Issue 1

Pages Title Author(s) Papers
1017 - 1023 A Theoretical Game Approach to Attacker-Defender Interaction

DOI: 10.20533/ijisr.2042.4639.2022.0115
Yetunde Ogunlola, Otasowie Owolafe, Aderonke F. Thompson, Adewale Oronti, Boniface K. Alese Download Paper
1024 - 1031 Analysis of Location-Based Tweets Related to Covid-19 on Social Networking Services

DOI: 10.20533/ijisr.2042.4639.2022.0116
Ayahiko Niimi Download Paper
1032 - 1040 Cybersecurity of Cyber Ranges: Threats and Mitigations

DOI: 10.20533/ijisr.2042.4639.2022.0117
Sami Noponen, Juha Parssinen, Jarno Salonen Download Paper
1041 - 1052 End-to-End Call Authorization in Public Telephony

DOI: 10.20533/ijisr.2042.4639.2022.0118
Joel Samper, Aspen Olmsted Download Paper
1053 - 1061 Quantum Attack-Resistant Security System for Cloud Computing using Lattice Cryptography

DOI: 10.20533/ijisr.2042.4639.2022.0119
Henry C. Ukwuoma, Arome J. Gabriel, Aderonke F. Thompson, Boniface K. Alese Download Paper
1062 - 1072 Device Authentication Using Wavelet Based Features

DOI: 10.20533/ijisr.2042.4639.2022.0120
Supriya Yadav, Pooja R.Khanna, Gareth Howells Download Paper
0