Journal Contents: International Journal of Security and Privacy in Pervasive Computing (IJSPPC)

Volume 15 (2023)
Issue 1
Article 25
Do ChatGPT and Other AI Chatbots Pose a Cybersecurity Risk?: An Exploratory Study (pages 1-11)
Glorin Sebastian (Georgia Institute of Technology, USA)
Article 65
Real Impact of the Blockchain in Securing a ToIP Network (pages 1-22)
Sekoude Jehovah-nis Pedrie Sonon (Institut d'Innovation Technologique, Université d'Abomey-Calavi, Benin), Tahirou Djara (Institut d'Innovation Technologique, Université d'Abomey-Calavi, Benin), Matine Abdoul Ousmane (Institut d'Innovation Technologique, Université d'Abomey-Calavi, Benin), Abdou-Aziz Sobabe (Institut d'Innovation Technologique, Université d'Abomey-Calavi, Benin)
Article 75
The Meaning of Privacy in the Digital Era (pages 1-15)
Jackson Adams (University of Essex, UK), Hala Almahmoud (Al Yamamah University, Saudi Arabia)
Article 75
Privacy and Data Protection in ChatGPT and Other AI Chatbots: Strategies for Securing User Information (pages 1-14)
Glorin Sebastian (Georgia Institute of Technology, USA)
Article 76
Journal: Application of Artificial Intelligence in Cyber security (pages 1-13)
Varun Kharbanda (SP Jain school of global management, Missing Country), Seetharaman A (SP Jain school of global management, Australia), Maddulety K (SP Jain school of global management, Australia)
Article 91
A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework (pages 1-14)
Glorin Sebastian (Georgia Institute of Technology, USA)
Volume 14 (2022)
Issue 1
Article 7
Non-Contact Fingerprint Template Protection Using DFT Combined Random Projection (pages 1-21)
Boris Jerson Zannou (University of Abomey-Calavi, Benin), Tahirou Djara (University of Abomey-Calavi, Benin), Antoine Vianou (University of Abomey-Calavi, Benin)
Article 8
DNA-Based E-Voting System (pages 1-11)
Hadj Gharib (Djillali Liabes University of Sidi Bel Abbes, Algeria), Abdelkader Khobzaoui (Djillali Liabes University of Sidi Bel Abbes, Algeria)
Article 10
DNA-Based LSB Steganography (pages 1-9)
Abdelkader Khobzaoui (Independent Researcher, Algeria), Boualem Mansouri (Tahar Moulay University, Saida, Algeria), Kadda Benyahia (Independent Researcher, Algeria)
Article 12
Analysis of a Multiple-Shift Computer-Based Examination Evaluation System (pages 1-13)
Hemlata A. (Jabalpur Engineering College, India)
Article 46
Impact of Cryptographic Key on Scalable Computing (pages 1-17)
Padma Lochan Pradhan (Nalla Malla Reddy Engineering College, Hyderabad, India)
Article 47
Home Automation and Application With Bolt IoT (pages 1-7)
Ashish Sudhir Kakne (Government College of Engineering, India), P. M. Chouragade (Government College of Engineering, India)
Article 48
Trends in Remote User Authentication Based on Smart Card and External Memory (pages 1-10)
Bello Alhaji Buhari (Usmanu Danfodiyo University, Sokoto, Nigeria), Afolayan Ayodele Obiniyi (Ahmadu Bello University, Zaria, Nigeria), Sahalu B. Junaidu (Ahmadu Bello University, Zaria, Nigeria), Armand F. Donfack Kana (Ahmadu Bello University, Zaria, Nigeria)
Article 48
A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology (pages 1-21)
Ashish Tiwari (National Institute of Technology, Kurukshetra, India), Ritu Garg (National Institute of Technology, Kurukshetra, India)
Article 60
Individual Processing of Phishing Emails: Towards a Phishing Detection Framework (pages 1-22)
Aymen Hamoud (LIRE Laboratory, University of Constantine 2, Algeria), Esma Aimeur (University of Montreal, Canada), Mohamed Benmohammed (LIRE Laboratory, University of Constantine 2, Algeria)
Article 79
Deep Convolutional Real Time Model (DCRTM) for American Sign Language (ASL) Recognition (pages 1-13)
Hadj Ahmed Bouarara (Université Dr. Tahar Moulay de Saïda, Algeria), Chaima Bentadj (Université Dr. Tahar Moulay de Saïda, Algeria), Mohamed Elhadi Rahmani (Université Dr. Tahar Moulay de Saïda, Algeria)
Article 84
A DSPL and Reinforcement Learning Approach for Context-Aware IoT Systems Development (pages 1-22)
Amal Hallou (INPT, Morocco), Tarik Fissaa (INPT, Morocco), Hatim Hafiddi (INPT, Morocco), Mahmoud Nassar (ENSIAS, Mohammed V University in Rabat, Morocco)
Article 85
A Study on Metaverse Awareness, Cyber Risks, and Steps for Increased Adoption (pages 1-11)
Glorin Sebastian (Georgia Institute of Technology, USA)
Article 86
Interpretation on the Google Cloud Platform and Its Wide Cloud Services (pages 1-7)
Rafat Ul Aman Sajid (Lovely Professional University, India), Sirajul Islam (Lovely Professional University, India), Abul Bashar Khan Rakib (Lovely Professional University, India), Amandeep Kaur (Lovely Professional University, India)
Article 86
Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With ANN (pages 1-11)
Alankrita Aggarwal (Panipat Institute of Engineering and Technology, India), Shivani Gaba (Panipat Institute of Engineering and Technology, India), Shally Chawla (Panipat Institute of Engineering and Technology, India), Anoopa Arya (Panipat Institute of Engineering and Technology, India)
Article 87
Heart Disease Prediction Model Using Varied Classifiers with Score-Level Fusion (pages 1-39)
Mohammad Haider Syed (Department of Computer Science, Saudi Electronic University, Saudi Arabia)
Article 93
A Systematic Survey of Automatic Loan Approval System Based on Machine Learning (pages 1-25)
Vandana Sharma (J. C. Bose University of Science and Technology, India), Rewa Sharma (J. C. Bose University of Science and Technology, India)
Issue 2
Issue 3
Issue 4
Volume 13 (2021)
Issue 1
Article 1
Detection and Tracking Cows by Computer Vision and Image Classification Methods (pages 1-45)
Terry Gao (KEDRI, Auckland University of Technology, New Zealand)
Article 2
A Study: Chikungunya Using Social Media Analytics in Delhi (pages 46-56)
Shivani Jain (Indira Gandhi Delhi Technical University for Women, India), Alankrita Aggarwal (Panipat Institute of Engineering and Technology, India), Sandeep Mittal (Department of Mathematics, G. B. Pant Government Engineering College, India)
Article 3
COVID-19: Impact and New Normal (pages 57-68)
Sonal Kanungo (DPG Institute of Technology and Management, Maharshi Dayanand University, Gurgaon, India), Dolly Sharma (Amity School of Engineering and Technology, Amity University, Noida, India), Alankrita Aggarwal (Panipat Institute of Engineering and Technology, India)
Article 4
Analysis of Big Data Using Two Mapper Files in Hadoop (pages 69-77)
Jyotsna Malhotra (Deaprtment of CSE, Guru Tegh Bahadur Institute of Technology, India), Jasleen Kaur Sethi (USICT, Guru Gobind Singh Indraprastha University, India), Mamta Mittal (Department of CSE, G. B. Pant Government Engineering College, India)
Article 5
A Comprehensive Comparison of Hybrid Mobile Application Development Frameworks (pages 78-90)
Blaž Denko (Faculty of Electrical Engineering and Computer Science, University of Maribor, Slovenia), Špela Pečnik (Faculty of Electrical Engineering and Computer Science, University of Maribor, Slovenia), Iztok Fister Jr. (Faculty of Electrical Engineering and Computer Science, University of Maribor, Slovenia)
Issue 2
Article 1
Optimal Cloud Service Provider Selection Based on QoS Metrics (pages 1-15)
Arunambika T. (Hindusthan College of Arts and Science, Bharathiar University, India), Senthil Vadivu P. (Hindusthan College of Arts and Science, Bharathiar University, India)
Article 2
Low Power Restoration Circuits Reduce Swing Voltages of SRAM Cell With Improved Read and Write Margins (pages 16-28)
Vinod Kumar (Computer Science and Engineering, Delhi Technological University, India), Ram Murti Rawat (Computer Science and Engineering, Delhi Technological University, India)
Article 3
Isolated Site Wind System Start-Up System (pages 29-50)
Lema Gharsellaoui (The National School of Engineers of Sfax, Tunisia), Moez Ghariani (Laboratory of the Advanced Electronic Systems and the Durable Energy (ESSE), National School of Electronics and Telecoms of Sfax, Tunisia)
Issue 3
Article 1
COVID-19: Impact and Need for Post-Pandemic Crowd Safety – A Review (pages 1-11)
Pranav Taneja (Panipat Institute of Engineering and Technology, India), Manan Arora (Panipat Institute of Engineering and Technology, India), Abhay Mendiratta (Panipat Institute of Engineering and Technology, India), Alankrita Aggarwal (Panipat Institute of Engineering and Technology, India), Shailender Kumar (Department of Computer Science and Engineering, Delhi Technological University, India)
Article 2
Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks (pages 12-33)
Samuel Selassie Yakohene (University of Ghana, Ghana), Winfred Yaokumah (University of Ghana, Ghana), Ernest Barfo Boadi Gyebi (University of Ghana, Ghana)
Article 3
Performance Comparison of Image Processing Techniques on Various Filters: A Review (pages 34-42)
Shweta Singh (Maharaja Surajmal Institute of Technology, India), Ayush Sharma (Maharaja Surajmal Institute of Technology, India), Alankrita Aggarwal (Panipat Institute of Engineering and Technology, India)
Issue 4
Article 1
Applications of Big Data in Disaster Management: A Review (pages 1-16)
Sushrut M. (RV College of Engineering, India)
Article 2
An Optimistic Security Model for Improving Cyber Security Using Adaptive Algorithms to Prevent SQL Injection Attacks (pages 17-32)
P. Salman Raju (Adikavi Nannaya University, India), P. Venkateswara Rao (Adikavi Nannaya University, India)
Article 3
Proposed Abelian ACM Method Optimizing: The Risk on a Real-Time Unix Operating System (pages 33-52)
Abhishek Asthana (Shri Rawatpura Sarkar University, India), Padma Lochan Pradhan (Shri Rawatpura Sarkar University, India)
Volume 12 (2020)
Issue 1
Article 1
Accuracy Enhancement of GPS for Tracking Multiple Drones Based on MCMC Particle Filter (pages 1-16)
Negm Eldin Mohamed Shawky (Al-Shorouk Academy, Cairo, Egypt)
Article 2
A User Centered Model Driven Service Oriented Ubiquitous Government Design Approach (pages 17-28)
Idoughi Djilali (Computer Science Department, Faculty of Exact Sciences, University of Bejaia, Béjaïa, Algeria), Djeddi Abdelhakim (Computer Science Department, Faculty of Exact Sciences, University of Bejaia, Béjaïa, Algeria)
Article 3
Comparative Analysis of Proposed Artificial Neural Network (ANN) Algorithm With Other Techniques (pages 29-35)
Deepak Chatha (Department of Computer Science and Engineering, Panipat Institute of Engineering and Technology, Samalkha, India), Alankrita Aggarwal (Department of Computer Science and Engineering, Panipat Institute of Engineering and Technology, Samalkha, India), Rajender Kumar (Department of Computer Science and Engineering, Panipat Institute of Engineering and Technology, Samalkha, India)
Article 4
Video-Based Human Activity Recognition for Elderly Using Convolutional Neural Network (pages 36-48)
Vijayaprabakaran K. (Pondicherry Engineering College, Pondicherry, India), Sathiyamurthy K. (Pondicherry Engineering College, Pondicherry, India), Ponniamma M. (Pondicherry Engineering College, Pondicherry, India)
Issue 2
Article 1
Research on Ant Colony Optimization With Tabu Search Ability (pages 1-16)
Li Xu (Hebei Vocational College of Politics and Law, China)
Article 2
Brain Signal Classification Based on Deep CNN (pages 17-29)
Terry Gao (Counties Manukau District Health Board (CMDHB), New Zealand), Grace Ying Wang (Auckland University of Technology, New Zealand)
Article 3
New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm (pages 30-43)
Ahlem Fatnassi (ENSI, Manouba University, Tunisia), Hamza Gharsellaoui (Arab Open University, Riyadh, Saudi Arabia), Sadok Bouamama (Higher Colleges of Technology, Dubai, UAE)
Article 4
Design for Software Risk Management Using Soft Computing and Simulated Biological Approach (pages 44-54)
Alankrita Aggarwal (Department of Computer Science and Engineering, IKG Punjab Technical University, Jallandhar, India), Kanwalvir S. Dhindsa (Department of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Fatehgarh, India), P. K. Suri (Kurukshetra University, Kurukshetra, India)
Issue 3
Article 1
UML-Based Data Warehouse Design Using Temporal Dimensional Modelling (pages 1-19)
G. Sekhar Reddy (Acharya Nagarjuna University, Guntur, India), Chittineni Suneetha (RVR and JC College of Engineering, India)
Article 2
Evaluation of the Dynamic Pricing Model in Cloud (pages 20-29)
Meetu Kandpal (L. J. Institute of Computer Applications, India), Kalyani Ashesh Patel (K. S. School of Business Management, Gujarat University, India)
Article 3
Research on Root Locus Correction Algorithm in Automatic Control System (pages 30-45)
Weifang Zhai (Baoding University of Technology, China), Juan Feng (Baoding University of Technology, China)
Article 4
A Review on Identity and Access Management Server (KeyCloak) (pages 46-53)
Divyabharathi D. N. (R. V. College of Engineering, India), Nagaraj G. Cholli (R. V. College of Engineering, India)
Issue 4
Article 1
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks (pages 1-18)
Kaushik Adhikary (I. K. Gujral Punjab Technical University, Kapurthala, India), Shashi Bhushan (Chandigarh Engineering College, India), Sunil Kumar (Maharaja Agrasen University, India), Kamlesh Dutta (National Institute of Technology, Hamirpur, India)
Article 2
Survey of Online Identity Management Techniques on Blockchain (pages 19-28)
Monica Gahlawat (L. J. Institute of Computer Application, India)
Article 3
Linear Regression on Internet Banking Adoption Dataset Using WEKA (pages 29-37)
Nidhi Nigam Verma (Dr. A. P. J. Abdul Kalam University, India), Deepika Pathak (Dr. A. P. J. Abdul Kalam University, India)
Article 4
Conversational System, Intelligent Virtual Assistant (IVA) Named DIVA Using Raspberry Pi (pages 38-52)
Divij Bajaj (Symbiosis Centre for Information Technology, Symbiosis International University, India), Dhanya Pramod (Symbiosis Centre for Information Technology, Symbiosis International University, India)