Volume 12 (2022)
Issue 1
Pages | Title | Author(s) | Papers |
1017 - 1023 | A Theoretical Game Approach to Attacker-Defender Interaction DOI: 10.20533/ijisr.2042.4639.2022.0115 |
Yetunde Ogunlola, Otasowie Owolafe, Aderonke F. Thompson, Adewale Oronti, Boniface K. Alese | |
1024 - 1031 | Analysis of Location-Based Tweets Related to Covid-19 on Social Networking Services DOI: 10.20533/ijisr.2042.4639.2022.0116 |
Ayahiko Niimi | |
1032 - 1040 | Cybersecurity of Cyber Ranges: Threats and Mitigations DOI: 10.20533/ijisr.2042.4639.2022.0117 |
Sami Noponen, Juha Parssinen, Jarno Salonen | |
1041 - 1052 | End-to-End Call Authorization in Public Telephony DOI: 10.20533/ijisr.2042.4639.2022.0118 |
Joel Samper, Aspen Olmsted | |
1053 - 1061 | Quantum Attack-Resistant Security System for Cloud Computing using Lattice Cryptography DOI: 10.20533/ijisr.2042.4639.2022.0119 |
Henry C. Ukwuoma, Arome J. Gabriel, Aderonke F. Thompson, Boniface K. Alese | |
1062 - 1072 | Device Authentication Using Wavelet Based Features DOI: 10.20533/ijisr.2042.4639.2022.0120 |
Supriya Yadav, Pooja R.Khanna, Gareth Howells |