Journal Contents: International Journal of Systems and Software Security and Protection (IJSSSP)

Volume 14 (2023)
Issue 1
Article 42
A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control (pages 1-21)
Bello Alhaji Buhari (Usmanu Danfodiyo University, Sokoto, Nigeria), Afolayan Ayodedele Obiniyi (Ahmadu Bello University, Zaria, Nigeria), Sahalu B. Junaidu (Ahmadu Bello University, Zaria, Nigeria), Armand F. Donfack Kana (Ahmadu Bello University, Zaria, Nigeria)
Article 78
Using ECG Authentication for Biometrics in Smart Cities (pages 1-26)
Rohit Rastogi (ABES Engineering College, India), Aditi Mittal (ABES Engineering College, India), Ishanki Verma (ABES Engineering College, India), Pallavit Saxena (ABES Engineering College, India)
Volume 13 (2022)
Issue 1
Article 1
A Survey on IoT Authentication Security Service: Open Issues, Security Threats, and Future Solution Direction (pages 1-13)
Mihir Mehta (Gujarat Technological University, India), Kajal Patel (Vishwakarma Government Engineering College, Gujarat Technological University, India)
Article 22
Client-Side Hashing for Efficient Typo-Tolerant Password Checkers (pages 1-24)
Enka Blanchard (CNRS and Laboratoire d'Automatique, de Mécanique et d'Informatique Industrielles et Humaines, Université Polytechnique Hauts-de-France)
Article 23
Article 26
Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements (pages 1-20)
Chaima Boulifi (University of Jendouba, Tunisia), Mouna Jouini (ISG Tunis, Tunisia)
Article 36
Learning Algorithm Recommendation Framework for IS and CPS Security: Analysis of the RNN, LSTM, and GRU Contributions (pages 1-23)
Christophe Feltus (Luxembourg Institute of Science and Technology, Luxembourg)
Article 37
Proposed Secure 3-Use Case Diagram (pages 1-18)
Madhuri Gedam (Veermata Jijabai Technological Institute, Mumbai, India), Bandu B. Meshram (Veermata Jijabai Technological Institute, Mumbai, India)
Article 65
Critical Success Factors for an Effective Security Risk Management Program (pages 1-26)
Humayun Zafar (Kennesaw State University, USA)
Article 66
Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting (pages 1-20)
Humayun Zafar (Kennesaw State University, USA)
Article 94
An Empirical Investigation on Vulnerability for Software Companies (pages 1-15)
Jianping Peng (Sun Yat-sen University, China), Guoying Zhang (Midwestern State University, USA), Chun-Hung Chiu (Sun Yat-sen University, China)
Issue 2
Volume 12 (2021)
Issue 1
Special Issue of Dependability Through Assuredness
Guest Editorial Preface
Yutaka Matsuno (Nihon University, Tokyo, Japan), Toshinori Takai (Nara Institute of Science and Technology, Ikoma, Japan), Shuichiro Yamamoto (Nagoya University, Nagoya, Japan)
Article 1
CC-Case-Safety and Security Engineering Methodology (pages 1-20)
Tomoko Kaneko (National Institute of Informatics, Japan), Nobukazu Yoshioka (Natinal Institute of Infomatics, Japan)
Article 2
Six-Assurance Case Patterns by Strengthening/Weakening Argument (pages 21-45)
Tsutomu Koshiyama (College of Science and Technology, Nihon University, Japan), Sei Takahashi (College of Science and Technology, Nihon University, Japan)
Article 3
A Goal-Oriented Approach to Requirements Development and Quantitative Security Assurance (pages 46-62)
Zhengshu Zhou (Nagoya University, Japan), Qiang Zhi (Nagoya University, Japan), Zilong Liang (University of Tsukuba, Japan), Shuji Morisaki (Nagoya University, Japan)
Article 4
Article 5
A Composite Safety Assurance Method for Developing System Architecture Using Model Checking (pages 78-93)
Qiang Zhi (Nagoya University, Japan), Zhengshu Zhou (Nagoya University, Japan), Shuji Morisaki (Nagoya University, Japan)
Issue 2
Article 1
A Novel Iterated Function System-Based Model for Coloured Image Encryption (pages 1-10)
Amine Rahmani (Department of Mathematics and Computer Sciences, University of Algiers 1, Algeria)
Article 2
Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: A Practical Comprehension (pages 11-32)
Sharada Ramakrishna Valiveti (Nirma University, India), Anush Manglani (Institute of Technology, Nirma University, India), Tadrush Desai (Institute of Technology, Nirma University, India)
Article 3
Cloud Computing Virtual Machine Workload Prediction Method Based on Variational Autoencoder (pages 33-45)
Fargana J. Abdullayeva (Institute of Information Technology, Azerbaijan National Academy of Sciences, Azerbaijan)
Article 4
Formal Metamodeling for Secure Model-Driven Engineering (pages 46-67)
Liliana Maria Favre (Universidad Nacional Del Centro De La Provincia De Buenos Aires, Argentina & CICPBA, Argentina)
Article 5
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development (pages 68-85)
Tian Xia (Waseda University, Tokyo, Japan), Hironori Washizaki (National Institute of Informatics, System Information, eXmotion, Waseda University, Tokyo, Japan), Yoshiaki Fukazawa (Waseda University, Tokyo, Japan), Haruhiko Kaiya (Kanagawa University, Yokohama, Japan), Shinpei Ogata (Shinshu University, Matsumoto, Japan), Eduardo B. Fernandez (Florida Atlantic University, USA), Takehisa Kato (Hitachi, Ltd., Tokyo, Japan), Hideyuki Kanuka (Hitachi, Ltd., Tokyo, Japan), Takao Okubo (Institute of Information Security, Yokohama, Japan), Nobukazu Yoshioka (National Institute of Informatics, Tokyo, Japan), Atsuo Hazeyama (Tokyo Gakugei University, Koganei, Japan)
Volume 11 (2020)
Issue 1
Article 1
Analysing Information Security Risk Ontologies (pages 1-16)
Ines Meriah (Université de Tunis, Institut Supérieur de Gestion, SMART Lab, Le Bardo, Tunisia), Latifa Ben Arfa Rabai (SMART Lab, Université de Tunis, Institut Supérieur de Gestion, Tunis, Tunisie & College of Business, University of Buraimi, Al Buraimi, Oman)
Article 2
Factors in Information Assurance Professionals' Intentions to Adhere to Information Security Policies (pages 17-32)
S. Raschid Muller (University of Maryland Global Campus, USA), Mary L. Lind (Louisana State University Shreveport, USA)
Article 3
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development (pages 33-62)
Inger Anne Tøndel (Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway & SINTEF Digital, Trondheim, Norway), Martin Gilje Jaatun (SINTEF Digital, Oslo, Norway)
Issue 2
Article 1
Graph Classification Using Back Propagation Learning Algorithms (pages 1-12)
Abhijit Bera (OmDayal Group of Institutions, India), Mrinal Kanti Ghose (OmDayal Group of Institutions, India), Dibyendu Kumar Pal (Asansol Engineering College (AEC), India)
Article 2
Handling Minority Class Problem in Threats Detection Based on Heterogeneous Ensemble Learning Approach (pages 13-37)
Hope Eke (Robert Gordon University, Aberdeen, UK), Andrei Petrovski (Robert Gordon University, UK), Hatem Ahriz (Robert Gordon University, UK)
Article 3
Towards a Secure DevOps Approach for Cyber-Physical Systems: An Industrial Perspective (pages 38-57)
Pekka Abrahamsson (University of Jyväskylä, Finland), Goetz Botterweck (LERO, Ireland), Hadi Ghanbari (Aalto University, Finland), Martin Gilje Jaatun (SINTEF Digital, Norway), Petri Kettunen (University of Helsinki, Finland), Tommi J. Mikkonen (University of Helsinki, Finland), Anila Mjeda (LERO, Ireland), Jürgen Münch (Reutlingen University, Reutlingen, Germany), Anh Nguyen Duc (University of South Eastern Norway, Notodden, Norway), Barbara Russo (Free University of Bozen-Bolzano, Italy), Xiaofeng Wang (Free University of Bozen-Bolzano, Italy)
Article 4
A Security Review of Event-Based Application Function and Service Component Architecture (pages 58-70)
Faisal Nabi (University of Southern Queensland, Australia), Jianming Yong (University of Southern Queensland, Australia), Xiaohui Tao (University of Southern Queensland, Australia)
Volume 10 (2019)
Issue 1
Article 1
Designing Sound Security Metrics (pages 1-21)
George O.M. Yee (Aptusinnova Inc., Ottawa, Canada & Carleton University, Ottawa, Canada)
Article 2
A Novel Software System Protection Scheme Based on Behavior and Context Monitoring (pages 22-46)
Shen Fu (Iowa State University, USA), Mathew L. Wymore (Iowa State University, USA), Ting-Wei Chang (Iowa State University, USA), Daji Qiao (Iowa State University, USA)
Article 3
Analysis on Opinion Words Extraction in Electronic Product Reviews (pages 47-61)
Sint Sint Aung (University of Computer Studies, Yangon, Myanmar)
Issue 2
Article 1
Improving Effectiveness of Process Model Matchers Using Wordnet Glosses (pages 1-19)
Mostefai Abdelkader (Dr. Tahar Moulay University of Saïda, Saïda, Algeria)
Article 2
TLS Certificates of the Tor Network and Their Distinctive Features (pages 20-43)
Vitaly V. Lapshichyov (Institute of Computing Technology and Information Security, South Federal University, Rostov-on-Don, Russian Federation)
Article 3
Towards a UMLsec-Based Proctored Examination Model (pages 44-67)
Ibukun Fadahunsi (Federal University of Agriculture, Abeokuta, Nigeria), Oluwasefunmi 'Tale Arogundade (Federal University of Agriculture, Abeokuta, Nigeria), Adesina S. Sodiya (Department of Computer Science, Federal University of Agriculture, Abeokuta, Nigeria), Bakai Olajuwon (Federal University of Agriculture, Abeokuta, Nigeria)
Volume 9 (2018)
Issue 1
Special Issue of Secure Software Engineering in DevOps and Agile Development
Guest Editorial Preface
Martin Gilje Jaatun (SINTEF Digital, Trondheim / University of Stavanger, Stavanger, Norway)
Article 1
Challenges and Solutions for Addressing Software Security in Agile Software Development: A Literature Review and Rigor and Relevance Assessment (pages 1-17)
Ronald Jabangwe (University of Southern Denmark, Odense M, Denmark), Kati Kuusinen (University of Southern Denmark, Odense, Denmark), Klaus R Riisom (University of Southern Denmark, Odense, Denmark), Martin S Hubel (University of Southern Denmark, Odense, Denmark), Hasan M Alradhi (University of Southern Denmark, Odense M, Denmark), Niels Bonde Nielsen (University of Southern Denmark, Odense S, Denmark)
Article 2
Weaving Security into DevOps Practices in Highly Regulated Environments (pages 18-46)
Jose Andre Morales (Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA), Hasan Yasar (Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA), Aaron Volkmann (Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA)
Article 3
Fitting Security into Agile Software Development (pages 47-70)
Kalle Rindell (Informaatioteknologian laitos, University of Turku, Turku, Finland), Sami Hyrynsalmi (Tampere University of Technology, Pori, Finland), Ville Leppänen (Department of Information Technology, University of Turku, Turku, Finland)
Issue 2
Special Issue of Education and Training for Cybersecurity and Supply Chain Risk Management (SCRM)
Guest Editorial Preface
Carol Woody (Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA)
Article 1
Article 2
The Need for Higher Education in Cyber Supply Chain Security and Hardware Assurance (pages 14-27)
Brian Cohen (Institute for Defense Analyses, Alexandria, USA), Michelle G. Albert (Institute for Defense Analyses, Alexandria, USA), Elizabeth A. McDaniel (Institute for Defense Analyses, Alexandria, USA)
Article 3
A Case for Using Blended Learning and Development Techniques to Aid the Delivery of a UK Cybersecurity Core Body of Knowledge (pages 28-45)
David A Bird (Learning and Performance Institute, Coventry, UK), John Curry (Bath Spa University, Bath, UK)
Article 4
Enhancing a SCRM Curriculum With Cybersecurity (pages 46-56)
Art Conklin (University of Houston, Houston, USA), Chris Bronk (University of Houston, Houston, USA)
Issue 3
Software Security Problems Never Go Out of Style
Editorial Preface
Martin Gilje Jaatun (SINTEF Digital, Trondheim / University of Stavanger, Stavanger, Norway)
Article 1
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability (pages 1-33)
Marcos Lordello Chaim (School of Arts, Sciences and Humanities, University of Sao Paulo, Sao Paulo, Brazil), Daniel Soares Santos (Institute of Mathematical Sciences and Computing, University of Sao Paulo, São Carlos, Brazil), Daniela Soares Cruzes (Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway)
Article 2
Evaluation of Dynamic Analysis Tools for Software Security (pages 34-59)
Michael Lescisin (Department of Electrical, Computer and Software Engineering, University of Ontario Institute of Technology, Oshawa, Canada), Qusay H. Mahmoud (Department of Electrical, Computer and Software Engineering, University of Ontario Institute of Technology, Oshawa, Canada)
Article 3
Theory Driven Modeling as the Core of Software Development (pages 60-77)
Janis Osis (Institute of Applied Computer Systems, Riga Technical University, Riga, Latvia), Erika Nazaruka (Asnina) (Institute of Applied Computer Systems, Riga Technical University, Riga, Latvia)
Issue 4
All Good Things Must Come to an End
Editorial Preface
Martin Gilje Jaatun (SINTEF Digital, Trondheim, Norway & University of Stavanger, Stavanger, Norway)
Article 1
A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications (pages 1-16)
Muhammad Rana (School of Computing and Mathematics, Charles Sturt University, Australia), Quazi Mamun (Charles Sturt University, Sydney, Australia)
Article 2
A Secure MANET Routing Protocol for Crisis Situations (pages 17-45)
Martin Gilje Jaatun (Department of Software Engineering, Safety & Security, SINTEF Digital, Trondheim, Norway), Åsmund Ahlmann Nyre (HEMIT, Trondheim, Norway), Inger Anne Tøndel (Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway & SINTEF Digital, Trondheim, Norway)
Article 3
Using Security Patterns to Develop Secure Systems—Ten Years Later (pages 46-57)
Eduardo B. Fernandez (Florida Atlantic University, Boca Raton, USA), Hironori Washizaki (Computer Science and Engineering Department, Waseda University, Tokyo, Japan), Nobukazu Yoshioka (GRACE Center, National Institute of Informatics, Tokyo, Japan)