Journal Navigation
Published: Jan 10, 2024
DOI: 10.4018/IJISP.335225
Volume 18
Dongyan Zhang, Lili Zhang, Zhiyong Zhang, Zhongya Zhang
Aiming at the problem of adopting the same level of privacy protection for sensitive data in the process of data collection and ignoring the difference in privacy protection requirements, the... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Zhang, Dongyan, et al. "Adaptive Personalized Randomized Response Method Based on Local Differential Privacy." IJISP vol.18, no.1 2024: pp.1-19. http://doi.org/10.4018/IJISP.335225

APA

Zhang, D., Zhang, L., Zhang, Z., & Zhang, Z. (2024). Adaptive Personalized Randomized Response Method Based on Local Differential Privacy. International Journal of Information Security and Privacy (IJISP), 18(1), 1-19. http://doi.org/10.4018/IJISP.335225

Chicago

Zhang, Dongyan, et al. "Adaptive Personalized Randomized Response Method Based on Local Differential Privacy," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-19. http://doi.org/10.4018/IJISP.335225

Export Reference

Mendeley
Published: Feb 7, 2024
DOI: 10.4018/IJISP.337894
Volume 18
Zhiqiang Wu
Website link detection is an important means to ensure the security of the external chain. In the past, it was mainly realized through blacklisting and feature engineering-based machine learning... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Wu, Zhiqiang. "An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion." IJISP vol.18, no.1 2024: pp.1-15. http://doi.org/10.4018/IJISP.337894

APA

Wu, Z. (2024). An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion. International Journal of Information Security and Privacy (IJISP), 18(1), 1-15. http://doi.org/10.4018/IJISP.337894

Chicago

Wu, Zhiqiang. "An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-15. http://doi.org/10.4018/IJISP.337894

Export Reference

Mendeley
Published: Mar 20, 2024
DOI: 10.4018/IJISP.340728
Volume 18
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi
Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review." IJISP vol.18, no.1 2024: pp.1-27. http://doi.org/10.4018/IJISP.340728

APA

Ugbedeojo, M., Adebiyi, M. O., Aroba, O. J., & Adebiyi, A. A. (2024). RSA and Elliptic Curve Encryption System: A Systematic Literature Review. International Journal of Information Security and Privacy (IJISP), 18(1), 1-27. http://doi.org/10.4018/IJISP.340728

Chicago

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-27. http://doi.org/10.4018/IJISP.340728

Export Reference

Mendeley
Published: May 2, 2024
DOI: 10.4018/IJISP.342596
Volume 18
Vulnerability can lead to data loss, privacy leakage and financial loss. Accurate detection and identification of vulnerabilities is essential to prevent information leakage and APT attacks. This... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs." IJISP vol.18, no.1 2024: pp.1-21. http://doi.org/10.4018/IJISP.342596

APA

Liu, Y., Zhao, X., Qiu, X., & Yan, H. (2024). VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs. International Journal of Information Security and Privacy (IJISP), 18(1), 1-21. http://doi.org/10.4018/IJISP.342596

Chicago

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs," International Journal of Information Security and Privacy (IJISP) 18, no.1: 1-21. http://doi.org/10.4018/IJISP.342596

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Submission-Related Inquiries
All inquiries regarding IJISP should be directed to the attention of:

Dr. Yassine Maleh
Dr. Ahmed A. Abd El-Latif
Editors-in-Chief
International Journal of Information Security and Privacy (IJISP)
Email: yassine.maleh@ieee.org & ahmedabdellatif@ieee.org

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100