Stop the war!
Остановите войну!
for scientists:
default search action
ISC International Journal of Information Security, Volume 16
Volume 16, Number 1, January 2024
- Meharaj Begum A, Michael Arock:
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. 1-16 - Shadab Kalhoro, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy:
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios. 17-35 - Morteza Amirmohseni, Sadegh Dorri Nogoorani:
Safety Guards for Ethereum Smart Contracts. 37-53 - Mehmet Ali Yalçinkaya, Ecir Ugur Küçüksille:
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner. 55-77 - Kangkan Talukdar, Debojit Boro:
Slowloris Attack Detection Using Adaptive Timeout-Based Approach. 79-92 - Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. 93-114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.