


default search action
International Journal of Information and Computer Security, Volume 18
Volume 18, Numbers 1/2, 2022
- Gang Ke, Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh:

Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width. 1-11 - Yen-Wu Ti, Shang-Kuan Chen, Wen-Cheng Wang:

A hierarchical particle swarm optimisation algorithm for cloud computing environment. 12-26 - Jaryn Shen, Qingkai Zeng:

The count-min sketch is vulnerable to offline password-guessing attacks. 27-39 - N. Raghu Kisore, K. Shiva Kumar:

FFRR: a software diversity technique for defending against buffer overflow attacks. 40-74 - Salma Dammak, Faiza Ghozzi

, Asma Sellami, Faïez Gargouri
:
Managing vulnerabilities during the development of a secure ETL processes. 75-104 - Duncan-Allan Byamukama, John Ngubiri:

DDoS amplification attacks and impacts on enterprise service-oriented network infrastructures: DNS servers. 105-132 - Premala Bhande, Mohammed Bakhar:

Enhanced ant colony-based AODV for analysis of black and gray hole attacks in MANET. 133-147 - Punugu Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri:

Pairing-based strong key-insulated signature scheme. 148-164 - Shravani Mahesh Patil, B. R. Purushothama:

QC-PRE: quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data. 165-192 - Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:

Robustness attack on copyright protection scheme for H.264/AVC and SVC. 193-203 - Jianqing Gao, Haiyang Zou, Fuquan Zhang, Tsu-Yang Wu:

An intelligent stage light-based actor identification and positioning system. 204-218 - Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:

Effect of black hole attack in different mobility models of MANET using OLSR protocol. 219-235
Volume 18, Numbers 3/4, 2022
- Mingyue Wang, Shen Yan, Wei Wang, Jiwu Jing:

Secure zero-effort two-factor authentication based on time-frequency audio analysis. 237-261 - Asma Amraoui:

On a secured channel selection in cognitive radio networks. 262-277 - Min Ren, Zhihao Wang, Peiying Zhao:

A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection. 278-299 - Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen:

Research on intrusion detection method based on SMOTE and DBN-LSSVM. 300-312 - Nilay R. Mistry, Krupa Gajjar, S. O. Junare:

Volatile memory forensics of privacy aware browsers. 313-326 - Shikha Badhani, Sunil Kumar Muttoo:

GENDroid - a graph-based ensemble classifier for detecting Android malware. 327-347 - S. Jamuna Rani, S. Vagdevi:

Auto-encoder-based technique for effective detection of frauds in social networks. 348-364 - Dillibabu Shanmugam, Jothi Rangasamy:

Robust message authentication in the context of quantum key distribution. 365-382 - Bhanu Chander, Kumaravelan Gopalakrishnan:

RFID tag-based mutual authentication protocol with improved security for TMIS. 383-405 - Sandip Thite

, J. NaveenKumar:
SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications. 406-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














