Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Kudakwashe Maguraushe Adéle da Veiga Nico Martins School of Computing; College of Science, Engineering Technology, University of South Africa (UNISA), Johannesburg, South Africa Pages: 394 - 424 Abstract: Volume 33, Issue 4, July 2024, Page 394-424 .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-03-24T01:11:11Z DOI: 10.1080/19393555.2024.2329554 Issue No:Vol. 33, No. 4 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Sambhrant Maurya Anand Handa Nitesh Kumar Sandeep K. Shukla C3i Center; Department of Computer Science Engineering, IIT Kanpur, Kanpur, UP, India Pages: 425 - 442 Abstract: Volume 33, Issue 4, July 2024, Page 425-442 .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-05T02:49:47Z DOI: 10.1080/19393555.2024.2332955 Issue No:Vol. 33, No. 4 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Leki Chom Thungon Subhas Chandra Sahana Iftekhar Hussain a School of Computer Science; Engineering, National Institute of Technology Durgapur, West Bengal, Indiac Department of Information Technology, North-Eastern Hill University, Shillong, India Pages: 443 - 453 Abstract: Volume 33, Issue 4, July 2024, Page 443-453 .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-11T07:55:45Z DOI: 10.1080/19393555.2024.2332962 Issue No:Vol. 33, No. 4 (2024)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Shahid Alam Samina Khalid a College of Computer Science; Technology, Mirpur, Pakistan Pages: 1 - 17 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-07-17T05:15:38Z DOI: 10.1080/19393555.2024.2378747
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Peter J. Phillips Gabriela Pohl Faculty of Business; Education, Law Arts, University of Southern Queensland, Toowoomba, Australia Pages: 1 - 13 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-07-14T04:33:05Z DOI: 10.1080/19393555.2024.2378755
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Siham Essahraui Ibrahim Ouahbi Khalid El Makkaoui Mouncef Filali Bouami Faculty of Nador; Mohammed Premier University, Oujda, Morocco Pages: 1 - 13 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-07-02T06:41:20Z DOI: 10.1080/19393555.2024.2374247
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Kothai G Poovammal E a Department of CSE (Artificial Intelligence; Technology, Kattankulathur, India Pages: 1 - 11 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-06-16T06:09:06Z DOI: 10.1080/19393555.2024.2361244
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Oumaima Chakir Yassine Sadqi El Arbi Abdellaoui Alaoui a Laboratory LIMATI; FPBM, USMS University, Beni Mellal, Moroccob Department of Sciences, ENS, University of Moulay Ismail, Meknes, Morocco Pages: 1 - 27 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-06-10T06:03:23Z DOI: 10.1080/19393555.2024.2362813
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Martin Wilson Sharon McDonald School of Design; Informatics, Division of Cybersecurity, Dundee, UK Pages: 1 - 35 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-05-31T10:52:36Z DOI: 10.1080/19393555.2024.2357310
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Yuki Nakamura Tsukasa Fukuda Xuanzhou Yang Yoshiyasu Takefuji Faculty of Data Science; Musashino University, Tokyo, Japan Pages: 1 - 13 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-05-23T07:32:39Z DOI: 10.1080/19393555.2024.2357317
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Chaker Abdelaziz Kerrache Geetanjali Rathee Mohamed Lahby Anna Maria Vegni Muhammad Bilal Mohamed Amine Ferrag a Laboratoire d’Informatique et de Mathématiques; Université de Laghouat, Laghouat, Algeriab Department of Computer Science Electronics Systems Engineering, Lancaster University, Lancaster, UKf Technology Innovation Institute, Abu Dhabi, UAE Pages: 1 - 12 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-05-18T07:49:51Z DOI: 10.1080/19393555.2024.2353067
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Shail Saharan Vishal Gupta Department of CSIS; Birla Institute of Technology Science Pilani, Pilani, India Pages: 1 - 33 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-05-15T09:43:02Z DOI: 10.1080/19393555.2024.2347243
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:N.G. Nageswari Amma T. Jayaraj N. G. Bhuvaneswari Amma a Department of Computer Science; Muslim Arts College, Thiruvithancode, Kanyakumari, Indiab Department of Computer Science, Government Arts Engineering, Vellore Institute of Technology, Chennai, India Pages: 1 - 14 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-05-06T05:27:23Z DOI: 10.1080/19393555.2024.2347682
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Ninmoy Debnath Ankit Kumar Jain Computer Engineering Department; National Institute of Technology, Kurukshetra, Haryana, India Pages: 1 - 20 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-29T06:46:04Z DOI: 10.1080/19393555.2024.2347256
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Florence U. Rashidi Mustafa H. Mohsini Bakari Mega a Department of Electronics; Sports, Dodoma, Tanzania Pages: 1 - 13 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-28T05:05:48Z DOI: 10.1080/19393555.2024.2347240
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Maria Leitner Florian Skopik Timea Pahi a University of Vienna; Faculty of Computer Science, Vienna, Austriab AIT Austrian Institute of Technology, Center for Digital Safety & Security, Vienna, Austria Pages: 1 - 22 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-18T11:54:14Z DOI: 10.1080/19393555.2024.2334787
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Anwer Mbiriki Chaker Katar Ahmed Badreddine LARODEC; Institut Supérieur de Gestion de Tunis, Le Bardo, Tunisie Pages: 1 - 18 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-12T05:28:21Z DOI: 10.1080/19393555.2024.2338438
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Mayssa Tayachi Laurent Nana Anca Pascu Faouzi Benzarti a Lab-STICC; CNRS, UMR 6285, Computer Science Department, University Brest, Brest, Franceb ENSIT, LR-SITI-ENIT, Electrical Engineering Department Tunis, Université de Tunis El Manar, Tunis, Tunisia Pages: 1 - 20 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-04-08T10:41:10Z DOI: 10.1080/19393555.2024.2337732
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Rasheed Gbenga Jimoh Joseph Bamidele Awotunde Roseline Oluwaseun Ogundokun Damilola Silas Adeoti a Department of Computer Science; University of Ilorin, Ilorin, Nigeriab Department of Multimedia Engineering, Kaunas University of Technology, Kaunas, Lithuaniac Department of Computer Science, Landmark University, Omu Aran, Nigeria Pages: 1 - 13 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-03-31T05:12:20Z DOI: 10.1080/19393555.2024.2334764
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Ziaul Haque Choudhury Department Of Information Technology; Vignan’s Foundation for Science, Technology, Research (Deemed to be University), Guntur, India Pages: 1 - 18 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-02-06T05:01:44Z DOI: 10.1080/19393555.2024.2311123
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Wasim A. Ali Michele Roccotelli Gennaro Boggia Maria Pia Fanti Department of Electrical; Information Engineering, Politecnico di Bari, Bari, Italy Pages: 1 - 19 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-01-28T05:58:09Z DOI: 10.1080/19393555.2024.2307638
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Mohamed Chawki Naif Arab University for Security Sciences (NAUSS); Riyadh, Kingdom of Saudi Arabia Pages: 1 - 24 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-01-25T11:54:59Z DOI: 10.1080/19393555.2024.2307637
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Garry L. White Department of Information systems & Analytics; Texas State University, San Marcos, Texas, USA Pages: 1 - 9 Abstract: .
Citation: Information Security Journal: A Global Perspective PubDate: 2024-01-21T05:21:19Z DOI: 10.1080/19393555.2024.2307632