- Info
Search results
—
745 items matching your search terms
Subscribe to an always-updated feed of these search terms
-
Volume 14, Number 2
-
This is JISSec Volume 14, Number 2 launch announcement
-
JISSec_V14N2_Alkharji_p83_CI
-
Genetic Algorithm-based Key Generation for Fully Homomorphic Encryption, by Majedah Alkharji, Mayyada Al Hammoshi, Chunqiang Hu and Hang Liu - Cart Item
-
V14N2_Alkharji.html
-
-
JISSec_V14N2_Barnawi_p65_CI
-
A Hive Stream Encryption (HSE): A New Stream Encryption Algorithm, by Mahmoud Barnawi, Saad Alajmi and Bin Mai - Cart Item
-
V14N2_Barnawi.html
-
-
JISSec_V14N2_Sabir_p49_CI
-
A Non-Algorithmic File-type Independent Method for Hiding Persistent Data in Files, by Maha F. Sabir, James H. Jones and Hang Liu - Cart Item
-
V14N2_Sabir.html
-
-
V14N2_Editorial.pdf
-
JISSec Volume 14, Number 2 Editorial
-
V14N2_FrontMatter.pdf
-
JISSec Volume 14, Number 2 Front Matter
-
V14N2.html
-
JISSec Volume 14, Number 2 (2018) contents
-
N2
-
JISSec Volume 14, Number 2
-
Volume 14, Number 1
-
This is JISSec Volume 14, Number 1 launch announcement
-
JISSec_V14N1_Kavrestad_p31_CI
-
The Development of a Password Classification Model, by Joakim Kävrestad, Fredrik Eriksson and Marcus Nohlberg - Cart Item
-
JISSec_V14N1_Duffany_p21_CI
-
Current Situation Analysis of Information Security Level in Municipalities, by Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt and ...
-
V14N1.html
-
JISSec Volume 14, Number 1 (2018) contents
-
JISSec_V14N1_Ahlfeldt_p3_CI
-
Current Situation Analysis of Information Security Level in Municipalities, by Rose-Mharie Åhlfeldt, Marcus Nohlberg, Eva Söderström, Christian Lennerholt and ...
-
V14N1_Kavrestad.html
-
-
V14N1_Editorial.pdf
-
JISSec Volume 14, Number 1 Editorial
-
V14N1_FrontMatter.pdf
-
JISSec Volume 14, Number 1 Front Matter
-
V14N1_Duffany.html
-
-
V14N1_Ahlfeldt.html
-
-
N1
-
JISSec Volume 14, Number 1
-
V14
-
JISSec Volume 14 (2018)
-
V14.html
-
JISSec contents: Volume 14
-
Volume 13, Number 3
-
This is JISSec Volume 13, Number 3 launch announcement
-
JISSec_V13N3_Easttom_p175_CI
-
An Overview of Cryptographic Backdoors, by Chuck Easttom - Cart Item
-
JISSec_V13N3_Chim_p151_CI
-
A Risk-based Layered Defence for Managing the Trusted Insider Threat, by Leung Chim, Daniel Bilusich, Steven Lord and Rick Nunes-Vaz - Cart Item
-
JISSec_V13N3_Erigha_p135_CI
-
Intrusion Detection System based on Support Vector Machines and the Two-Phase Bat Algorithm, by Eseoghene Daniel Erigha, Femi Emmanuel Ayo, Oluwatobi Olakunle ...
-
V13N3_Editorial.pdf
-
JISSec Volume 13, Number 3 Editorial
-
V13N3_Easttom.html
-