[Raw data] [50 most cited papers] [50 most relevant papers] [cites used to compute IF] [Recent citations ][Frequent citing series ] [more data in EconPapers] [trace new citations] [Missing citations? Add them now] [Incorrect content? Let us know]
IF | AIF | CIF | IF5 | DOC | CDO | CIT | NCI | CCU | D2Y | C2Y | D5Y | C5Y | SC | %SC | CiY | II | AII | |
2007 | 0 | 0.46 | 0.05 | 0 | 20 | 20 | 7 | 1 | 1 | 0 | 0 | 0 | 1 | 0.05 | 0.2 | |||
2008 | 0 | 0.49 | 0 | 0 | 22 | 42 | 0 | 1 | 20 | 20 | 0 | 0 | 0.23 | |||||
2009 | 0 | 0.48 | 0 | 0 | 23 | 65 | 4 | 1 | 42 | 42 | 0 | 0 | 0.24 | |||||
2010 | 0.02 | 0.49 | 0.01 | 0.02 | 16 | 81 | 3 | 1 | 2 | 45 | 1 | 65 | 1 | 0 | 0 | 0.21 | ||
2011 | 0 | 0.52 | 0 | 0 | 16 | 97 | 0 | 2 | 39 | 81 | 0 | 0 | 0.24 | |||||
2012 | 0.03 | 0.52 | 0.01 | 0.01 | 19 | 116 | 5 | 1 | 3 | 32 | 1 | 97 | 1 | 0 | 0 | 0.22 | ||
2013 | 0 | 0.56 | 0.01 | 0.01 | 18 | 134 | 2 | 2 | 5 | 35 | 96 | 1 | 0 | 0 | 0.24 | |||
2014 | 0 | 0.55 | 0 | 0 | 16 | 150 | 1 | 5 | 37 | 92 | 0 | 0 | 0.23 | |||||
2015 | 0.03 | 0.55 | 0.02 | 0.02 | 16 | 166 | 5 | 3 | 8 | 34 | 1 | 85 | 2 | 0 | 0 | 0.23 | ||
2016 | 0 | 0.53 | 0.03 | 0.01 | 16 | 182 | 1 | 5 | 13 | 32 | 85 | 1 | 0 | 0 | 0.21 | |||
2017 | 0 | 0.54 | 0.01 | 0.02 | 19 | 201 | 3 | 3 | 16 | 32 | 85 | 2 | 0 | 0 | 0.22 | |||
2018 | 0.03 | 0.55 | 0.02 | 0.01 | 24 | 225 | 5 | 4 | 20 | 35 | 1 | 85 | 1 | 0 | 0 | 0.24 | ||
2019 | 0.05 | 0.57 | 0.02 | 0.04 | 28 | 253 | 5 | 4 | 24 | 43 | 2 | 91 | 4 | 0 | 0 | 0.23 | ||
2020 | 0.08 | 0.68 | 0.02 | 0.06 | 26 | 279 | 4 | 6 | 30 | 52 | 4 | 103 | 6 | 0 | 0 | 0.32 | ||
2021 | 0.06 | 0.81 | 0.03 | 0.05 | 34 | 313 | 2 | 8 | 38 | 54 | 3 | 113 | 6 | 0 | 0 | 0.3 | ||
2022 | 0.07 | 0.86 | 0.03 | 0.05 | 29 | 342 | 0 | 11 | 49 | 60 | 4 | 131 | 6 | 0 | 0 | 0.26 | ||
2023 | 0.02 | 0.92 | 0.03 | 0.04 | 10 | 352 | 0 | 9 | 58 | 63 | 1 | 141 | 5 | 2 | 22.2 | 0 | 0.27 |
IF: | Two years Impact Factor: C2Y / D2Y |
AIF: | Average Impact Factor for all series in RePEc in year y |
CIF: | Cumulative impact factor |
IF5: | Five years Impact Factor: C5Y / D5Y |
DOC: | Number of documents published in year y |
CDO: | Cumulative number of documents published until year y |
CIT: | Number of citations to papers published in year y |
NCI: | Number of citations in year y |
CCU: | Cumulative number of citations to papers published until year y |
D2Y: | Number of articles published in y-1 plus y-2 |
C2Y: | Cites in y to articles published in y-1 plus y-2 |
D5Y: | Number of articles published in y-1 until y-5 |
C5Y: | Cites in y to articles published in y-1 until y-5 |
SC: | selft citations in y to articles published in y-1 plus y-2 |
%SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
CiY: | Cites in year y to documents published in year y |
II: | Immediacy Index: CiY / Documents. |
AII: | Average Immediacy Index for series in RePEc in year y |
# | Year | Title | Cited |
---|---|---|---|
1 | 2010 | Security Issues for Cloud Computing. (2010). Thuraisingham, Bhavani ; Khan, Latifur ; Kantarcioglu, Murat ; Hamlen, Kevin . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:4:y:2010:i:2:p:36-48. Full description at Econpapers || Download paper | 4 |
2 | 2015 | A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. (2015). Karlzn, Henrik ; Hallberg, Jonas ; Sommestad, Teodor . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:1:p:26-46. Full description at Econpapers || Download paper | 4 |
3 | 2012 | Investing in IT Security: How to Determine the Maximum Threshold. (2012). Eisenga, Amanda ; Rodriguez, Walter ; Jones, Travis L. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:3:p:75-87. Full description at Econpapers || Download paper | 4 |
4 | 2007 | Information Security Effectiveness: Conceptualization and Validation of a Theory. (2007). Knapp, Kenneth J ; Ford, Nelson F ; Rainer, Kelly R ; Marshall, Thomas E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:37-60. Full description at Econpapers || Download paper | 4 |
5 | 2009 | Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). Van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64. Full description at Econpapers || Download paper | 3 |
6 | 2020 | Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning. (2020). Panigrahi, Suvasini ; Subudhi, Sharmila . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:18-37. Full description at Econpapers || Download paper | 3 |
7 | 2018 | Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. (2018). Rai, Mritunjay Kumar ; Singh, Mandeep ; Saha, Rahul ; Kumar, Gulshan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:1:p:53-62. Full description at Econpapers || Download paper | 2 |
8 | 2016 | A Framework for Protecting Users Privacy in Cloud. (2016). Sodiya, Adesina S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:10:y:2016:i:4:p:33-43. Full description at Econpapers || Download paper | 2 |
9 | 2007 | An Ontology of Information Security. (2007). Herzog, Almut ; Duma, Claudiu ; Shahmehri, Nahid . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:4:p:1-23. Full description at Econpapers || Download paper | 2 |
10 | 2014 | A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. (2014). Chikhi, Salim ; Ramdane, Chikh . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:8:y:2014:i:4:p:1-25. Full description at Econpapers || Download paper | 2 |
11 | 2012 | Global Analysis of Security and Trust Perceptions in Web Design for E-Commerce. (2012). Srinivasan, S ; Barker, Robert . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:1:p:1-13. Full description at Econpapers || Download paper | 1 |
12 | 2019 | Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection. (2019). Singh, Pradeep ; Shukla, Alok Kumar. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:31-47. Full description at Econpapers || Download paper | 1 |
13 | 2015 | An Efficient, Anonymous and Unlinkable Incentives Scheme. (2015). Milutinovic, Milica ; de Decker, Bart ; Put, Andreas . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:3:p:1-20. Full description at Econpapers || Download paper | 1 |
14 | 2022 | A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data. (2022). , Mrunalini ; Kumari, Kimmi. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:16:y:2022:i:2:p:1-13. Full description at Econpapers || Download paper | 1 |
15 | 2018 | A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. (2018). Liu, Jihong ; Zhao, Juan ; Tosh, Deepak K ; Shetty, Sachin ; Liang, Xueping. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:4:p:68-81. Full description at Econpapers || Download paper | 1 |
16 | 2013 | Child Security in Cyberspace Through Moral Cognition. (2013). , Saravanakumar ; Botsa, Jayaprasad ; Prakash, Satya ; Vaish, Abhishek ; Coul, Natalie ; Srinidhi, T N. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:1:p:16-29. Full description at Econpapers || Download paper | 1 |
17 | 2020 | Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective. (2020). Chatterjee, Sheshadri. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:4:p:92-112. Full description at Econpapers || Download paper | 1 |
18 | 2007 | On the Design of an Authentication System Based on Keystroke Dynamics Using a Predefined Input Text. (2007). Bartmann, Dieter ; Achatz, Michael ; Bakdi, Idir . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:1-12. Full description at Econpapers || Download paper | 1 |
19 | 2017 | A Survey on Denial of Service Attacks and Preclusions. (2017). , Sathiyamurthy. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:4:p:1-15. Full description at Econpapers || Download paper | 1 |
20 | 2011 | User Perceptions of Security Technologies. (2011). Yaylacicegi, Ulku ; He, Ling ; Kline, Douglas M. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:5:y:2011:i:2:p:1-12. Full description at Econpapers || Download paper | 1 |
21 | 2019 | Parallel Hybrid BBO Search Method for Twitter Sentiment Analysis of Large Scale Datasets Using MapReduce. (2019). Bala, Manju ; Sharma, Kapil ; Tripathi, Ashish Kumar. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:106-122. Full description at Econpapers || Download paper | 1 |
22 | 2015 | Trust of the Same: Rethinking Trust and Reputation Management from a Structural Homophily Perspective. (2015). Usman, Aminu Bello ; Narayanan, Ajit ; Bai, Quan ; Liu, William . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:9:y:2015:i:2:p:13-30. Full description at Econpapers || Download paper | 1 |
23 | (p+, ?, t)-Anonymity Technique Against Privacy Attacks. (2021). , Dayananda ; Gadad, Veena. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:68-86. Full description at Econpapers || Download paper | 1 | |
24 | 2008 | An Empirical Investigation of an Individuals Perceived Need for Privacy and Security. (2008). Pirim, Taner ; Barkhi, Reza ; Reithel, Brian ; Boswell, Katherine ; James, Tabitha . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:2:y:2008:i:1:p:42-53. Full description at Econpapers || Download paper | 1 |
25 | 2018 | SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm. (2018). Sadak, Anas ; Ziani, Fatima Ezzahra ; Omary, Fouzia ; Echandouri, Bouchra. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:16-26. Full description at Econpapers || Download paper | 1 |
26 | 2013 | Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. (2013). Martin, Nigel ; Rice, John. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:1:p:1-15. Full description at Econpapers || Download paper | 1 |
27 | 2024 | An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. (2024). He, Jingyuan ; Wang, Wendong ; Tian, Yuan. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:18:y:2024:i:1:p:1-28. Full description at Econpapers || Download paper | 1 |
28 | 2017 | Honeypot Baselining for Zero Day Attack Detection. (2017). Misra, Ram Swaroop ; Sehgal, Rakesh Kumar ; Chamotra, Saurabh. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:3:p:63-74. Full description at Econpapers || Download paper | 1 |
29 | 2019 | Cyber Defense Maturity Levels and Threat Models for Smart Cities. (2019). al Shidhani, Ali Amur. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:2:p:32-46. Full description at Econpapers || Download paper | 1 |
30 | 2021 | Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization. (2021). Kulkarni, Prakash J ; Bhagate, Suhas. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:196-216. Full description at Econpapers || Download paper | 1 |
31 | 2018 | Association Rule Hiding in Privacy Preserving Data Mining. (2018). Angamuthu, Tamilarasi ; Mohan, Vijayarani S. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:141-163. Full description at Econpapers || Download paper | 1 |
32 | 2020 | Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network. (2020). M. P. S. Bhatia, ; Sarna, Geetika. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:1-17. Full description at Econpapers || Download paper | 1 |
33 | 2024 | 1 | |
34 | 2017 | PKI Deployment Challenges and Recommendations for ICS Networks. (2017). , Sreekanth ; Rao, Nandan ; Srivastava, Shubhra . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:38-48. Full description at Econpapers || Download paper | 1 |
35 | 2009 | Fair Electronic Exchange Based on Fingerprint Biometrics. (2009). Yang, LI ; Bedi, Harkeerat . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:3:p:76-106. Full description at Econpapers || Download paper | 1 |
36 | 2019 | A Survey: Intrusion Detection Techniques for Internet of Things. (2019). Kesswani, Nishtha ; Choudhary, Sarika. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:1:p:86-105. Full description at Econpapers || Download paper | 1 |
37 | 2021 | Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO). (2021). Barath, Raj ; Jone, Amir Anton ; Kondappan, Saravanan ; Sandeep, V. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:2:p:113-130. Full description at Econpapers || Download paper | 1 |
38 | 2007 | The Role of Privacy Risk in IT Acceptance: An Empirical Study. (2007). Cazier, Joseph A ; Medlin, Dawn B ; Wilson, Vance E. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:1:y:2007:i:2:p:61-73. Full description at Econpapers || Download paper | 1 |
39 | 2018 | A Comparative Study of Privacy Protection Practices in the US, Europe, and Asia. (2018). Kuilboer, Jean-Pierre ; Ashrafi, Noushin . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:12:y:2018:i:3:p:1-15. Full description at Econpapers || Download paper | 1 |
40 | 2012 | Safety Measures for Social Computing in Wiki Learning Environment. (2012). Patel, Ahmed ; Zin, Abdullah Mohd ; Latih, Rodziah ; Jnior, Joaquim Celestino ; Taghavi, Mona . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:6:y:2012:i:2:p:1-15. Full description at Econpapers || Download paper | 1 |
41 | 2019 | A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT. (2019). Tripathi, Sarsij ; Shukla, Anurag Shukla. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:3:p:91-105. Full description at Econpapers || Download paper | 1 |
42 | 2023 | i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. (2023). Haddouch, Khalid ; el Akkad, Nabil ; Ennaji, Sabrine. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:17:y:2023:i:1:p:1-17. Full description at Econpapers || Download paper | 1 |
43 | 2017 | Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies. (2017). Sabillon, Regner ; Cano, Jeimy J ; Cavaller, Victor ; Serra-Ruiz, Jordi . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:11:y:2017:i:2:p:25-37. Full description at Econpapers || Download paper | 1 |
44 | 2009 | Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?. (2009). Ifinedo, Princely. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:2:p:68-83. Full description at Econpapers || Download paper | 1 |
45 | 2019 | Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing. (2019). Sharma, Surender Kumar ; Ansari, Mohd Dilshad ; Gautam, Pratiksha. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:13:y:2019:i:1:p:59-69. Full description at Econpapers || Download paper | 1 |
46 | 2013 | A Survey of Security Standards Applicable to Health Information Systems. (2013). Yuan, Xiaohong ; Wang, Hong ; Xu, Jinsheng ; Akowuah, Francis . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:7:y:2013:i:4:p:22-36. Full description at Econpapers || Download paper | 1 |
47 | 2021 | Socio-Technical Attack Approximation Based on Structural Virality of Information in Social Networks. (2021). Vaish, Abhishek ; Ranjan, Preetish. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:15:y:2021:i:1:p:153-172. Full description at Econpapers || Download paper | 1 |
# | Year | Title | Cited |
---|---|---|---|
1 | 2009 | Do Privacy Statements Really Work? The Effect of Privacy Statements and Fair Information Practices on Trust and Perceived Risk in E-Commerce. (2009). Van Dyke, Thomas ; Nemati, Hamid R. In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:3:y:2009:i:1:p:45-64. Full description at Econpapers || Download paper | 3 |
2 | 2020 | Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning. (2020). Panigrahi, Suvasini ; Subudhi, Sharmila . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:14:y:2020:i:3:p:18-37. Full description at Econpapers || Download paper | 2 |
3 | 2014 | A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System. (2014). Chikhi, Salim ; Ramdane, Chikh . In: International Journal of Information Security and Privacy (IJISP). RePEc:igg:jisp00:v:8:y:2014:i:4:p:1-25. Full description at Econpapers || Download paper | 2 |
Year | Title | |
---|---|---|
2023 | A trust based model for recommendations of malignant people in social network. (2023). Gaur, Manish ; Ranjan, Preetish ; Thakur, Hardeo Kumar ; Jha, Govind Kumar. In: International Journal of System Assurance Engineering and Management. RePEc:spr:ijsaem:v:14:y:2023:i:1:d:10.1007_s13198-022-01812-0. Full description at Econpapers || Download paper |
Year | Citing document |
---|
Year | Citing document |
---|