Information Security Journal: A Global Perspective Multimodal biometric system based on fusion techniques: a review. By Neeru Bala, 3 years ago
Information Security Journal: A Global Perspective A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks. By Naib Rabiaa, 3 years ago
Information Security Journal: A Global Perspective The role risk-management plays in reducing insider threat’s in the federal Government. By Alexander Gregory Stone, 3 years ago
Information Security Journal: A Global Perspective Security and privacy consideration for the deployment of electronic health records: a qualitative study covering Greece and Oman. By Ourania Koutzampasopoulou Xanthidou, 3 years ago
Information Security Journal: A Global Perspective A tokenization technique for improving the security of EMV contactless cards. By Ossama Al-Maliki, 3 years ago
Information Security Journal: A Global Perspective New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. By M. Naim, 3 years ago
Information Security Journal: A Global Perspective A systematic review of detection and prevention techniques of SQL injection attacks. By Mohammed Nasereddin, 3 years ago
Information Security Journal: A Global Perspective Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. By Yee Jian Chew, 3 years ago
Information Security Journal: A Global Perspective Steganalysis attacks resilient, imperceptible, blind, and keyed image hiding in ultra HD 4K video. By Barnali Gupta Banik, 3 years ago
Information Security Journal: A Global Perspective Variables influencing the effectiveness of signature-based network intrusion detection systems. By Teodor Sommestad, 3 years ago