Journal Navigation
Published: Jan 10, 2024
DOI: 10.4018/IJISP.335225
Volume 18
Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang
Aiming at the problem of adopting the same level of privacy protection for sensitive data in the process of data collection and ignoring the difference in privacy protection requirements, the... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Dongyan, et al. "Adaptive Personalized Randomized Response Method Based on Local Differential Privacy." IJISP vol.18, no.1 2024: pp.1-19. http://doi.org/10.4018/IJISP.335225

APA

Zhang, D., Zhang, L., Zhang, Z., & Zhang, Z. (2024). Adaptive Personalized Randomized Response Method Based on Local Differential Privacy. International Journal of Information Security and Privacy (IJISP), 18(1), 1-19. http://doi.org/10.4018/IJISP.335225

Chicago

Zhang, Dongyan, et al. "Adaptive Personalized Randomized Response Method Based on Local Differential Privacy," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-19. http://doi.org/10.4018/IJISP.335225

Export Reference

Mendeley
Published: Feb 7, 2024
DOI: 10.4018/IJISP.337894
Volume 18
Zhiqiang Wu
Website link detection is an important means to ensure the security of the external chain. In the past, it was mainly realized through blacklisting and feature engineering-based machine learning... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wu, Zhiqiang. "An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion." IJISP vol.18, no.1 2024: pp.1-15. http://doi.org/10.4018/IJISP.337894

APA

Wu, Z. (2024). An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion. International Journal of Information Security and Privacy (IJISP), 18(1), 1-15. http://doi.org/10.4018/IJISP.337894

Chicago

Wu, Zhiqiang. "An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-15. http://doi.org/10.4018/IJISP.337894

Export Reference

Mendeley
Published: Mar 20, 2024
DOI: 10.4018/IJISP.340728
Volume 18
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi
Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review." IJISP vol.18, no.1 2024: pp.1-27. http://doi.org/10.4018/IJISP.340728

APA

Ugbedeojo, M., Adebiyi, M. O., Aroba, O. J., & Adebiyi, A. A. (2024). RSA and Elliptic Curve Encryption System: A Systematic Literature Review. International Journal of Information Security and Privacy (IJISP), 18(1), 1-27. http://doi.org/10.4018/IJISP.340728

Chicago

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-27. http://doi.org/10.4018/IJISP.340728

Export Reference

Mendeley
Published: May 2, 2024
DOI: 10.4018/IJISP.342596
Volume 18
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu, Han-Bing Yan
Vulnerability can lead to data loss, privacy leakage and financial loss. Accurate detection and identification of vulnerabilities is essential to prevent information leakage and APT attacks. This... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs." IJISP vol.18, no.1 2024: pp.1-21. http://doi.org/10.4018/IJISP.342596

APA

Liu, Y., Zhao, X., Qiu, X., & Yan, H. (2024). VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs. International Journal of Information Security and Privacy (IJISP), 18(1), 1-21. http://doi.org/10.4018/IJISP.342596

Chicago

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-21. http://doi.org/10.4018/IJISP.342596

Export Reference

Mendeley
Published: May 7, 2024
DOI: 10.4018/IJISP.343306
Volume 18
Yuan Tian, Wendong Wang, Jingyuan He
The existing Industrial Internet of Things (IIoT) temporal data analysis methods often suffer from issues such as information loss, difficulty balancing spatial and temporal features, and being... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Tian, Yuan, et al. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training." IJISP vol.18, no.1 2024: pp.1-28. http://doi.org/10.4018/IJISP.343306

APA

Tian, Y., Wang, W., & He, J. (2024). An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. International Journal of Information Security and Privacy (IJISP), 18(1), 1-28. http://doi.org/10.4018/IJISP.343306

Chicago

Tian, Yuan, Wendong Wang, and Jingyuan He. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-28. http://doi.org/10.4018/IJISP.343306

Export Reference

Mendeley
Published: Jun 6, 2024
DOI: 10.4018/IJISP.345038
Volume 18
Longfei Fu, Yibin Liu, Yanjun Zhang, Ming Li
At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Fu, Longfei, et al. "Network Information Security Monitoring Under Artificial Intelligence Environment." IJISP vol.18, no.1 2024: pp.1-25. http://doi.org/10.4018/IJISP.345038

APA

Fu, L., Liu, Y., Zhang, Y., & Li, M. (2024). Network Information Security Monitoring Under Artificial Intelligence Environment. International Journal of Information Security and Privacy (IJISP), 18(1), 1-25. http://doi.org/10.4018/IJISP.345038

Chicago

Fu, Longfei, et al. "Network Information Security Monitoring Under Artificial Intelligence Environment," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-25. http://doi.org/10.4018/IJISP.345038

Export Reference

Mendeley
Published: Jun 7, 2024
DOI: 10.4018/IJISP.345647
Volume 18
Abdulhakim Sabur, Ahmad J. Showail
Mobile health apps are a digital era revolution, facilitating direct patient-physician communication, lab and test orders, and medication refills. Despite these benefits, security and privacy issues... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Sabur, Abdulhakim, and Ahmad J. Showail. "Nudging Data Privacy of Mobile Health Applications in Saudi Arabia." IJISP vol.18, no.1 2024: pp.1-19. http://doi.org/10.4018/IJISP.345647

APA

Sabur, A. & Showail, A. J. (2024). Nudging Data Privacy of Mobile Health Applications in Saudi Arabia. International Journal of Information Security and Privacy (IJISP), 18(1), 1-19. http://doi.org/10.4018/IJISP.345647

Chicago

Sabur, Abdulhakim, and Ahmad J. Showail. "Nudging Data Privacy of Mobile Health Applications in Saudi Arabia," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-19. http://doi.org/10.4018/IJISP.345647

Export Reference

Mendeley
Published: Jul 17, 2024
DOI: 10.4018/IJISP.347330
Volume 18
Fares Alharbi, Gautam Siddharth Kashyap, Budoor Ahmad Allehyani
This paper details the implementation of a Web crawler aimed at automating ruleset construction for “HTTPS Everywhere,” with a goal to convert HTTP URLs to secure HTTPS equivalents for enhanced... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Alharbi, Fares, et al. "Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights." IJISP vol.18, no.1 2024: pp.1-14. http://doi.org/10.4018/IJISP.347330

APA

Alharbi, F., Kashyap, G. S., & Allehyani, B. A. (2024). Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights. International Journal of Information Security and Privacy (IJISP), 18(1), 1-14. http://doi.org/10.4018/IJISP.347330

Chicago

Alharbi, Fares, Gautam Siddharth Kashyap, and Budoor Ahmad Allehyani. "Automated Ruleset Generation for “HTTPS Everywhere”: Challenges, Implementation, and Insights," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-14. http://doi.org/10.4018/IJISP.347330

Export Reference

Mendeley
Published: Jul 17, 2024
DOI: 10.4018/IJISP.347878
Volume 18
Xinyuan Liu, Hongyang He
Power grid construction significantly enhances power grid management and risk control. Inconsistent operations at construction sites can jeopardize grid stability and crew safety. Traditional power... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Xinyuan, and Hongyang He. "Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer." IJISP vol.18, no.1 2024: pp.1-21. http://doi.org/10.4018/IJISP.347878

APA

Liu, X. & He, H. (2024). Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer. International Journal of Information Security and Privacy (IJISP), 18(1), 1-21. http://doi.org/10.4018/IJISP.347878

Chicago

Liu, Xinyuan, and Hongyang He. "Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-21. http://doi.org/10.4018/IJISP.347878

Export Reference

Mendeley
Published: Jul 23, 2024
DOI: 10.4018/IJISP.347987
Volume 18
Zhiwei Cao, Zhijie Fan, Boan Chen, Zidong Cheng, Shijun Xu, Xin Li
Dual-domain terminal with two built-in independent operating systems - Life Domain and Work Domain, provides convenience for daily use and mobile office. However, the security isolation between the... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Cao, Zhiwei, et al. "Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals." IJISP vol.18, no.1 2024: pp.1-27. http://doi.org/10.4018/IJISP.347987

APA

Cao, Z., Fan, Z., Chen, B., Cheng, Z., Xu, S., & Li, X. (2024). Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals. International Journal of Information Security and Privacy (IJISP), 18(1), 1-27. http://doi.org/10.4018/IJISP.347987

Chicago

Cao, Zhiwei, et al. "Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-27. http://doi.org/10.4018/IJISP.347987

Export Reference

Mendeley
Published: Aug 9, 2024
DOI: 10.4018/IJISP.349569
Volume 18
Zhijie Fan, Bo Yang, Jing Peng, Bingsen Pei, Changsong Zheng, Xin Li
This paper studies the collection of large-scale log data of information system and puts forward a dynamic adaptive mechanism for large-scale unified log data collection. Furthermore, we design and... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Fan, Zhijie, et al. "Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection." IJISP vol.18, no.1 2024: pp.1-26. http://doi.org/10.4018/IJISP.349569

APA

Fan, Z., Yang, B., Peng, J., Pei, B., Zheng, C., & Li, X. (2024). Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection. International Journal of Information Security and Privacy (IJISP), 18(1), 1-26. http://doi.org/10.4018/IJISP.349569

Chicago

Fan, Zhijie, et al. "Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-26. http://doi.org/10.4018/IJISP.349569

Export Reference

Mendeley
Published: Jul 26, 2024
DOI: 10.4018/IJISP.349898
Volume 18
Binjing Li, Wendong Yu
In the contemporary era of the internet, safeguarding children's rights emerges as a critical concern necessitating immediate attention. Given children's heightened vulnerability within society, the... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Li, Binjing, and Wendong Yu. "Enhancing Legal Protection of Children's Rights in the “Internet Plus”." IJISP vol.18, no.1 2024: pp.1-17. http://doi.org/10.4018/IJISP.349898

APA

Li, B. & Yu, W. (2024). Enhancing Legal Protection of Children's Rights in the “Internet Plus”. International Journal of Information Security and Privacy (IJISP), 18(1), 1-17. http://doi.org/10.4018/IJISP.349898

Chicago

Li, Binjing, and Wendong Yu. "Enhancing Legal Protection of Children's Rights in the “Internet Plus”," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-17. http://doi.org/10.4018/IJISP.349898

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
All inquiries regarding IJISP should be directed to the attention of:

Dr. Yassine Maleh
Dr. Ahmed A. Abd El-Latif
Editors-in-Chief
International Journal of Information Security and Privacy (IJISP)
Email: yassine.maleh@ieee.org & ahmedabdellatif@ieee.org

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100