A systematic review of computational image steganography approaches
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …
public channels. Therefore, significant interest has been given to providing secure …
A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …
intrusion detection and blockchain applications against cyber attacks. This work aims to …
Combination of steganography and cryptography: A short survey
The establishment of a secure communication between two communicating parties is
becoming a difficult problem due to the likelihood of attacks and other unintentional changes …
becoming a difficult problem due to the likelihood of attacks and other unintentional changes …
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
Network intrusion detection research work that employed KDDCup 99 dataset often
encounter challenges in creating classifiers that could handle unequal distributed attack …
encounter challenges in creating classifiers that could handle unequal distributed attack …
Impact of restrictive composition policy on user password choices
J Campbell, W Ma, D Kleeman - Behaviour & Information …, 2011 - Taylor & Francis
This study investigates the efficacy of using a restrictive password composition policy. The
primary function of access controls is to restrict the use of information systems and other …
primary function of access controls is to restrict the use of information systems and other …
On the stationarity of multivariate time series for correlation-based data analysis
K Yang, C Shahabi - … Conference on Data Mining (ICDM'05), 2005 - ieeexplore.ieee.org
Multivariate time series (MTS) data sets are common in-various multimedia, medical and
financial application domains. These applications perform several data-analysis operations …
financial application domains. These applications perform several data-analysis operations …
Information systems security in special and public libraries: an assessment of status
Explores the use of an assessment instrument based on a model named library information
systems security assessment model (LISSAM) to assess the 155 status in special and public …
systems security assessment model (LISSAM) to assess the 155 status in special and public …
Malware in computer systems: Problems and solutions
MAH Saeed - IJID (International Journal on Informatics for …, 2020 - ejournal.uin-suka.ac.id
Malware is a harmful programme, which infects computer systems, deletes data files and
steals valuable information. Malware can attack personal and organization computer …
steals valuable information. Malware can attack personal and organization computer …
Information security in the South Australian real estate industry: A study of 40 real estate organisations
Purpose–Opportunities for malicious cyber activities have expanded with the globalisation
and advancements in information and communication technology. Such activities will …
and advancements in information and communication technology. Such activities will …
Developing a theory-based information security management framework for human service organizations
S Mubarak - Journal of Information, Communication and Ethics in …, 2016 - emerald.com
Purpose This paper aims to identify organizations' information security issues and to explore
dynamic, organizational culture and contingency theories to develop an implementable …
dynamic, organizational culture and contingency theories to develop an implementable …