Digital Library
Search: "[ keyword: Security ]" (56)
-
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park, Jong Hyuk Park
Vol. 14, No. 6, pp. 1361-1384, Dec. 2018
10.3745/JIPS.03.0105
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats -
Vera Suryani, Selo Sulistyo, Widyawan Widyawan
Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic -
Sarang Na, Taeeun Kim, Hwankuk Kim
Vol. 14, No. 3, pp. 740-750, Jun. 2018
10.3745/JIPS.03.0098
Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification -
Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Vol. 14, No. 2, pp. 286-308, Apr. 2018
10.3745/JIPS.03.0094
Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing -
Nawal Sad Houari, Noria Taghezout
Vol. 12, No. 4, pp. 688-710, Dec. 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent -
Mohammed Hatem Ali Al-Hooti, Supeno Djanali, Tohari Ahmad
Vol. 12, No. 3, pp. 525-537, Sep. 2016
10.3745/JIPS.03.0054
Keywords: Audio, Data Hiding, Modulus Function, Information Security, network security -
Sang-Yong Choi, Daehyeok Kim, Yong-Min Kim
Vol. 12, No. 3, pp. 422-435, Sep. 2016
10.3745/JIPS.03.0045
Keywords: Drive-by download, Malware Distribution Network, Webpage Link Analysis, Web security -
Jayaprakash Kar, Manoj Ranjan Mishra
Vol. 12, No. 2, pp. 226-233, Jun. 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence -
Souad Bekkouch, Kamel Mohamed Faraoun
Vol. 11, No. 3, pp. 406-420, Sep. 2015
10.3745/JIPS.02.0021
Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform -
Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil
Vol. 11, No. 2, pp. 205-228, Jun. 2015
10.3745/JIPS.02.0019
Keywords: clustering, Energy Efficiency, Practical Work, Security Attacks, Virtual labs, Wireless Sensor Networks