ISIJ 26: Cybersecurity Challenges and Responses
Editorial
Cybersecurity Challenges and Responses." Information & Security: An International Journal 26, no. 1 (2011): 5-6. "
Reviewed articles
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept." Information & Security: An International Journal 26, no. 1 (2011): 7-11. "
Phishing Attacks: A Challenge Ahead." Information & Security: An International Journal 26, no. 1 (2011): 12-26. "
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images." Information & Security: An International Journal 26, no. 1 (2011): 27-33. "
Evaluating Wireless Networks Security in Jordan: A Field Study." Information & Security: An International Journal 26, no. 1 (2011): 34-43. "
Biometric Template Security Using Code Base Cryptosystem." Information & Security: An International Journal 26, no. 2 (2013): 47-57. "
A New Technique for Enhancing the Properties of Transmitted Data." Information & Security: An International Journal 26, no. 2 (2013): 58-78. "
A Robust Remote User Authentication Scheme using Smart Card." Information & Security: An International Journal 26, no. 2 (2013): 79-97. "
Challenge-Response Schemes Using Gap Diffie-Hellman Groups." Information & Security: An International Journal 26, no. 2 (2013): 98-108. "
Intelligent Intrusion Detection Prevention Systems." Information & Security: An International Journal 26, no. 2 (2013): 109-119. "
TUX-TMS: A Reputation-based Trust System." Information & Security: An International Journal 26, no. 2 (2013): 120-131. "