Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
ISIJ 26: Cybersecurity Challenges and Responses
Editorial
Editorial
.
"
Cybersecurity Challenges and Responses
."
Information & Security: An International Journal
26, no. 1 (2011): 5-6.
Reviewed articles
Láng, Judit
.
"
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept
."
Information & Security: An International Journal
26, no. 1 (2011): 7-11.
Sood, Sandeep K.
.
"
Phishing Attacks: A Challenge Ahead
."
Information & Security: An International Journal
26, no. 1 (2011): 12-26.
Goel, Ajay
,
O.P.Sahu
,
Aman Soni
, and
Punit Soni
.
"
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images
."
Information & Security: An International Journal
26, no. 1 (2011): 27-33.
Mashhour, Ahmad
, and
Zakaria Saleh
.
"
Evaluating Wireless Networks Security in Jordan: A Field Study
."
Information & Security: An International Journal
26, no. 1 (2011): 34-43.
Sharma, Ajay
, and
Deo Brat Ojha
.
"
Biometric Template Security Using Code Base Cryptosystem
."
Information & Security: An International Journal
26, no. 2 (2013): 47-57.
Ali, Hesham Arafat
.
"
A New Technique for Enhancing the Properties of Transmitted Data
."
Information & Security: An International Journal
26, no. 2 (2013): 58-78.
Kumar, Manoj
,
Mridul Kumar Gupta
, and
Saru Kumari
.
"
A Robust Remote User Authentication Scheme using Smart Card
."
Information & Security: An International Journal
26, no. 2 (2013): 79-97.
Dehkordi, Massoud Hadian
, and
Reza Alimoradi
.
"
Challenge-Response Schemes Using Gap Diffie-Hellman Groups
."
Information & Security: An International Journal
26, no. 2 (2013): 98-108.
Murugan, Sethu
, and
Dr.K.Kuppusamy
.
"
Intelligent Intrusion Detection Prevention Systems
."
Information & Security: An International Journal
26, no. 2 (2013): 109-119.
Bhanwar, Shashi
, and
Seema Bawa
.
"
TUX-TMS: A Reputation-based Trust System
."
Information & Security: An International Journal
26, no. 2 (2013): 120-131.
Last updated:
Friday, 08 November 2019
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance