EN
EN
Dergiler
Duyurular
İstatistikler
Standartlar
Hakkımızda
İletişim
International Journal of Information Security Science
Arşiv
International Journal of Information Security Science
2021
Cilt: 10 - Sayı : 3
A- STATE-OF-THE-ART SURVEY ON IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES
2020
Cilt: 9 - Sayı : 3
Deep Combination of Stylometry Features for Authorship Analysis
Cilt: 9 - Sayı : 2
On Lightweight 4x4 MDS Matrices over Binary Field Extensions
2019
Cilt: 8 - Sayı : 3
Cryptographic Functions and Bit-Error-Rate Analysis with Almost $p$-ary Sequences
Cilt: 8 - Sayı : 2
Multilevel Threshold Secret Sharing based on the Chinese Remainder Theorem
eDiscovery Challenges in Healthcare
2018
Cilt: 7 - Sayı : 3
Challenge of Malware Analysis: Malware obfuscation Techniques
Reliance on cryptography of cloud computing in Healthcare Information Management, lessons for Ghana Health Service.
Cilt: 7 - Sayı : 2
Using PowerShell to Capture and Compare Windows Registry and Live Memory Artifacts with Online Databases to Identify Suspect Files.
An Information Security Analysis of a University: The Case of a Ghanaian University
Cilt: 7 - Sayı : 1
Characterising Risk Factors and Countermeasures for Risk Evaluation of Bring Your Own Device Strategy
2017
Cilt: 6 - Sayı : 4
Review of Evidence Collection and Protection Phases in Digital Forensics Process
Implementation and Evaluation of Improved Secure Index Scheme Using Standard and Counting Bloom Filters
Ransomware Analysis and Defense-WannaCry and the Win32 environment
Efficient Big Integer Multiplication in Cryptography
Quantum Group Proxy Digital Signature based on Quantum Fourier Transform by Using Blinded and Non Blinded Trent
Biometric Verification on e-ID-Card Secure Access Devices: A Case Study on Turkish National e-ID Card Secure Access Device Specifications
Cilt: 6 - Sayı : 3
Enhancing Security and Privacy Orientation of Wireless Body Area Network in EHealth System
Cilt: 6 - Sayı : 2
Secure and Privacy-Preserving Referral Framework for E-Health System
Cilt: 6 - Sayı : 1
Verifiably Encrypted Signcryption Scheme Based on Pairings
2016
Cilt: 5 - Sayı : 4
How Secure is Your Smart Watch?
A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting
Analysis of HTTP Security Headers in Turkey
New Comprehensive Taxonomies on Mobile Security and Malware Analysis
Cilt: 5 - Sayı : 3
A Privacy Review of Vertically Partitioned Data-based PPCF Schemes
On the Evaluation of Restricted Boltzmann Machines for Malware Identification
Cilt: 5 - Sayı : 2
Customizing SSL Certificate Extensions to Reduce False-Positive Certificate Error/Warning Messages
Challenges in standardising cryptography
A Framework for Studying New Approaches to Anomaly Detection
Cilt: 5 - Sayı : 1
Institutional Cybersecurity from Military Perspective
A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment: A case study of Kenya
2015
Cilt: 4 - Sayı : 4
media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the
Cilt: 4 - Sayı : 3
Beyond Internet Scanning: Non-Intrusive Vulnerability Assessment of Internet-Facing Services
Security Assessment of Modern Data Aggregation Platforms in the Internet of Things
Comparison of Pattern Matching Techniques on Identification of Same Family Malware
Cilt: 4 - Sayı : 2
Advances in Keystroke Dynamics Techniques to Group Users Sessions
Digital Forensic Analysis on Prefetch Files
3D Reconstruction of Crime Scenes and Design Considerations for an Interactive Investigation Tool
Knowledge Development in Military Context
NEW DIRECTIONS in MILITARY and SECURITY STUDIES: ARTIFICIAL INTELLIGENCE and MILITARY DECISION MAKING PROCESS
Cilt: 4 - Sayı : 1
An Encryption Key Management Approach for Configuration Files
Recommendation Algorithm
2014
Cilt: 3 - Sayı : 4
Novel Selective Video Encryption for H.264 Video
Evaluation of Multi Level System of Steganography
Cilt: 3 - Sayı : 3
An Investigation on Information Hiding Tools for Steganography
Design of 8-bit dedicated microprocessor for content matching in NIDPS
Cilt: 3 - Sayı : 2
Proactive Security Framework for Online Business Web Portals with Implementation Details
Ahmet Sınak1,3, Sec¸il ¨Ozkan1, Hakan Yıldırım1and Mehmet Sabır Kiraz1,2
THE RAPID GROWTH OF CYBERCRIMES AFFECTING INFORMATION SYSTEMS IN THE GLOBAL: IS THIS A MYTH OR REALITY IN TANZANIA?
Cilt: 3 - Sayı : 1
Secure Database in Cloud Computing - CryptDB Revisited
A Hypergame Model for Information Security
2013
Cilt: 2 - Sayı : 4
A secure multicast protocol based on pairings on elliptic curves
A Matrix Model for Designing and Implementing Multi-firewall Environments
Cilt: 2 - Sayı : 3
A New Statistical Randomness Test: Saturation Point Test
Machine Learning Methods for Spamdexing Detection
Cilt: 2 - Sayı : 2
Walid Al-Ahmad**, Bassil Mohammad
On Provable Security of Cryptographic Schemes
Training And Testing Anomaly-Based Neural Network Intrusion Detection Systems
1Department of Computer Science and Biomedical Informatics, University of Central Greece, 2-4 Papasiopoulou St., Lamia, GR-35100, Greece, e-mail: gspathoulas@ucg.gr 2Department of Digital Systems, School of Information and Communication, University of Piraeus, 150 Androutsou St., Piraeus, GR-18532,
Cilt: 2 - Sayı : 1
Towards SMS Spam Filtering: Results under a New Dataset
F AF: AA for all AF{ }}. A
2012
Cilt: 1 - Sayı : 4
IPv6 Security Vulnerabilities
(1, 3) Optimal Linear Codes on Solid Bursts
Cyber Security Analysis of Turkey
Cilt: 1 - Sayı : 3
Cryptanalysis of Bigdeli algorithm using Çokal’s attack
DSAB – A Hybrid Approach for Providing Security in MANET
On the use of continued fractions for mutual authentication
Cilt: 1 - Sayı : 2
Anonymous RFID Authentication for Cloud Services
Notes on Bent Functions in Polynomial Forms
Muhammad Ashraf1and Barıs¸ B ¨ulent Kırlar1,2
A Study on OS Selection Using ANP Based Choquet Integral in Terms of Cyber Threats
Cilt: 1 - Sayı : 1
The Final Exponentiation in Pairing-Based Cryptography
Designing Fuzzy Rule Based Expert System for Cyber Security
T ¨UB˙ITAK B˙ILGEM UEKAE Gebze, 41470 Kocaeli Turkey
Yayın Aralığı:
Yılda 4 Sayı
Başlangıç:
2012
Yayıncı:
Şeref SAĞIROĞLU
26.1b
9.8b
Dergi Detay