi Arabia |
March 2020, Volume 12, Number 2
Security Consideration in Peer-to-peer Networks with A Case Study Application Nick Rahimi, Southern Illinois University, USA |
Providing Anonymous Communication, Privacy-Preserving Data Aggregation and Dynamic Billing System in Smart Grid Using Permissioned Blockchain Ozgur Oksuz, Adiyaman University, Turkey |
A Survey on Malware Detection and Analysis Tools
Sajedul Talukder1 and Zahidur Talukder2, 1Edinboro University, USA and 2University of Texas at Arlington, USA |
An Enhanced User Authentication Framework in Cloud Computing
Hasan Al-Refai, Khaldoun Batiha, Ahmad M. Al-Refai, Philadelphia University, Jordan |
January 2020, Volume 12, Number 1
A Survey on the Use of Data Clustering for Intrusion Detection System in Cybersecurity Binita Bohara1, Jay Bhuyan1, Fan Wu1 and Junhua Ding2, 1Tuskegee University, USA and 2University of North Texas, USA |
Self-organization and Autonomous Network Survey
Houneida SAKLY, Campus University of Mannouba, Tunisia |