A systematic review of computational image steganography approaches

S Kaur, S Singh, M Kaur, HN Lee - Archives of Computational Methods in …, 2022 - Springer
With the rapid growth of multimedia technologies, many images are communicated over
public channels. Therefore, significant interest has been given to providing secure …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Combination of steganography and cryptography: A short survey

MS Taha, MS Mohd Rahim, SA Lafta… - IOP conference …, 2019 - iopscience.iop.org
The establishment of a secure communication between two communicating parties is
becoming a difficult problem due to the likelihood of attacks and other unintentional changes …

A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection

KC Khor, CY Ting, S Phon-Amnuaisuk - Applied Intelligence, 2012 - Springer
Network intrusion detection research work that employed KDDCup 99 dataset often
encounter challenges in creating classifiers that could handle unequal distributed attack …

Impact of restrictive composition policy on user password choices

J Campbell, W Ma, D Kleeman - Behaviour & Information …, 2011 - Taylor & Francis
This study investigates the efficacy of using a restrictive password composition policy. The
primary function of access controls is to restrict the use of information systems and other …

On the stationarity of multivariate time series for correlation-based data analysis

K Yang, C Shahabi - … Conference on Data Mining (ICDM'05), 2005 - ieeexplore.ieee.org
Multivariate time series (MTS) data sets are common in-various multimedia, medical and
financial application domains. These applications perform several data-analysis operations …

Information systems security in special and public libraries: an assessment of status

R Ismail, AN Zainab - arXiv preprint arXiv:1301.5386, 2013 - arxiv.org
Explores the use of an assessment instrument based on a model named library information
systems security assessment model (LISSAM) to assess the 155 status in special and public …

Malware in computer systems: Problems and solutions

MAH Saeed - IJID (International Journal on Informatics for …, 2020 - ejournal.uin-suka.ac.id
Malware is a harmful programme, which infects computer systems, deletes data files and
steals valuable information. Malware can attack personal and organization computer …

Information security in the South Australian real estate industry: A study of 40 real estate organisations

D Mani, KK Raymond Choo, S Mubarak - Information Management & …, 2014 - emerald.com
Purpose–Opportunities for malicious cyber activities have expanded with the globalisation
and advancements in information and communication technology. Such activities will …

Developing a theory-based information security management framework for human service organizations

S Mubarak - Journal of Information, Communication and Ethics in …, 2016 - emerald.com
Purpose This paper aims to identify organizations' information security issues and to explore
dynamic, organizational culture and contingency theories to develop an implementable …