Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijics:"
@article{DBLP:journals/ijics/BhagwatP24, author = {Laxmi Bhagwat and Balaji Patil}, title = {Behavioural analysis and results of malware and ransomware using optimal behavioural feature set}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {57--78}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.136719}, doi = {10.1504/IJICS.2024.136719}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/BhagwatP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhondeD24, author = {Aparna Bhonde and Satish R. Devane}, title = {Priority-based security-aware virtual machine allocation policy}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {40--56}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.136715}, doi = {10.1504/IJICS.2024.136715}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/BhondeD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuXSL24, author = {Junlin Gu and Yihan Xu and Juan Sun and Weiwei Liu}, title = {Image tampering detection based on feature consistency attention}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {1--15}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.136704}, doi = {10.1504/IJICS.2024.136704}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GuXSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarCK24, author = {Devender Kumar and Satish Chand and Bijendra Kumar}, title = {A secure three-factor authentication protocol for mobile networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {119--138}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.137716}, doi = {10.1504/IJICS.2024.137716}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarCK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LarikWKSMA24, author = {Raja Sohail Ahmed Larik and Yongli Wang and Irfan Ali Kandhro and Nabila Sehito and Ghulam Ali Mallah and Fayyaz Ali}, title = {Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {139--162}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.137717}, doi = {10.1504/IJICS.2024.137717}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LarikWKSMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuongD24, author = {Tran Thi Luong and Linh Hoang Dinh}, title = {On generating new key dependent {XOR} tables to improve {AES} security and evaluating the randomness of the output of block ciphers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {16--39}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.136710}, doi = {10.1504/IJICS.2024.136710}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/LuongD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Nagunwa24, author = {Thomas Nagunwa}, title = {AI-driven approach for robust real-time detection of zero-day phishing websites}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {1}, pages = {79--118}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.136735}, doi = {10.1504/IJICS.2024.136735}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/Nagunwa24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NahnahC24, author = {Oussama Nahnah and Sarra Cherbal}, title = {{SLAK:} secure lightweight scheme for authentication and key-agreement in internet of things}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {200--226}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.137741}, doi = {10.1504/IJICS.2024.137741}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NahnahC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaP24, author = {Payal Sharma and B. R. Purushothama}, title = {User driven general framework to cap the joins in secure group communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {190--199}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.137722}, doi = {10.1504/IJICS.2024.137722}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TangYGQ24, author = {Chenghua Tang and Mengmeng Yang and Qingze Gao and Baohua Qiang}, title = {{PBDG:} a malicious code detection method based on precise behaviour dependency graph}, journal = {Int. J. Inf. Comput. Secur.}, volume = {23}, number = {2}, pages = {163--189}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.137719}, doi = {10.1504/IJICS.2024.137719}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TangYGQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AbebeSK23, author = {Abiy Tadesse Abebe and Yalemzewd Negash Shiferaw and P. G. V. Suresh Kumar}, title = {Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {323--353}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135895}, doi = {10.1504/IJICS.2023.135895}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AbebeSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AbhilashA23, author = {M. H. Abhilash and B. B. Amberker}, title = {Dynamic group signature scheme using ideal lattices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {60--90}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133366}, doi = {10.1504/IJICS.2023.133366}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AbhilashA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AgarwalK23, author = {Ruchi Agarwal and Manoj Kumar}, title = {A privacy preserving scheme for encrypted medical images using {RDH}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {436--452}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135919}, doi = {10.1504/IJICS.2023.135919}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AgarwalK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlmehdharAR23, author = {Mohammed Almehdhar and Mohammed M. Abdelsamea and Na Ruan}, title = {Deep multi-locality convolutional neural network for DDoS detection in smart home IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {453--474}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135902}, doi = {10.1504/IJICS.2023.135902}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Amith0MHES23, author = {K. K. Amith and H. A. Sanjay and Ajay Mahadevan and K. Harshita and D. Eshwar and K. Aditya Shastry}, title = {Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {109--134}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131094}, doi = {10.1504/IJICS.2023.131094}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Amith0MHES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ArcaH23, author = {Sevgi Arca and Rattikorn Hewett}, title = {Data privacy with heuristic anonymisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {104--132}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052968}, doi = {10.1504/IJICS.2023.10052968}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ArcaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AzeezS23, author = {Nureni Ayofe Azeez and Odejinmi Oluwatobi Samuel}, title = {A cyberstalking-free global network with artificial intelligence approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {82--108}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131096}, doi = {10.1504/IJICS.2023.131096}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AzeezS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AzharYC23, author = {Muhammad Kashif Azhar and Bin Yao and Zhongpu Chen}, title = {Enriching blockchain with spatial keyword query processing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {91--116}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133369}, doi = {10.1504/IJICS.2023.133369}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AzharYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BaruahDB23, author = {Bikash Baruah and Manash Pratim Dutta and Dhruba K. Bhattacharyya}, title = {An effective ensemble method for missing data imputation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {295--314}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10047377}, doi = {10.1504/IJICS.2022.10047377}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BaruahDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Belkebir23, author = {Djalila Belkebir}, title = {{DIP-QGA:} a secure and robust watermarking technique based on direct image projection and quantum genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {221--247}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10038272}, doi = {10.1504/IJICS.2022.10038272}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Belkebir23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChanderG23, author = {Bhanu Chander and Kumaravelan Gopalakrishnan}, title = {Outlier detection in {WSN} with {SVDD} via multi-interpolation auto-encoder}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {28--59}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133368}, doi = {10.1504/IJICS.2023.133368}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChanderG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChatterjeeBB23, author = {Debanjan Chatterjee and Barnali Gupta Banik and Abhinandan Banik}, title = {Attack resistant chaos-based cryptosystem by modified baker map and logistic map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {48--83}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052966}, doi = {10.1504/IJICS.2023.10052966}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ChatterjeeBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChenL23, author = {Lijiao Chen and Kewei Lv}, title = {Ciphertext-policy attribute-based delay encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {167--185}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134960}, doi = {10.1504/IJICS.2023.134960}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ChenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChithraA23, author = {P. L. Chithra and R. Aparna}, title = {Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {185--204}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131100}, doi = {10.1504/IJICS.2023.131100}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChithraA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DaveBP23, author = {Jay Dave and Meghna Bhatt and Deep Pancholi}, title = {Secure proof of ownership for deduplicated cloud storage system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {205--228}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131097}, doi = {10.1504/IJICS.2023.131097}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DaveBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DemighaH23, author = {Oualid Demigha and Nabil Haddad}, title = {Formal verification of software-only mechanisms for live migration of {SGX} enclaves}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {230--261}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134965}, doi = {10.1504/IJICS.2023.134965}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/DemighaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DingXCFLH23, author = {Zhenquan Ding and Hui Xu and Lei Cui and Haiqiang Fei and Yongji Liu and Zhiyu Hao}, title = {{HEMC:} a dynamic behaviour analysis system for malware based on hardware virtualisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {390--410}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135899}, doi = {10.1504/IJICS.2023.135899}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/DingXCFLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DixitC23, author = {Veer Sain Dixit and Akanksha Bansal Chopra}, title = {Push and nuke attacks detection using {DNN-HHO} algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {248--268}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10040154}, doi = {10.1504/IJICS.2022.10040154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DixitC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/EmaraAZ23, author = {Sherif F. Emara and Sayed Abdelhady and M. Zaki}, title = {A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {84--103}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052967}, doi = {10.1504/IJICS.2023.10052967}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/EmaraAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaAS23, author = {Sunil Gupta and Pradeep Kumar Arya and Hitesh Kumar Sharma}, title = {User anonymity-based secure authentication protocol for telemedical server systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {199--219}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10040155}, doi = {10.1504/IJICS.2022.10040155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaBSS23, author = {Sunil Gupta and Akansha Bansiya and Mansi Saini and Amuleek Sidhu}, title = {Blockchain-based {EHR} storage and access control system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {70--81}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131098}, doi = {10.1504/IJICS.2023.131098}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaBSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaG23, author = {Sahil Gupta and Naresh Kumar Garg}, title = {Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {158--175}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10047994}, doi = {10.1504/IJICS.2022.10047994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HegdeM23, author = {Nayana Hegde and Sunilkumar S. Manvi}, title = {Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {315--348}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10042652}, doi = {10.1504/IJICS.2022.10042652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HegdeM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JayashreeK23, author = {S. Jayashree and S. V. N. Santhosh Kumar}, title = {A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {354--376}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135897}, doi = {10.1504/IJICS.2023.135897}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/JayashreeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JoseNP23, author = {Ancy Sherin Jose and Latha R. Nair and Varghese Paul}, title = {Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {139--166}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134962}, doi = {10.1504/IJICS.2023.134962}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/JoseNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarK23, author = {Dilip Kumar and Manoj Kumar}, title = {Outsourcing decryption of {KP-ABE} using elliptic curve cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {210--229}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134961}, doi = {10.1504/IJICS.2023.134961}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarV23, author = {Umesh Kumar and Vadlamudi Ch. Venkaiah}, title = {A novel stream cipher based on quasigroups and {QG-PRNG}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {411--435}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135900}, doi = {10.1504/IJICS.2023.135900}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumarV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumariM23, author = {Shipra Kumari and Hrishikesh Mahato}, title = {Construction of weighted orthogonal matrices over finite field and its application in cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {263--276}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135894}, doi = {10.1504/IJICS.2023.135894}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumariM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LakelB23, author = {Kheira Lakel and Fatima Bendella}, title = {A bio-inspired algorithm for enhancing {DNA} cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {436--456}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132779}, doi = {10.1504/IJICS.2023.132779}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LakelB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MahajanNPKM23, author = {Akanksha S. Mahajan and Pradnya K. Navale and Vaishnavi V. Patil and Vijay M. Khadse and Parikshit N. Mahalle}, title = {The hybrid framework of ensemble technique in machine learning for phishing detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {162--184}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131099}, doi = {10.1504/IJICS.2023.131099}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MahajanNPKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MalhiS23, author = {Yuvraj Singh Malhi and Virendra Singh Shekhawat}, title = {Two-level machine learning driven intrusion detection model for IoT environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {229--261}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132708}, doi = {10.1504/IJICS.2023.132708}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MalhiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MasadehAA23, author = {Shadi Rasheed Masadeh and Hamza Abbass Al{-}Sewadi and Mohammed Abbas Fadhil Al{-}Husainy}, title = {A message encryption scheme inspired by Sudoku puzzle}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {399--413}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132739}, doi = {10.1504/IJICS.2023.132739}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MasadehAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MathurG23, author = {Monika Mathur and Nidhi Goel}, title = {{FPGA} implementation of {AES} encryptor based on rolled and masked approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131090}, doi = {10.1504/IJICS.2023.131090}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MathurG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Mayayise23, author = {Thembekile O. Mayayise}, title = {{BYOD} security issues and controls framework: an outcome of a systematic literature review}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {135--161}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131095}, doi = {10.1504/IJICS.2023.131095}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Mayayise23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MerabetH23, author = {Hoda El Merabet and Abderrahmane Hajraoui}, title = {Malware detection approach based on deep convolutional neural networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {145--157}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052974}, doi = {10.1504/IJICS.2023.10052974}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/MerabetH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MukherjeePBD23, author = {Pratyusa Mukherjee and Chittaranjan Pradhan and Rabindra Kumar Barik and Harishchandra Dubey}, title = {Emerging {DNA} cryptography-based encryption schemes: a review}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {27--47}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10036907}, doi = {10.1504/IJICS.2022.10036907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MukherjeePBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NandhiniK23, author = {U. Nandhini and S. V. N. Santhosh Kumar}, title = {A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {383--398}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132724}, doi = {10.1504/IJICS.2023.132724}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NandhiniK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Niu23, author = {Jing Niu}, title = {Design of automatic monitoring system for network information security in cloud computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {19--34}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131091}, doi = {10.1504/IJICS.2023.131091}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Niu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OdoomHS23, author = {Justice Odoom and Xiaofang Huang and Richlove Samuel Soglo}, title = {JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {262--292}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132733}, doi = {10.1504/IJICS.2023.132733}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OdoomHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PandeyK23, author = {Jagdish Chandra Pandey and Mala Kalra}, title = {An approach for secure data transmission in smart grids}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {348--365}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10044642}, doi = {10.1504/IJICS.2022.10044642}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PandeyK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatelMW23, author = {N. D. Patel and B. M. Mehtre and Rajeev Wankar}, title = {Artificial neural network-based intrusion detection system using multi-objective genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {320--335}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132726}, doi = {10.1504/IJICS.2023.132726}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatelMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatroA23, author = {K. Abhimanyu Kumar Patro and Bibhudendra Acharya}, title = {An efficient two-level image encryption system using chaotic maps}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {1/2}, pages = {35--69}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.131092}, doi = {10.1504/IJICS.2023.131092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatroA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PawarGJ23, author = {Ankush Balaram Pawar and Shashikant U. Ghumbre and Rashmi M. Jogdand}, title = {Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {298--322}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135896}, doi = {10.1504/IJICS.2023.135896}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/PawarGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RamyaE23, author = {S. P. Ramya and Rajagopal Eswari}, title = {A shallow-based neural network model for fake news detection in social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {360--382}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132727}, doi = {10.1504/IJICS.2023.132727}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RamyaE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RanjanS23, author = {Ranjeet Kumar Ranjan and Amit Singh}, title = {A comparative study of deep transfer learning models for malware classification using image datasets}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {293--319}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132735}, doi = {10.1504/IJICS.2023.132735}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RanjanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RavvaS23, author = {Santosh Kumar Ravva and Sureddi R. M. Krishna}, title = {Cryptanalysis of common prime {RSA} with two decryption exponents: Jochemsz and May approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {377--389}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135901}, doi = {10.1504/IJICS.2023.135901}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/RavvaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SalankarAP23, author = {Pritam S. Salankar and Vinay Avasthi and Ashutosh Pasricha}, title = {Lightweight authentication scheme based on modified {EAP} security for CoAP protocol-based IoMT applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {176--198}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10044087}, doi = {10.1504/IJICS.2022.10044087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SalankarAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SaravananB23, author = {A. Saravanan and S. Sathya Bama}, title = {CloudSec {(3FA):} a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {269--294}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10043102}, doi = {10.1504/IJICS.2022.10043102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SaravananB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SelimiRV23, author = {Synim Selimi and Blerim Rexha and Kamer Vishi}, title = {CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with {ML}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {117--138}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133385}, doi = {10.1504/IJICS.2023.133385}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SelimiRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SubramaniS23, author = {Shalini Subramani and Munuswamy Selvi}, title = {Comprehensive review on distributed denial of service attacks in wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {414--438}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10043105}, doi = {10.1504/IJICS.2022.10043105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SubramaniS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SubramaniS23a, author = {Shalini Subramani and Munuswamy Selvi}, title = {Intrusion detection system using {RBPSO} and fuzzy neuro-genetic classification algorithms in wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {439--461}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10048818}, doi = {10.1504/IJICS.2022.10048818}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SubramaniS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SureshPB23, author = {K. Suresh and Rajarshi Pal and S. R. Balasundaram}, title = {A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {366--398}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10043107}, doi = {10.1504/IJICS.2022.10043107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SureshPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SutarTS23, author = {Swapnil Sutar and Vikas Tiwari and Ajeet Singh}, title = {Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {336--359}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132725}, doi = {10.1504/IJICS.2023.132725}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SutarTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TasneemAHRD23, author = {Zareen Tasneem and Maria Afnan and Md. Arman Hossain and Md. Mahbubur Rahman and Samrat Kumar Dey}, title = {Performance evaluation of various deep convolutional neural network models through classification of malware}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {414--435}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132767}, doi = {10.1504/IJICS.2023.132767}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TasneemAHRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TiwariSTS23, author = {Vikas Tiwari and Ajeet Singh and Appala Naidu Tentu and Ashutosh Saxena}, title = {Generation of 8 {\texttimes} 8 S-boxes using 4 {\texttimes} 4 optimal S-boxes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {3/4}, pages = {399--413}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2022.10044644}, doi = {10.1504/IJICS.2022.10044644}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TiwariSTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/UthirapathyS23, author = {Samson Ebenezar Uthirapathy and Domnic Sandanam}, title = {Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {277--297}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135892}, doi = {10.1504/IJICS.2023.135892}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/UthirapathyS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VermaD23, author = {Anjani Kumar Verma and Veer Sain Dixit}, title = {Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {133--144}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052969}, doi = {10.1504/IJICS.2023.10052969}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/VermaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WeiSHWP23, author = {Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Ren{\'{e}} Peralta}, title = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\) inverter - with applications to AES, Camellia and {SM4}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {1--26}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052962}, doi = {10.1504/IJICS.2023.10052962}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WuZG23, author = {Zhijun Wu and Chenlei Zhang and Junjun Guo}, title = {A method of speech information hiding in inactive frame based on pitch modulation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133367}, doi = {10.1504/IJICS.2023.133367}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WuZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangBWW23, author = {Lizhe Zhang and Zhuoning Bai and Zhijun Wu and Kenian Wang}, title = {Unified identity authentication scheme of system wide information management based on {SAML-PKI-LDAP}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {186--209}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134959}, doi = {10.1504/IJICS.2023.134959}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ZhangBWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Abdmeziem22, author = {Mohammed Riyadh Abdmeziem}, title = {Securing IoT-based collaborative applications using a new compressed and distributed {MIKEY} mode}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {36--56}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121290}, doi = {10.1504/IJICS.2022.121290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Abdmeziem22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AkramVL22, author = {Junaid Akram and Danish Vasan and Ping Luo}, title = {Obfuscated code is identifiable by a token-based code clone detection technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {254--273}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2020.10041659}, doi = {10.1504/IJICS.2020.10041659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AkramVL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlKhodaidiG22, author = {Taghreed AlKhodaidi and Adnan Gutub}, title = {Scalable shares generation to increase participants of counting-based secret sharing technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {119--146}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121294}, doi = {10.1504/IJICS.2022.121294}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlKhodaidiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlibrahimM22, author = {Omar Al{-}Ibrahim and Majid Malaika}, title = {Botract: abusing smart contracts and blockchain for botnet command and control}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {147--163}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121295}, doi = {10.1504/IJICS.2022.121295}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AlibrahimM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Amraoui22, author = {Asma Amraoui}, title = {On a secured channel selection in cognitive radio networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {262--277}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050307}, doi = {10.1504/IJICS.2022.10050307}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Amraoui22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Azab22, author = {Ahmad Azab}, title = {The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {332--350}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122378}, doi = {10.1504/IJICS.2022.122378}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Azab22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BadhaniM22, author = {Shikha Badhani and Sunil Kumar Muttoo}, title = {GENDroid - a graph-based ensemble classifier for detecting Android malware}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {327--347}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10046938}, doi = {10.1504/IJICS.2022.10046938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BadhaniM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BejandiTH22, author = {Saba Malekpour Bejandi and Mohammad Reza Taghva and Payam Hanafizadeh}, title = {Applying swarm intelligence and data mining approach in detecting online and digital theft}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {142--167}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10047488}, doi = {10.1504/IJICS.2022.10047488}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BejandiTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhandeB22, author = {Premala Bhande and Mohammed Bakhar}, title = {Enhanced ant colony-based {AODV} for analysis of black and gray hole attacks in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {133--147}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122916}, doi = {10.1504/IJICS.2022.122916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhandeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Bi22, author = {Suhong Bi}, title = {Multiple backup method of financial encrypted data on internet of things platform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {199--209}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10044645}, doi = {10.1504/IJICS.2022.10044645}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Bi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BouafiaH22, author = {Khedoudja Bouafia and Lamia Hamza}, title = {Game theory approach for analysing attack graphs}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {305--320}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10052286}, doi = {10.1504/IJICS.2022.10052286}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/BouafiaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BrookesDOT22, author = {Scott Brookes and Robert Denz and Martin Osterloh and Stephen Taylor}, title = {ExOShim: preventing memory disclosure using execute-only kernel code}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {57--82}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121291}, doi = {10.1504/IJICS.2022.121291}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BrookesDOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ByamukamaN22, author = {Duncan{-}Allan Byamukama and John Ngubiri}, title = {DDoS amplification attacks and impacts on enterprise service-oriented network infrastructures: {DNS} servers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {105--132}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122915}, doi = {10.1504/IJICS.2022.122915}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ByamukamaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChanderG22, author = {Bhanu Chander and Kumaravelan Gopalakrishnan}, title = {{RFID} tag-based mutual authentication protocol with improved security for {TMIS}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {383--405}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10042827}, doi = {10.1504/IJICS.2022.10042827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChanderG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DamT22, author = {Khanh{-}Huu{-}The Dam and Tayssir Touili}, title = {Extracting malicious behaviours}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {365--404}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122380}, doi = {10.1504/IJICS.2022.122380}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DamT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DammakGSG22, author = {Salma Dammak and Faiza Ghozzi and Asma Sellami and Fa{\"{\i}}ez Gargouri}, title = {Managing vulnerabilities during the development of a secure {ETL} processes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {75--104}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122914}, doi = {10.1504/IJICS.2022.122914}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DammakGSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DebnathKC22, author = {Sumit Kumar Debnath and Nibedita Kundu and Tanmay Choudhury}, title = {Efficient post-quantum private set-intersection protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {405--423}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122381}, doi = {10.1504/IJICS.2022.122381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DebnathKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DsouzaPDGP22, author = {Jessica Judith D'souza and R. Padmavathy and Abhinav Dayal and Harika Gnanaveni and Sreenu Ponnada}, title = {Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {443--462}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2023.10050596}, doi = {10.1504/IJICS.2023.10050596}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DsouzaPDGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/FernandezPCA22, author = {Jincy J. Fernandez and Nithyanandam Pandian and Raghuvamsh Chavali and Ashwanth Kumar Appalaghe}, title = {Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {321--345}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2023.10050990}, doi = {10.1504/IJICS.2023.10050990}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/FernandezPCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GaoZZW22, author = {Jianqing Gao and Haiyang Zou and Fuquan Zhang and Tsu{-}Yang Wu}, title = {An intelligent stage light-based actor identification and positioning system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {204--218}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122920}, doi = {10.1504/IJICS.2022.122920}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GaoZZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Garg22, author = {Hitendra Garg}, title = {A comprehensive study of watermarking schemes for 3D polygon mesh objects}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {48--72}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2020.10047385}, doi = {10.1504/IJICS.2020.10047385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Garg22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GrzinicG22, author = {Toni Grzinic and Eduardo Bl{\'{a}}zquez Gonz{\'{a}}lez}, title = {Methods for automatic malware analysis and classification: a survey}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {179--203}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121297}, doi = {10.1504/IJICS.2022.121297}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GrzinicG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuoB22, author = {Xian Guo and Wei Bai}, title = {{ML-SDNIDS:} an attack detection mechanism for {SDN} based on machine learning}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {118--141}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10049057}, doi = {10.1504/IJICS.2022.10049057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuoB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KadhiwalaP22, author = {Bintu Kadhiwala and Sankita J. Patel}, title = {Privacy-preserving collaborative social network data publishing against colluding data providers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {346--378}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10051582}, doi = {10.1504/IJICS.2022.10051582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KadhiwalaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KangP22, author = {Jiwoong Kang and Jaehyun Park}, title = {SoC-based abnormal ethernet packet detector with automatic rule-set generator}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {219--230}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122372}, doi = {10.1504/IJICS.2022.122372}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KannaV22, author = {G. Prabu Kanna and V. Vasudevan}, title = {An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121288}, doi = {10.1504/IJICS.2022.121288}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KannaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeCC22, author = {Gang Ke and Ruey{-}Shun Chen and Yeh{-}Cheng Chen}, title = {Research on intrusion detection method based on {SMOTE} and {DBN-LSSVM}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {300--312}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050309}, doi = {10.1504/IJICS.2022.10050309}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeCCHW22, author = {Gang Ke and Ruey{-}Shun Chen and Yeh{-}Cheng Chen and Yu{-}Xi Hu and Tsu{-}Yang Wu}, title = {Simple multi-scale human abnormal behaviour detection based on video}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {310--320}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122376}, doi = {10.1504/IJICS.2022.122376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeCCHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeCJY22, author = {Gang Ke and Ruey{-}Shun Chen and Shanshan Ji and Jyh{-}haw Yeh}, title = {Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122910}, doi = {10.1504/IJICS.2022.122910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeCJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhurshidSI22, author = {Shozab Khurshid and Avinash K. Shrivastava and Javaid Iqbal}, title = {Generalised multi release framework for fault determination with fault reduction factor}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {164--178}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121296}, doi = {10.1504/IJICS.2022.121296}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhurshidSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KisoreK22, author = {N. Raghu Kisore and K. Shiva Kumar}, title = {{FFRR:} a software diversity technique for defending against buffer overflow attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {40--74}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122913}, doi = {10.1504/IJICS.2022.122913}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KisoreK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarGK22, author = {Rahul Kumar and Mridul Kumar Gupta and Saru Kumari}, title = {Cryptanalysis and improvement of an authentication scheme for IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {73--87}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10051392}, doi = {10.1504/IJICS.2022.10051392}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MehrabaniASG22, author = {Yavar Safaei Mehrabani and Roghayeh Ataie and Mohammad Hossein Shafiabadi and Abolghasem Ghasempour}, title = {Design and implementation of an {ASIP} for {SHA-3} hash algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {285--309}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122375}, doi = {10.1504/IJICS.2022.122375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MehrabaniASG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MistryGJ22, author = {Nilay R. Mistry and Krupa Gajjar and S. O. Junare}, title = {Volatile memory forensics of privacy aware browsers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {313--326}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2020.10047607}, doi = {10.1504/IJICS.2020.10047607}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MistryGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MurthyVTL22, author = {Mantripragada Yaswanth Bhanu Murthy and Thonduri Vineela and Godavarthi Amar Tej and Movva Vasantha Lakshmi}, title = {Development of adaptive AdaBoost classifier with optimal feature selection for enhanced intrusion detection in IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {168--198}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10046936}, doi = {10.1504/IJICS.2022.10046936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MurthyVTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NabouLO22, author = {Abdellah Nabou and My Driss Laanaoui and Mohammed Ouzzif}, title = {Effect of black hole attack in different mobility models of {MANET} using {OLSR} protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {219--235}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122921}, doi = {10.1504/IJICS.2022.122921}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NabouLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PadhyaJ22, author = {Mukti Padhya and Devesh C. Jinwala}, title = {Revocable key aggregate searchable encryption with user privacy and anonymity}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {1--33}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10051390}, doi = {10.1504/IJICS.2022.10051390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PadhyaJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatilP22, author = {Shravani Mahesh Patil and B. R. Purushothama}, title = {{QC-PRE:} quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {165--192}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122918}, doi = {10.1504/IJICS.2022.122918}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatilP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PrasadR22, author = {Venkata Vara Prasad and Polipalli Trinatha Rao}, title = {Reinforcement learning-based cooperative sensing in cognitive radio networks for primary user detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {34--47}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10051391}, doi = {10.1504/IJICS.2022.10051391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PrasadR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaniV22, author = {S. Jamuna Rani and S. Vagdevi}, title = {Auto-encoder-based technique for effective detection of frauds in social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {348--364}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10045346}, doi = {10.1504/IJICS.2022.10045346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaniV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ReddyBG22, author = {Punugu Vasudeva Reddy and A. Ramesh Babu and N. B. Gayathri}, title = {Pairing-based strong key-insulated signature scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {148--164}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122917}, doi = {10.1504/IJICS.2022.122917}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ReddyBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RenWZ22, author = {Min Ren and Zhihao Wang and Peiying Zhao}, title = {A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {278--299}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050308}, doi = {10.1504/IJICS.2022.10050308}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RenWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahBD22, author = {Gulab Sah and Subhasish Banerjee and Manash Pratim Dutta}, title = {Ensemble learning algorithms with feature reduction mechanism for intrusion detection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {88--117}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2023.10050595}, doi = {10.1504/IJICS.2023.10050595}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Shah22, author = {Monika Shah}, title = {Detecting over-claim permissions and recognising dangerous permission in Android apps}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {204--218}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121298}, doi = {10.1504/IJICS.2022.121298}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Shah22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShanmugamR22, author = {Dillibabu Shanmugam and Jothi Rangasamy}, title = {Robust message authentication in the context of quantum key distribution}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {365--382}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10044643}, doi = {10.1504/IJICS.2022.10044643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShanmugamR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZ22, author = {Jaryn Shen and Qingkai Zeng}, title = {The count-min sketch is vulnerable to offline password-guessing attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {27--39}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122912}, doi = {10.1504/IJICS.2022.122912}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SilvaNKAW22, author = {Rangana De Silva and Iranga Navaratna and Malitha Kumarasiri and Janaka Alawatugoda and Chuah Chai Wen}, title = {On power analysis attacks against hardware stream ciphers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {21--35}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121289}, doi = {10.1504/IJICS.2022.121289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SilvaNKAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SilvaNKWA22, author = {Rangana De Silva and Iranga Navaratna and Malitha Kumarasiri and Chuah Chai Wen and Janaka Alawatugoda}, title = {Correlation power analysis attack on software implementation of {TRIVIUM} stream cipher}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {379--401}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10046026}, doi = {10.1504/IJICS.2022.10046026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SilvaNKWA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TaouilABHD22, author = {Youssef Taouil and El Bachir Ameur and Amine Benhfid and Rachid Harba and Hassan Douzi}, title = {Adaptive steganographic scheme using a variable matrix embedding}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {231--260}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122373}, doi = {10.1504/IJICS.2022.122373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TaouilABHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThiteN22, author = {Sandip Thite and J. NaveenKumar}, title = {SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {406--424}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10042826}, doi = {10.1504/IJICS.2022.10042826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThiteN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TiCW22, author = {Yen{-}Wu Ti and Shang{-}Kuan Chen and Wen{-}Cheng Wang}, title = {A hierarchical particle swarm optimisation algorithm for cloud computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {12--26}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122911}, doi = {10.1504/IJICS.2022.122911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TiCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TianWL22, author = {Junfeng Tian and Zilong Wang and Zhen Li}, title = {Hierarchical data partition defence against co-resident attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {288--304}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10052284}, doi = {10.1504/IJICS.2022.10052284}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/TianWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TingGL22, author = {Grace C.{-}W. Ting and Bok{-}Min Goi and Sze Wei Lee}, title = {Robustness attack on copyright protection scheme for {H.264/AVC} and {SVC}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {193--203}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122919}, doi = {10.1504/IJICS.2022.122919}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TingGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WanD22, author = {Yujie Wan and Baoxiang Du}, title = {A new image encryption algorithm based on cascaded chaos and Arnold transform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {321--331}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122377}, doi = {10.1504/IJICS.2022.122377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WanD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangYWJ22, author = {Mingyue Wang and Shen Yan and Wei Wang and Jiwu Jing}, title = {Secure zero-effort two-factor authentication based on time-frequency audio analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {237--261}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050306}, doi = {10.1504/IJICS.2022.10050306}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WuYZ22, author = {Bin Wu and Xiao Yi and Dongning Zhao}, title = {A node screening algorithm for wireless sensor network based on threshold measurement}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {424--437}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122382}, doi = {10.1504/IJICS.2022.122382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WuYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XiongL22, author = {Junjie Xiong and Biyi Lin}, title = {You are safe when you tell the truth: a blockchain-based privacy-preserving evidence collection and distribution system for digital forensics}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {1/2}, pages = {210--236}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10044086}, doi = {10.1504/IJICS.2022.10044086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XiongL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YahiaBBB22, author = {Youcef Ould Yahia and Samia Bouzefrane and Hanifa Boucheneb and Soumya Banerjee}, title = {A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {261--284}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122374}, doi = {10.1504/IJICS.2022.122374}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YahiaBBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YaminiS22, author = {B. Yamini and R. Sabitha}, title = {Image steganalysis: real-time adaptive colour image segmentation for hidden message retrieval and Matthew's correlation coefficient calculation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {83--103}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121292}, doi = {10.1504/IJICS.2022.121292}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YaminiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZengCL22, author = {Zhixin Zeng and Liang Chang and Yi{-}Ning Liu}, title = {A fault tolerance data aggregation scheme for fog computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {3/4}, pages = {351--364}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122379}, doi = {10.1504/IJICS.2022.122379}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZengCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangYDILG22, author = {Xichen Zhang and Mohammad Mehdi Yadollahi and Sajjad Dadkhah and Haruna Isah and Duc{-}Phong Le and Ali A. Ghorbani}, title = {Data breach: analysis, countermeasures and challenges}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {402--442}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2023.10050154}, doi = {10.1504/IJICS.2023.10050154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangYDILG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhuDWZ22, author = {Hongfeng Zhu and Zhiqin Du and Liwei Wang and Yuanle Zhang}, title = {A \emph{N}-party authenticated group key distribution protocol using quantum-reflection architecture}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {237--253}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10052282}, doi = {10.1504/IJICS.2022.10052282}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ZhuDWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhuWCW22, author = {Hongfeng Zhu and Xintong Wang and Yeh{-}Cheng Chen and Xueying Wang}, title = {Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {17}, number = {1/2}, pages = {104--118}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.121293}, doi = {10.1504/IJICS.2022.121293}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhuWCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhuXCC22, author = {Xingtong Zhu and Jianbin Xiong and Yeh{-}Cheng Chen and Yongda Cai}, title = {Safety monitoring of machinery equipment and fault diagnosis method based on support vector machine and improved evidence theory}, journal = {Int. J. Inf. Comput. Secur.}, volume = {19}, number = {3/4}, pages = {274--287}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10052283}, doi = {10.1504/IJICS.2022.10052283}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ZhuXCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Abu-AmaraB21, author = {Fadi Abu{-}Amara and Ameur Bensefia}, title = {A handwriting document encryption scheme based on segmentation and chaotic logarithmic map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {327--343}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114709}, doi = {10.1504/IJICS.2021.114709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Abu-AmaraB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AkramMJL21, author = {Junaid Akram and Majid Mumtaz and Gul Jabeen and Ping Luo}, title = {DroidMD: an efficient and scalable Android malware detection approach at source code level}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {299--321}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116310}, doi = {10.1504/IJICS.2021.116310}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AkramMJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlimehajHDNR21, author = {Vlera Alimehaj and Arbnor Halili and Ramadan Dervishi and Vehbi Neziri and Blerim Rexha}, title = {Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {171--191}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113174}, doi = {10.1504/IJICS.2021.113174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlimehajHDNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlsmadiAS21, author = {Izzat Alsmadi and Ahmed Aleroud and Ahmad A. Saifan}, title = {Fault-based testing for discovering {SQL} injection vulnerabilities in web applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {51--62}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117394}, doi = {10.1504/IJICS.2021.117394}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AlsmadiAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlsuhibanyAA21, author = {Suliman A. Alsuhibany and Fatimah N. Almohaimeed and Naseem A. Alrobah}, title = {Synthetic Arabic handwritten {CAPTCHA}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {385--398}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118959}, doi = {10.1504/IJICS.2021.118959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlsuhibanyAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AmbikaB21, author = {B. J. Ambika and M. K. Banga}, title = {A novel energy efficient routing algorithm for {MPLS-MANET} using fuzzy logic controller}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {20--39}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112206}, doi = {10.1504/IJICS.2021.112206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmbikaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AmraniRA21, author = {Ayoub Amrani and Najat Rafalia and Jaafar Abouchabaka}, title = {Mobile agent security using Amrani et al.'s protocol and binary serialisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {192--209}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113175}, doi = {10.1504/IJICS.2021.113175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmraniRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnandBA21, author = {Adarsh Anand and Navneet Bhatt and Omar Hussain Alhazmi}, title = {Vulnerability discovery modelling: a general framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {192--206}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117402}, doi = {10.1504/IJICS.2021.117402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnandBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnilI21, author = {G. L. Anil and J. L. Mazher Iqbal}, title = {Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {60--78}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112208}, doi = {10.1504/IJICS.2021.112208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnilI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnnaluriAP21, author = {Sreenivasa Rao Annaluri and Venkata Ramana Attili and Kalli Srinivasa Nageswara Prasad}, title = {Secure and unifold mining model for pattern discovery from streaming data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {136--145}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113170}, doi = {10.1504/IJICS.2021.113170}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnnaluriAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhatiaJ21, author = {Jitesh Kumar Bhatia and Anand Singh Jalal}, title = {Pixel-based hybrid copy move image forgery detection using Zernike moments and auto colour correlogram}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {88--107}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115359}, doi = {10.1504/IJICS.2021.115359}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhatiaJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BoukhamlaG21, author = {Akram Boukhamla and Javier Coronel Gaviro}, title = {{CICIDS2017} dataset: performance improvements and validation as a robust intrusion detection system testbed}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {20--32}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117392}, doi = {10.1504/IJICS.2021.117392}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BoukhamlaG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CaoCDW21, author = {Nanyuan Cao and Zhenfu Cao and Xiaolei Dong and Haijiang Wang}, title = {Improved {RSA} lossy trapdoor function and applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {229--241}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114703}, doi = {10.1504/IJICS.2021.114703}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CaoCDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CaoWL21, author = {Zhengjun Cao and Xiqi Wang and Lihua Liu}, title = {One privacy-preserving multi-keyword ranked search scheme revisited}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {375--384}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118958}, doi = {10.1504/IJICS.2021.118958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CaoWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CaoZZ21, author = {Yuchen Cao and Yongbin Zhou and Hailong Zhang}, title = {Multi-channel time-frequency fusion attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {84--102}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117396}, doi = {10.1504/IJICS.2021.117396}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CaoZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChengCSHL21, author = {Ting{-}Fang Cheng and Ying{-}Chin Chen and Zhu{-}Dao Song and Ngoc{-}Tu Huynh and Jung{-}San Lee}, title = {Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {67--87}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115348}, doi = {10.1504/IJICS.2021.115348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChengCSHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CuiZW21, author = {Zhanwei Cui and Jianping Zeng and Chengrong Wu}, title = {A layer-crossing multi-factor and dynamic security model over a moving target defence}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {150--169}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117400}, doi = {10.1504/IJICS.2021.117400}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CuiZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DuC21, author = {Ningning Du and Chongxu Chen}, title = {Research on privacy protection system of {RFID} personal consumption data based on internet of things and cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {328--342}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116930}, doi = {10.1504/IJICS.2021.116930}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DuC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElkhadirB21, author = {Zyad Elkhadir and Mohammed Benattou}, title = {A truncated mean \emph{{\(\mathscr{l}\)}\({}_{\mbox{p}}\)}-LDA approach for intrusion detection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {355--374}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118957}, doi = {10.1504/IJICS.2021.118957}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ElkhadirB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/FanTL21, author = {Zhijie Fan and Chengxiang Tan and Xin Li}, title = {A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {242--262}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114704}, doi = {10.1504/IJICS.2021.114704}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/FanTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GargSA21, author = {Urvashi Garg and Geeta Sikka and Lalit Kumar Awasthi}, title = {Empirical risk assessment of attack graphs using time to compromise framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {33--50}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117393}, doi = {10.1504/IJICS.2021.117393}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GargSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GavadeCR21, author = {Jayashree D. Gavade and S. R. Chougule and Vishwaja Rathod}, title = {A robust passive blind copy-move image forgery detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {300--317}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114707}, doi = {10.1504/IJICS.2021.114707}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GavadeCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HaiderNSSHBK21, author = {Waqas Haider and Muhammad Wasif Nisar and Tanzila Saba and Muhammad Sharif and Raja Umair Haider and Nadeem Muhammad Bilal and Muhammad Attique Khan}, title = {A complexity reduced and reliable integrity protection for large relational data over clouds}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {49--66}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115347}, doi = {10.1504/IJICS.2021.115347}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HaiderNSSHBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JabeenYL21, author = {Gul Jabeen and Xi Yang and Ping Luo}, title = {Vulnerability severity prediction model for software based on Markov chain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {109--140}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116302}, doi = {10.1504/IJICS.2021.116302}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JabeenYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JayasimhaR21, author = {Yenumaladoddi Jayasimha and R. Venkata Siva Reddy}, title = {A facial expression recognition model using hybrid feature selection and support vector machines}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {79--97}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112209}, doi = {10.1504/IJICS.2021.112209}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JayasimhaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KV21, author = {Unnikrishnan K and Pramod K. V}, title = {Prediction-based robust blind reversible watermarking for relational databases}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {211--228}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114702}, doi = {10.1504/IJICS.2021.114702}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KaliaBS21, author = {Parmod Kalia and Divya Bansal and Sanjeev Sofat}, title = {A hybrid approach for preserving privacy for real estate data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {400--410}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116942}, doi = {10.1504/IJICS.2021.116942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KaliaBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KamilO21, author = {Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin}, title = {A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {183--215}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116305}, doi = {10.1504/IJICS.2021.116305}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KamilO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KovelamudiWZM21, author = {Geetika Kovelamudi and Bryan Watson and Jun Zheng and Srinivas Mukkamala}, title = {On the adoption of scramble keypad for unlocking PIN-protected smartphones}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115345}, doi = {10.1504/IJICS.2021.115345}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KovelamudiWZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LathaRD21, author = {S. Bhargavi Latha and D. Venkata Reddy and A. Damodaram}, title = {Video watermarking using neural networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {40--59}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112207}, doi = {10.1504/IJICS.2021.112207}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LathaRD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiLWSL21, author = {Boyu Li and Yanheng Liu and Minghai Wang and Geng Sun and Bin Li}, title = {Local anatomy for personalised privacy protection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {254--271}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116308}, doi = {10.1504/IJICS.2021.116308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiLWSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiangSTFZ21, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Peter Foytik and Lingchen Zhang}, title = {Leveraging Intel {SGX} to enable trusted and privacy preserving membership service in distributed ledgers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {63--83}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117395}, doi = {10.1504/IJICS.2021.117395}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/LiangSTFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LinYL21, author = {Zhixing Lin and Jian Yu and Shunfa Liu}, title = {The prediction of network security situation based on deep learning method}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {386--399}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116941}, doi = {10.1504/IJICS.2021.116941}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LinYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiuLLW21, author = {Xiaoqian Liu and Qianmu Li and Tao Li and Ming Wu}, title = {Privacy preserving techniques for decision trees}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {255--271}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118952}, doi = {10.1504/IJICS.2021.118952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiuLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuoYZ21, author = {Xiao Luo and Chengchao Yao and Nur Zincir{-}Heywood}, title = {Modelling and visualising {SSH} brute force attack behaviours through a hybrid learning framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {170--191}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117401}, doi = {10.1504/IJICS.2021.117401}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/LuoYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MaSM21, author = {Fengming Ma and Gang Sheng and Yuefeng Ma}, title = {E-commerce process reengineering for customer privacy protection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {373--385}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116940}, doi = {10.1504/IJICS.2021.116940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MaSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoonR21, author = {Sunil K. Moon and Rajshree D. Raut}, title = {Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {403--439}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114713}, doi = {10.1504/IJICS.2021.114713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoonR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MuhammadK21, author = {Nooh Bany Muhammad and Aya Kandil}, title = {Information protection of end users on the web: privacy issues and measures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {357--372}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116939}, doi = {10.1504/IJICS.2021.116939}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MuhammadK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MumtazL21, author = {Majid Mumtaz and Ping Luo}, title = {An improved cryptanalysis of large {RSA} decryption exponent with constrained secret key}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {102--117}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113168}, doi = {10.1504/IJICS.2021.113168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MumtazL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OguOAK21, author = {Emmanuel C. Ogu and Olusegun A. Ojesanmi and Oludele Awodele and Shade O. Kuyoro}, title = {Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {137--149}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117399}, doi = {10.1504/IJICS.2021.117399}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OguOAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Olakanmi21, author = {Oladayo Olufemi Olakanmi}, title = {A lightweight security and privacy-aware routing scheme for energy-constraint multi-hop wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {231--253}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116307}, doi = {10.1504/IJICS.2021.116307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Olakanmi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OuaddahB21, author = {Aafaf Ouaddah and Badr Bellaj}, title = {FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {18--48}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115346}, doi = {10.1504/IJICS.2021.115346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OuaddahB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ParamasivamS21, author = {P. Saravanan and Shanthi Rekha Shanmugham}, title = {Time-shared {AES-128} implementation with extremely low-cost for smart card applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {239--254}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118951}, doi = {10.1504/IJICS.2021.118951}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ParamasivamS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PareekP21, author = {Gaurav Pareek and B. R. Purushothama}, title = {Blockchain-based decentralised access control scheme for dynamic hierarchies}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {324--354}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118956}, doi = {10.1504/IJICS.2021.118956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PareekP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PonguwalaR21, author = {Maitreyi Ponguwala and Meda Sreenivasa Rao}, title = {Secured spray and focus protocol design in intermittently connected mobile networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {344--353}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114710}, doi = {10.1504/IJICS.2021.114710}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PonguwalaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RB21, author = {Lakshmi H. R. and Surekha Borra}, title = {Digital video watermarking tools: an overview}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117391}, doi = {10.1504/IJICS.2021.117391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaghavenderP21, author = {K. V. Raghavender and P. Premchand}, title = {Accurate and reliable detection of DDoS attacks based on {ARIMA-SWGARCH} model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {118--135}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113169}, doi = {10.1504/IJICS.2021.113169}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaghavenderP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RathP21, author = {Mamata Rath and Binod Kumar Pattanayak}, title = {Performance evaluation of optimised protocol in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {318--326}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114708}, doi = {10.1504/IJICS.2021.114708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RathP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RezaeibaghaMHZ21, author = {Fatemeh Rezaeibagha and Yi Mu and Ke Huang and Leyou Zhang}, title = {Enhanced bitcoin with two-factor authentication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {292--306}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118954}, doi = {10.1504/IJICS.2021.118954}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RezaeibaghaMHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahaKRK21, author = {Rahul Saha and Gulshan Kumar and Mritunjay Kumar Rai and Hye{-}Jin Kim}, title = {Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {226--238}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118950}, doi = {10.1504/IJICS.2021.118950}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahaKRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SaradiK21, author = {V. Partha Saradi and P. Kailasapathi}, title = {A novel binary encryption algorithm for navigation control of robotic vehicles through visible light communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {160--170}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113172}, doi = {10.1504/IJICS.2021.113172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SaradiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SarafSI21, author = {Iqra Saraf and Avinash K. Shrivastava and Javaid Iqbal}, title = {Effort-based fault detection and correction modelling for multi release of software}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {354--379}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114711}, doi = {10.1504/IJICS.2021.114711}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SarafSI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SathishK21, author = {Kuppani Sathish and Kamakshaiah Kolli}, title = {Sustainable wireless clouds with security assurance}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {146--159}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113171}, doi = {10.1504/IJICS.2021.113171}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SathishK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sedaghat21, author = {Shahrzad Sedaghat}, title = {New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using {SDN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {272--298}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116309}, doi = {10.1504/IJICS.2021.116309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sedaghat21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SenoussiBB21, author = {Nour El Houda Senoussi and Abdelmalik Bachir and Abdelmadjid Bouabdallah}, title = {On QoS-aware location privacy in mobile networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {163--182}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116304}, doi = {10.1504/IJICS.2021.116304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SenoussiBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShailajaN21, author = {A. Shailaja and Krishnamurthy Gorappa Ningappa}, title = {A low area {VLSI} implementation of extended tiny encryption algorithm using Lorenz chaotic system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {3--19}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112205}, doi = {10.1504/IJICS.2021.112205}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShailajaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaJ21, author = {Dhruti Sharma and Devesh C. Jinwala}, title = {Multi-writer multi-reader conjunctive keyword searchable encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {141--162}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116303}, doi = {10.1504/IJICS.2021.116303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaK21, author = {Geeta Sharma and Sheetal Kalra}, title = {A robust multi-factor remote user authentication scheme for cloud-IoT services}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {272--291}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118953}, doi = {10.1504/IJICS.2021.118953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SheikP21, author = {Syed Amma Sheik and M. Amutha Prabakar}, title = {An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {207--225}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118967}, doi = {10.1504/IJICS.2021.118967}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SheikP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghSBS21, author = {Amardeep Singh and Monika Singh and Divya Bansal and Sanjeev Sofat}, title = {Optimised K-anonymisation technique to deal with mutual friends and degree attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {281--299}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114706}, doi = {10.1504/IJICS.2021.114706}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghSBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghTV21, author = {Ajeet Singh and Appala Naidu Tentu and V. Ch. Venkaiah}, title = {A dynamic key management paradigm for secure wireless ad hoc network communications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {380--402}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114712}, doi = {10.1504/IJICS.2021.114712}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghalR21, author = {Chetna Singhal and A. Rajesh}, title = {Heuristic trust-based neighbour centric routing for CPS-enabled wireless sensor and ad hoc network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {120--136}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117398}, doi = {10.1504/IJICS.2021.117398}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghalR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SongM21, author = {Fagen Song and Tinghuai Ma}, title = {High utility differential privacy based on smooth sensitivity and individual ranking}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {2/3}, pages = {216--230}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116306}, doi = {10.1504/IJICS.2021.116306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SongM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SukumaranM21, author = {Sreeja Cherillath Sukumaran and Mohammed Misbahuddin}, title = {Secure key exchange scheme: a {DNA} computing-based approach to resist {MITM} in {DHKE}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {307--323}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118955}, doi = {10.1504/IJICS.2021.118955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SukumaranM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Wang21, author = {Geng Wang}, title = {Time-based key management in attribute-based encryption using piecewise key generation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {103--119}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117397}, doi = {10.1504/IJICS.2021.117397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangW21, author = {Chien{-}Ming Wang and Chih{-}Hung Wang}, title = {A highly secure three-party authentication key exchange protocol and its application in e-business communication with {ECK} model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {399--419}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118965}, doi = {10.1504/IJICS.2021.118965}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WaqasAMY21, author = {Umer Waqas and Shazia Afzal and Mubeen Akhtar Mir and Muhammad Yousaf}, title = {Cryptographic strength evaluation of {AES} s-box variants}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {263--280}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114705}, doi = {10.1504/IJICS.2021.114705}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WaqasAMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Zhao21, author = {Jianchao Zhao}, title = {Research on network security defence based on big data clustering algorithms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {4}, pages = {343--356}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.116931}, doi = {10.1504/IJICS.2021.116931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Zhao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AgrawalS20, author = {Amrit Kumar Agrawal and Yogendra Narain Singh}, title = {Unconstrained face recognition using deep convolution neural network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {332--348}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105183}, doi = {10.1504/IJICS.2020.105183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AgrawalS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-AhmadAI20, author = {Ahmad Salah Al{-}Ahmad and Syed Ahmad Aljunid and Normaly Kamal Ismail}, title = {Mobile cloud computing applications penetration testing model design}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {210--226}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108849}, doi = {10.1504/IJICS.2020.108849}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-AhmadAI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BikshamV20, author = {V. Biksham and D. Vasumathi}, title = {A lightweight fully homomorphic encryption scheme for cloud security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {357--371}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109482}, doi = {10.1504/IJICS.2020.109482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BikshamV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BogawarB20, author = {Pranjal S. Bogawar and Kishor K. Bhoyar}, title = {Comparative study of classification approaches for e-mail analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {411--427}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109485}, doi = {10.1504/IJICS.2020.109485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BogawarB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DiwakarK20, author = {Manoj Diwakar and Pardeep Kumar}, title = {Blind noise estimation-based {CT} image denoising in tetrolet domain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {234--252}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105175}, doi = {10.1504/IJICS.2020.105175}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DiwakarK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElhosenyA20, author = {Mohamed Elhoseny and Hosny A. Abbas}, title = {Towards automated {SCADA} forensic investigation: challenges, opportunities and promising paradigms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {268--288}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109477}, doi = {10.1504/IJICS.2020.109477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ElhosenyA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElmasryAZ20, author = {Wisam Elmasry and Akhan Akbulut and Abdul Halim Zaim}, title = {Comparative evaluation of different classification techniques for masquerade attack detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {187--209}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108848}, doi = {10.1504/IJICS.2020.108848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ElmasryAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GrayT20, author = {John M. Gray and Gurvirender P. Tejay}, title = {Introducing virtue ethics concepts into the decision processes of information systems trusted workers: a Delphi study}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103997}, doi = {10.1504/IJICS.2020.103997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GrayT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaGC20, author = {Shashank Gupta and Brij B. Gupta and Pooja Chaudhary}, title = {Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based {OSN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {147--180}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105153}, doi = {10.1504/IJICS.2020.105153}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GuptaGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaS20, author = {Alka Gupta and Lalit Sen Sharma}, title = {A categorical survey of state-of-the-art intrusion detection system-\emph{Snort}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {337--356}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109481}, doi = {10.1504/IJICS.2020.109481}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HafsaSMMM20, author = {Amal Hafsa and Anissa Sghaier and Medien Zeghid and Jihene Malek and Mohsen Machhout}, title = {An improved co-designed {AES-ECC} cryptosystem for secure data transmission}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {118--140}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108145}, doi = {10.1504/IJICS.2020.108145}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HafsaSMMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hamza20, author = {Lamia Hamza}, title = {Intruder model for generating attack scenarios in computer systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {428--443}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109486}, doi = {10.1504/IJICS.2020.109486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hamza20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JanQ20, author = {Saeed Ullah Jan and Fawad Qayum}, title = {An authentication scheme for distributed computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {227--248}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108858}, doi = {10.1504/IJICS.2020.108858}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JanQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JauroY20, author = {Suleiman Salihu Jauro and Raghav Yadav}, title = {An efficient interior and exterior boundary detection-based two level iris segmentation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {97--117}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108129}, doi = {10.1504/IJICS.2020.108129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JauroY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KantharajuM20, author = {Handenahalli Channareddy Kantharaju and K. N. Narasimha Murthy}, title = {An energy efficient authentication scheme based on hierarchical {IBDS} and {EIBDS} in grid-based wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {48--72}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108127}, doi = {10.1504/IJICS.2020.108127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KantharajuM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KapadiaP20, author = {Amishi Mahesh Kapadia and Nithyanandam Pandian}, title = {Reversible data hiding methods in integer wavelet transform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {70--89}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104001}, doi = {10.1504/IJICS.2020.104001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KapadiaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhanOAMY20, author = {Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Farhat Anwar and Roohie Naaz Mir and Mashkuri Yaacob}, title = {Scrutinising internet banking security solutions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {269--302}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105180}, doi = {10.1504/IJICS.2020.105180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhanOAMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarKK20, author = {P. M. Ashok Kumar and D. Kavitha and S. Arun Kumar}, title = {A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {253--268}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105179}, doi = {10.1504/IJICS.2020.105179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LamkucheP20, author = {Hemraj Shobharam Lamkuche and Dhanya Pramod}, title = {{CSL:} {FPGA} implementation of lightweight block cipher for power-constrained devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {349--377}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105185}, doi = {10.1504/IJICS.2020.105185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LamkucheP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MahantaK20, author = {Hridoy Jyoti Mahanta and Ajoy Kumar Khan}, title = {A secured modular exponentiation for {RSA} and {CRT-RSA} with dual blinding to resist power analysis attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {112--129}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105187}, doi = {10.1504/IJICS.2020.105187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MahantaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MaiPHC20, author = {Guizhen Mai and Shuiguo Peng and Yinghan Hong and Pinghua Chen}, title = {Fast causal division for supporting robust causal discovery}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {289--308}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109478}, doi = {10.1504/IJICS.2020.109478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MaiPHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MerzougAH20, author = {Assia Merzoug and Adda Ali{-}Pacha and Naima Hadj{-}Said}, title = {New chaotic cryptosystem for the image encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {450--463}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107452}, doi = {10.1504/IJICS.2020.107452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MerzougAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MirchevM20, author = {Mircho Mirchev and Seferin Mirtchev}, title = {System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {309--321}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109479}, doi = {10.1504/IJICS.2020.109479}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MirchevM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohanE20, author = {Lija Mohan and M. Sudheep Elayidom}, title = {Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {141--165}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108839}, doi = {10.1504/IJICS.2020.108839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohanE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohindruSB20, author = {Vandana Mohindru and Yashwant Singh and Ravindara Bhatt}, title = {Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {217--233}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105174}, doi = {10.1504/IJICS.2020.105174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohindruSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MukherjeeS20, author = {Srilekha Mukherjee and Goutam Sanyal}, title = {Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {130--146}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105188}, doi = {10.1504/IJICS.2020.105188}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MukherjeeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Olakanmi20, author = {Oladayo Olufemi Olakanmi}, title = {{SAPMS:} a secure and anonymous parking management system for autonomous vehicles}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {20--39}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103996}, doi = {10.1504/IJICS.2020.103996}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Olakanmi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PintoJK20, author = {Joey Pinto and Pooja Jain and Tapan Kumar}, title = {Fault prediction for distributed computing Hadoop clusters using real-time higher order differential inputs to {SVM:} Zedacross}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {181--198}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105155}, doi = {10.1504/IJICS.2020.105155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PintoJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajagopalKP20, author = {A. Rajagopal and K. Karibasappa and K. S. Vasundara Patel}, title = {Study of {LDPC} decoders with quadratic residue sequence for communication system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {18--31}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108122}, doi = {10.1504/IJICS.2020.108122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajagopalKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RameshPE20, author = {Dharavath Ramesh and Rashmi Priya Sharma and Damodar Reddy Edla}, title = {{HHDSSC:} harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {322--336}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109480}, doi = {10.1504/IJICS.2020.109480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RameshPE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahooG20, author = {Somya Ranjan Sahoo and Brij B. Gupta}, title = {Fake profile detection in multimedia big data on online social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {303--331}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105181}, doi = {10.1504/IJICS.2020.105181}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SahooG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SainiPS20, author = {Natasha Saini and Nitin Pandey and Ajeet Pal Singh}, title = {Developing malevolent node-based protection system against jamming attack in agent assisted {CRN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {73--96}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108128}, doi = {10.1504/IJICS.2020.108128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SainiPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sekhavat20, author = {Yoones A. Sekhavat}, title = {{CFM:} collusion-free model of privacy preserving frequent itemset mining}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {249--267}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109476}, doi = {10.1504/IJICS.2020.109476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sekhavat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShrivastavaP20, author = {Sonika Shrivastava and Rajesh Kumar Pateriya}, title = {Data encoding and cost optimised distribution for efficient and secure storage in cloud federation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {396--410}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109484}, doi = {10.1504/IJICS.2020.109484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShrivastavaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghAAS20, author = {Indu Singh and Nikhil Arora and Shivam Arora and Parteek Singhal}, title = {Fuzzy {ARM} and cluster analysis for database intrusion detection and prevention}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {372--395}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109483}, doi = {10.1504/IJICS.2020.109483}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghAAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SuriV20, author = {Shelza Suri and Ritu Vijay}, title = {A coupled map lattice-based image encryption approach using {DNA} and bi-objective genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {199--216}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105156}, doi = {10.1504/IJICS.2020.105156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SuriV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThakkarP20, author = {Ankit Thakkar and Kajol Patel}, title = {{VIKAS:} a new virtual keyboard-based simple and efficient text {CAPTCHA} verification scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {90--105}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104003}, doi = {10.1504/IJICS.2020.104003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThakkarP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/UshaKMSV20, author = {Usha Gopal and Kannimuthu Subramanian and P. D. Mahendiran and Anusha Kadambari Shanker and Deepti Venugopal}, title = {Static analysis method for detecting cross site scripting vulnerabilities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {32--47}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108123}, doi = {10.1504/IJICS.2020.108123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/UshaKMSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VinothkannaSP20, author = {R. Vinothkanna and S. Sivakannan and N. Prabakaran}, title = {A novel {GAAC} optimisation algorithm for multimodal fusion score decision making in secured biometric systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {3--17}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108113}, doi = {10.1504/IJICS.2020.108113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VinothkannaSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangYGW20, author = {Chundong Wang and Lei Yang and Hao Guo and Fujin Wan}, title = {Data protection and provenance in cloud of things environment: research challenges}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {416--435}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107449}, doi = {10.1504/IJICS.2020.107449}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangYGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangZL20, author = {Chundong Wang and Tong Zhao and Zheli Liu}, title = {An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {397--415}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107448}, doi = {10.1504/IJICS.2020.107448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XieWGJH20, author = {Xin Xie and Jianan Wang and Songlin Ge and Nan Jiang and Fengping Hu}, title = {An improved spatial-temporal correlation algorithm combined with compressed sensing and {LEACH} protocol in WSNs}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {383--396}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107447}, doi = {10.1504/IJICS.2020.107447}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XieWGJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YacoubaOE20, author = {Kouraogo Yacouba and Ghizlane Orhanou and Said Elhajji}, title = {Advanced security of two-factor authentication system using stego {QR} code}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {436--449}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107451}, doi = {10.1504/IJICS.2020.107451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YacoubaOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YadavTRP20, author = {Anil Yadav and Anurag Tripathi and Nitin Rakesh and Sujata Pandey}, title = {Protecting composite IoT server by secure secret key exchange for {XEN} intra virtual machines}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {53--69}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104000}, doi = {10.1504/IJICS.2020.104000}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YadavTRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangLL20, author = {Jianmin Zhang and Hua Li and Jian Li}, title = {An improved key pre-distribution scheme based on the security level classification of keys for wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {40--52}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103999}, doi = {10.1504/IJICS.2020.103999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhaoWZL20, author = {Jian{-}Feng Zhao and Shu{-}Ying Wang and Li{-}Tao Zhang and Xian{-}Feng Li}, title = {Image encryption scheme based on a novel fractional order compound chaotic attractor}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {166--186}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108847}, doi = {10.1504/IJICS.2020.108847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhaoWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AgarkarA19, author = {Aarti Amod Agarkar and Himanshu Agrawal}, title = {Lightweight R-LWE-based privacy preservation scheme for smart grid network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {233--254}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099433}, doi = {10.1504/IJICS.2019.099433}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AgarkarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AhujaB19, author = {Rakesh Ahuja and Sarabjeet Singh Bedi}, title = {Video watermarking scheme based on {IDR} frames using {MPEG-2} structure}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {585--603}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103065}, doi = {10.1504/IJICS.2019.103065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AhujaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-Saraireh19, author = {Ja'afer Al{-}Saraireh}, title = {A novel approach for query over encrypted data in database}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {621--636}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103083}, doi = {10.1504/IJICS.2019.103083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-Saraireh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW19, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang and Xing Li}, title = {On mapping of address and port using translation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {214--232}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099419}, doi = {10.1504/IJICS.2019.099419}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BrownA19, author = {Adam J. Brown and Todd R. Andel}, title = {What's in your honeypot: a privacy compliance perspective}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {289--309}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099443}, doi = {10.1504/IJICS.2019.099443}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BrownA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CarterT19, author = {Henry Carter and Patrick Traynor}, title = {Outsourcing computation for private function evaluation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {525--561}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103052}, doi = {10.1504/IJICS.2019.103052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CarterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DeviS19, author = {B. S. Kiruthika Devi and T. Subbulakshmi}, title = {Cloud-based DDoS attack detection and defence system using statistical approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {447--475}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101935}, doi = {10.1504/IJICS.2019.101935}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DeviS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Elngar19, author = {Ahmed A. Elngar}, title = {An efficient user authentication model for IOT-based healthcare environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {431--446}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101932}, doi = {10.1504/IJICS.2019.101932}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Elngar19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Faraoun19, author = {Kamel Mohamed Faraoun}, title = {A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {61--82}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096849}, doi = {10.1504/IJICS.2019.096849}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Faraoun19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Fredj19, author = {Ouissem Ben Fredj}, title = {{SPHERES:} an efficient server-side web application protection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {33--60}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096848}, doi = {10.1504/IJICS.2019.096848}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Fredj19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HuXWTY19, author = {Xiaoming Hu and Huajie Xu and Jian Wang and WenAn Tan and Yinchun Yang}, title = {A generic construction of identity-based proxy signature scheme in the standard model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {83--100}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096850}, doi = {10.1504/IJICS.2019.096850}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HuXWTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeerthikaM19, author = {V. Keerthika and Nandagopal Malarvizhi}, title = {Mitigate black hole attack using bee optimised weighted trust with {AODV} in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {275--288}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099437}, doi = {10.1504/IJICS.2019.099437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeerthikaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhanOAMN19, author = {Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Farhat Anwar and Roohie Naaz Mir and Athaur Rahman Najeeb}, title = {A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {332--354}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101908}, doi = {10.1504/IJICS.2019.101908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhanOAMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhemissaTB19, author = {Hamza Khemissa and Djamel Tandjaoui and Samia Bouzefrane}, title = {An efficient authentication and key agreement scheme for e-health applications in the context of internet of things}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {355--390}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101926}, doi = {10.1504/IJICS.2019.101926}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhemissaTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiZ19, author = {Jiaying Li and Baowen Zhang}, title = {An ontology-based approach to improve access policy administration of attribute-based access control}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {391--412}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101928}, doi = {10.1504/IJICS.2019.101928}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ManikandasaranA19, author = {S. S. Manikandasaran and Lawrence Arockiam and P. D. Sheba Kezia Malarchelvi}, title = {MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {1--16}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096846}, doi = {10.1504/IJICS.2019.096846}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ManikandasaranA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MuTL19, author = {Sheng{-}dong Mu and Yixiang Tian and Yiwei Luo}, title = {A study of the internet financial interest rate risk evaluation index system in cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {103--119}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098198}, doi = {10.1504/IJICS.2019.098198}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MuTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NishaP19, author = {T. N. Nisha and Dhanya Pramod}, title = {Sequential pattern analysis for event-based intrusion detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {476--492}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101936}, doi = {10.1504/IJICS.2019.101936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NishaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RasheedNGF19, author = {Mohammad M. Rasheed and Norita Md Norwawi and Osman Ghazali and Munadil K. Faaeq}, title = {Detection algorithm for internet worms scanning that used user datagram protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {17--32}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096847}, doi = {10.1504/IJICS.2019.096847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RasheedNGF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RevaneshSA19, author = {M. Revanesh and V. Sridhar and John M. Acken}, title = {{CB-ALCA:} a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {637--662}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103108}, doi = {10.1504/IJICS.2019.103108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RevaneshSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sajedi19, author = {Hedieh Sajedi}, title = {An ensemble algorithm for discovery of malicious web pages}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {203--213}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099408}, doi = {10.1504/IJICS.2019.099408}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sajedi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaB19, author = {Kirti Sharma and Shobha Bhatt}, title = {{SQL} injection attacks - a systematic review}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {493--509}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101937}, doi = {10.1504/IJICS.2019.101937}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZ19, author = {Jaryn Shen and Qingkai Zeng}, title = {{CSPS:} catchy short passwords making offline and online attacks impossible}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {255--274}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099434}, doi = {10.1504/IJICS.2019.099434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VenkateswarluK19, author = {Isunuri Bala Venkateswarlu and Jagadeesh Kakarla}, title = {Password security by encryption using an extended {ADFGVX} cipher}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {510--523}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101938}, doi = {10.1504/IJICS.2019.101938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VenkateswarluK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangXWH19, author = {Haixing Wang and Guiping Xiao and Zhen Wei and Tao Hai}, title = {Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {160--177}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098204}, doi = {10.1504/IJICS.2019.098204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangXWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangY19, author = {Xiaolei Wang and Yuexiang Yang}, title = {PrivacyContext: identifying malicious mobile privacy leak using program context}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {562--584}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103054}, doi = {10.1504/IJICS.2019.103054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XuSLMWLY19, author = {He Xu and Weiwei Shen and Peng Li and Keith Mayes and Ruchuan Wang and Dashen Li and Shengxiang Yang}, title = {Novel implementation of defence strategy of relay attack based on cloud in {RFID} systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {120--144}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098199}, doi = {10.1504/IJICS.2019.098199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XuSLMWLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YagoubKB19, author = {Mohammed Amine Yagoub and Okba Kazar and Mounir Beggas}, title = {A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {413--430}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101931}, doi = {10.1504/IJICS.2019.101931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YagoubKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YangJW19, author = {Su Yang and Shen Junwei and Wang Wei}, title = {Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {145--159}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098201}, doi = {10.1504/IJICS.2019.098201}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YangJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YingyingH19, author = {Mao Yingying and Yuan Hao}, title = {Study on data fuzzy breakpoint detection in massive dynamic data flow}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {604--620}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103074}, doi = {10.1504/IJICS.2019.103074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YingyingH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YoussefNR19, author = {Ben Charhi Youssef and Mannane Nada and Boubker Regragui}, title = {Behavioural analysis approach for {IDS} based on attack pattern and risk assessment in cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {315--331}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101907}, doi = {10.1504/IJICS.2019.101907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YoussefNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangLH19, author = {Xiao Zhang and Shengli Liu and Shuai Han}, title = {Proofs of retrievability from linearly homomorphic structure-preserving signatures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {178--202}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098205}, doi = {10.1504/IJICS.2019.098205}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AmitaKK18, author = {Amita and Amandeep Kaur and Marut Kumar}, title = {Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {261--275}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012572}, doi = {10.1504/IJICS.2018.10012572}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmitaKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AzeemCDRR18, author = {Muhammad Azeem and Yongquan Cai and Allah Ditta and Khurram Gulzar Rana and Faheem Akhtar Rajpoot}, title = {Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {437--453}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095357}, doi = {10.1504/IJICS.2018.095357}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AzeemCDRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW18, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang}, title = {An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid {RSA} for the future internet architectures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {63--79}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10005506}, doi = {10.1504/IJICS.2018.10005506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW18a, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang and Xing Li}, title = {Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {418--436}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095341}, doi = {10.1504/IJICS.2018.095341}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GoreDPE18, author = {Ross Gore and Saikou Y. Diallo and Jose J. Padilla and Barry Ezell}, title = {Assessing cyber-incidents using machine learning}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {341--360}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095298}, doi = {10.1504/IJICS.2018.095298}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GoreDPE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaG18, author = {Shashank Gupta and Brij Bhooshan Gupta}, title = {Robust injection point-based framework for modern applications against {XSS} vulnerabilities in online social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {170--200}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012568}, doi = {10.1504/IJICS.2018.10012568}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GuptaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HotaSS18, author = {H. S. Hota and Dinesh K. Sharma and Akhilesh Kumar Shrivas}, title = {Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {80--101}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010649}, doi = {10.1504/IJICS.2018.10010649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HotaSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JainG18, author = {Ankit Kumar Jain and Brij B. Gupta}, title = {Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {398--417}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095303}, doi = {10.1504/IJICS.2018.095303}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JainG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KarNK18, author = {Dulal C. Kar and Anusha Madhuri Nakka and Ajay K. Katangur}, title = {A new statistical attack resilient steganography scheme for hiding messages in audio files}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {276--302}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012578}, doi = {10.1504/IJICS.2018.10012578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KarNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarSB18, author = {C. Pavan Kumar and R. Selvakumar and Raghunadh K. Bhattar}, title = {Reliable and secure communication using fundamental cut-sets and fundamental circuits}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {41--62}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010648}, doi = {10.1504/IJICS.2018.10010648}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiS18, author = {Shaojing Li and Wanli Su}, title = {The research of reputation incentive mechanism of {P2P} network file sharing system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {149--169}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012570}, doi = {10.1504/IJICS.2018.10012570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohindruS18, author = {Vandana Mohindru and Yashwant Singh}, title = {Node authentication algorithm for securing static wireless sensor networks from node clone attack}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {129--148}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012571}, doi = {10.1504/IJICS.2018.10012571}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohindruS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoonR18, author = {Sunil K. Moon and Rajeshree D. Raut}, title = {Innovative data security model using forensic audio video steganography for improving hidden data security and robustness}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {374--397}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095300}, doi = {10.1504/IJICS.2018.095300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoonR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoumniFT18, author = {Soufiane El Moumni and Mohamed Fettach and Abderrahim Tragha}, title = {High frequency implementation of cryptographic hash function Keccak-512 on {FPGA} devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {361--373}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095299}, doi = {10.1504/IJICS.2018.095299}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoumniFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PalR18, author = {Arup Kumar Pal and Soumitra Roy}, title = {A robust and blind image watermarking scheme in {DCT} domain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {321--340}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095296}, doi = {10.1504/IJICS.2018.095296}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PathakRC18, author = {Sanchita Pathak and Ratnakirti Roy and Suvamoy Changder}, title = {Performance analysis of image steganalysis techniques and future research directives}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {1--24}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010646}, doi = {10.1504/IJICS.2018.10010646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PathakRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaSPT18, author = {Rohit Raja and Tilendra Shishir Sinha and Raj Kumar Patra and Shrikant Tiwari}, title = {Physiological trait-based biometrical authentication of human-face using {LGXP} and {ANN} techniques}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {303--320}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012575}, doi = {10.1504/IJICS.2018.10012575}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaSPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajendranD18, author = {Sujarani Rajendran and Manivannan Doraipandian}, title = {A nonlinear two dimensional logistic-tent map for secure image communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {201--215}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012577}, doi = {10.1504/IJICS.2018.10012577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajendranD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RoyP18, author = {Soumitra Roy and Arup Kumar Pal}, title = {A robust reversible image watermarking scheme in {DCT} domain using Arnold scrambling and histogram modification}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {216--236}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012576}, doi = {10.1504/IJICS.2018.10012576}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RoyP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShafiqYL18, author = {Muhammad Shafiq and Xiangzhan Yu and Asif Ali Laghari}, title = {WeChat traffic classification using machine learning algorithms and comparative analysis of datasets}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {109--128}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012574}, doi = {10.1504/IJICS.2018.10012574}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShafiqYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SongZ18, author = {Lihua Song and Xiaofeng Zhang}, title = {Improved pixel relevance based on Mahalanobis distance for image segmentation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {237--247}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012573}, doi = {10.1504/IJICS.2018.10012573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SongZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SumanaH18, author = {M. Sumana and K. S. Hareesha}, title = {Modelling a secure support vector machine classifier for private data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {25--40}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010647}, doi = {10.1504/IJICS.2018.10010647}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SumanaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SunZJ18, author = {Yujuan Sun and Xiaofeng Zhang and Muwei Jian}, title = {3D reconstruction of human face from an input image under random lighting condition}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {248--260}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012569}, doi = {10.1504/IJICS.2018.10012569}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SunZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-JarrahAJ17, author = {Omar M. Al{-}Jarrah and Moath Al{-}Ayoub and Yaser Jararweh}, title = {Hierarchical detection of insider attacks in cloud computing systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {85--99}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003601}, doi = {10.1504/IJICS.2017.10003601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-JarrahAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Alsaghier17, author = {Hisham M. Alsaghier}, title = {A secure mobile commerce framework based on community cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {100--113}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003604}, doi = {10.1504/IJICS.2017.10003604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Alsaghier17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnushaS17, author = {K. Anusha and E. Sathiyamoorthy}, title = {{MAM-ISSIDS:} multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {361--386}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008448}, doi = {10.1504/IJICS.2017.10008448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnushaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AroraT17, author = {Vasudha Arora and Shyam Sunder Tyagi}, title = {Update enabled multi-keyword searchable encryption scheme for secure data outsourcing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {288--301}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008445}, doi = {10.1504/IJICS.2017.10008445}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AroraT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DabirAM17, author = {Abes Dabir and AbdelRahman Abdou and Ashraf Matrawy}, title = {A survey on forensic event reconstruction systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {337--360}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008447}, doi = {10.1504/IJICS.2017.10008447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DabirAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DjellabB17, author = {Rima Djellab and Mohamed Benmohammed}, title = {A novel quantum distributed key management protocol for ring-organised group}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {302--323}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10004329}, doi = {10.1504/IJICS.2017.10004329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DjellabB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaMB17, author = {Amit Kr. Gupta and Jyotsna Kumar Mandal and Indrajit Bhattacharya}, title = {Mitigating selfish, blackhole and wormhole attacks in {DTN} in a secure, cooperative way}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {130--155}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003609}, doi = {10.1504/IJICS.2017.10003609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JaiswalG17, author = {Shruti Jaiswal and Daya Gupta}, title = {Security engineering methods - in-depth analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {180--211}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005903}, doi = {10.1504/IJICS.2017.10005903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JaiswalG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KasanaSB17, author = {Geeta Kasana and Kulbir Singh and Satvinder Singh Bhatia}, title = {Data hiding using lifting scheme and genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {271--287}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008444}, doi = {10.1504/IJICS.2017.10008444}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KasanaSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Khan17, author = {Arif Khan}, title = {Virtual machine security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {49--84}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003599}, doi = {10.1504/IJICS.2017.10003599}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Khan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Manasrah17, author = {Ahmad M. Manasrah}, title = {Dynamic weighted {VM} load balancing for cloud-analyst}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {5--19}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003596}, doi = {10.1504/IJICS.2017.10003596}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Manasrah17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MenesidouK17, author = {Sofia{-}Anna Menesidou and Vasilios Katos}, title = {Opportunistic key management in delay tolerant networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {212--228}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005904}, doi = {10.1504/IJICS.2017.10005904}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MenesidouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Montasari17, author = {Reza Montasari}, title = {A standardised data acquisition process model for digital forensic investigations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {229--249}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005908}, doi = {10.1504/IJICS.2017.10005908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Montasari17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RangasamyKKV17, author = {Jothi Rangasamy and Lakshmi Kuppusamy and Gopi Krishnan and Velmurugan}, title = {Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {114--129}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003606}, doi = {10.1504/IJICS.2017.10003606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RangasamyKKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaniB17, author = {Prathuri Jhansi Rani and S. Durga Bhavani}, title = {Keyed hash function using Bernoulli shift map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {250--270}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005909}, doi = {10.1504/IJICS.2017.10005909}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaniB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TawalbehAJA17, author = {Lo'ai Ali Tawalbeh and Fadi Ababneh and Yaser Jararweh and Fahd M. Al{-}Dosari}, title = {Trust delegation-based secure mobile cloud computing framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {36--48}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003598}, doi = {10.1504/IJICS.2017.10003598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TouaziOBB17, author = {Djoudi Touazi and Mawloud Omar and Abdelhakim Bendib and Abdelmadjid Bouabdallah}, title = {A trust-based approach for securing data communication in delay tolerant networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {324--336}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008446}, doi = {10.1504/IJICS.2017.10008446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TouaziOBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZearSK17, author = {Aditi Zear and Amit Kumar Singh and Pardeep Kumar}, title = {Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {20--35}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003597}, doi = {10.1504/IJICS.2017.10003597}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZearSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZengCX17, author = {Lei Zeng and Hui Chen and Yang Xiao}, title = {Accountable administration in operating systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {157--179}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005900}, doi = {10.1504/IJICS.2017.10005900}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZengCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Ammayappan16, author = {Kavitha Ammayappan}, title = {Formally verified {TSM} centric privacy preserving {NFC} mobile payment framework and protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {181--204}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078126}, doi = {10.1504/IJICS.2016.078126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Ammayappan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BabuIRSN16, author = {M. Swagath Babu and G. Idayachandran and A. Rajesh and T. Shankar and Rangaswamy Nakkeeran}, title = {Investigation on defected ground-plane structures to improve isolation and correlation in multi-band {MIMO} antenna}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {258--271}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079186}, doi = {10.1504/IJICS.2016.079186}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BabuIRSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BeloucifNN16, author = {Assia Beloucif and Oussama Noui and Lemnouar Noui}, title = {Design of a tweakable image encryption algorithm using chaos-based schema}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {205--220}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079183}, doi = {10.1504/IJICS.2016.079183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BeloucifNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CS16, author = {Pramod T. C and N. R. Sunitha}, title = {Key pre-distribution schemes to support various architectural deployment models in {WSN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {139--157}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078124}, doi = {10.1504/IJICS.2016.078124}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DhavaleDPP16, author = {Sunita Vikrant Dhavale and Rajendra S. Deodhar and Debasish Pradhan and L. M. Patnaik}, title = {A robust zero watermarking algorithm for stereo audio signals}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {330--346}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001268}, doi = {10.1504/IJICS.2016.10001268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DhavaleDPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GayathriS16, author = {J. Gayathri and S. Subashini}, title = {A survey on security and efficiency issues in chaotic image encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {347--381}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001271}, doi = {10.1504/IJICS.2016.10001271}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GayathriS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GhalebZR16, author = {Fuad A. Ghaleb and Anazida Zainal and Murad A. Rassam}, title = {Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {221--240}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079184}, doi = {10.1504/IJICS.2016.079184}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GhalebZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GhebghoubOB16, author = {Yasmina Ghebghoub and Saliha Oukid and Omar Boussaid}, title = {An {MDA} approach to secure access to data on cloud using implicit security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {107--120}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078120}, doi = {10.1504/IJICS.2016.078120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GhebghoubOB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GnanambigaiR16, author = {J. Gnanambigai and N. Rengarajan}, title = {A novel approach to enhance the network lifetime for hybrid routing protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {95--106}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078117}, doi = {10.1504/IJICS.2016.078117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GnanambigaiR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Kisore16, author = {N. Raghu Kisore}, title = {A qualitative framework for evaluating buffer overflow protection mechanisms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {272--307}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079187}, doi = {10.1504/IJICS.2016.079187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Kisore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OuadaOBT16, author = {Farah{-}Sarah Ouada and Mawloud Omar and Abdelmadjid Bouabdallah and Abdelkamel Tari}, title = {Lightweight identity-based authentication protocol for wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {121--138}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078123}, doi = {10.1504/IJICS.2016.078123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OuadaOBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PhadikarJPM16, author = {Amit Phadikar and Poulami Jana and Baisakhi Sur Phadikar and Goutam Kumar Maity}, title = {Reversible watermarking using channel coding and lifting for cultural heritage and medical image}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {34--54}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075308}, doi = {10.1504/IJICS.2016.075308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PhadikarJPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PraherS16, author = {Christian Praher and Michael Sonntag}, title = {Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {72--91}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075311}, doi = {10.1504/IJICS.2016.075311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PraherS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaboinaRKV16, author = {RajaSekhar Rajaboina and P. Chenna Reddy and Raja Ashok Kumar and Nangil Venkatramana}, title = {Performance comparison of TCP, {UDP} and {TFRC} in static wireless environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {158--180}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078125}, doi = {10.1504/IJICS.2016.078125}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaboinaRKV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahayiniM16, author = {T. Sahayini and M. S. K. Manikandan}, title = {Enhancing the security of modern {ICT} systems with multimodal biometric cryptosystem and continuous user authentication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {55--71}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075310}, doi = {10.1504/IJICS.2016.075310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahayiniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahooT16, author = {Anoop Jyoti Sahoo and Rajesh Kumar Tiwari}, title = {A novel approach for hiding secret data in program files}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075305}, doi = {10.1504/IJICS.2016.075305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahooT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sood16, author = {Sandeep K. Sood}, title = {Advanced dynamic identity-based authentication protocol using smart card}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {11--33}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075307}, doi = {10.1504/IJICS.2016.075307}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sood16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TripathiS16, author = {Anshu Tripathi and Umesh Kumar Singh}, title = {Application of quantitative security measurement model for prioritisation of vulnerability mitigation: a real case study}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {309--329}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001267}, doi = {10.1504/IJICS.2016.10001267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TripathiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VeeramreddyV16, author = {Jyothsna Veeramreddy and Rama Prasad V. Vaddella}, title = {Anomaly-based network intrusion detection through assessing feature association impact scale}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {241--257}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079185}, doi = {10.1504/IJICS.2016.079185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VeeramreddyV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangJL16, author = {Shengzhi Zhang and Xiaoqi Jia and Peng Liu}, title = {Towards service continuity for transactional applications via diverse device drivers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {382--400}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001273}, doi = {10.1504/IJICS.2016.10001273}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CurranMH15, author = {Kevin Curran and Vivian Maynes and Declan Harkin}, title = {Mobile device security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069205}, doi = {10.1504/IJICS.2015.069205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CurranMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhouryT15, author = {Rapha{\"{e}}l Khoury and Nadia Tawbi}, title = {Equivalence-preserving corrective enforcement of security properties}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {113--139}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073011}, doi = {10.1504/IJICS.2015.073011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhouryT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarM15, author = {Rakesh Kumar and Geetu Mahajan}, title = {A novel framework for secure file transmission using modified {AES} and {MD5} algorithms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {91--112}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073012}, doi = {10.1504/IJICS.2015.073012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Mahoney15, author = {William R. Mahoney}, title = {Modifications to {GCC} for increased software privacy}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {160--176}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073024}, doi = {10.1504/IJICS.2015.073024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Mahoney15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MantasSGJG15, author = {Georgios Mantas and Natalia Stakhanova and Hugo Gonzalez and Hossein Hadian Jazi and Ali A. Ghorbani}, title = {Application-layer denial of service attacks: taxonomy and survey}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {216--239}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073028}, doi = {10.1504/IJICS.2015.073028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MantasSGJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NiuZXY15, author = {Lei Niu and Changqing Zhang and Qi Xia and Yong Yu}, title = {Advanced security analysis of a signature scheme with message recovery}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {39--48}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069212}, doi = {10.1504/IJICS.2015.069212}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/NiuZXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OlaniyiAOO15, author = {Olayemi M. Olaniyi and Oladiran T. Arulogun and Oluwasayo E. Omidiora and Oladotun Olusola Okediran}, title = {Implementing generic security requirements in e-voting using modified stegano-cryptographic approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {64--90}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069214}, doi = {10.1504/IJICS.2015.069214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OlaniyiAOO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Pan15, author = {Jonathan Pan}, title = {Data leakage triage: quantitative measure of effectiveness of containment plan}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {240--254}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073032}, doi = {10.1504/IJICS.2015.073032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Pan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PrasanthB15, author = {Narayanan Prasanth and Kannan Balasubramanian}, title = {Performance analysis of buffered crossbar switch scheduling algorithms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {49--63}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069208}, doi = {10.1504/IJICS.2015.069208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PrasanthB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RoySC15, author = {Ratnakirti Roy and Shabnam Samima and Suvamoy Changder}, title = {A map-based image steganography scheme for {RGB} images}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {196--215}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073026}, doi = {10.1504/IJICS.2015.073026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RoySC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThangavelVMN15, author = {M. Thangavel and P. Varalakshmi and Mukund Murrali and K. Nithya}, title = {Secure file storage and retrieval in cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {177--195}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073025}, doi = {10.1504/IJICS.2015.073025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThangavelVMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangR15, author = {Peng Wang and Chinya V. Ravishankar}, title = {Hierarchical policy delegation in multiple-authority {ABE}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {140--159}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073020}, doi = {10.1504/IJICS.2015.073020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XuLM15, author = {Haixia Xu and Bao Li and Qixiang Mei}, title = {Complementary witness soundness for witness indistinguishable proof system and {CCA2} public-key encryption schemes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {14--38}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069211}, doi = {10.1504/IJICS.2015.069211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XuLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlEroudKSH14, author = {Ahmed Aleroud and George Karabatis and Prayank Sharma and Peng He}, title = {Context and semantics for detection of cyber attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {63--92}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059791}, doi = {10.1504/IJICS.2014.059791}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlEroudKSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AliA14, author = {Syed Taqi Ali and B. B. Amberker}, title = {Attribute-based group signature without random oracles with attribute anonymity}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {109--132}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065162}, doi = {10.1504/IJICS.2014.065162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AliA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AngamuthuR14, author = {Muthulakshmi Angamuthu and Anitha Ramalingam}, title = {Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {286--305}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066661}, doi = {10.1504/IJICS.2014.066661}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AngamuthuR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ArogundadeJY14, author = {Oluwasefunmi 'Tale Arogundade and Zhi Jin and Xiaoguang Yang}, title = {Towards ontological approach to eliciting risk-based security requirements}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {143--178}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065168}, doi = {10.1504/IJICS.2014.065168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ArogundadeJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BagadeT14, author = {Anant M. Bagade and Sanjay N. Talbar}, title = {Secure transmission of morphed stego keys over internet using {IP} steganography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {133--142}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065164}, doi = {10.1504/IJICS.2014.065164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BagadeT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Choi14, author = {Hyunjun Choi}, title = {Image encryption method for depth + texture video contents}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {333--343}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068093}, doi = {10.1504/IJICS.2014.068093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Choi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DasCGD14, author = {Suvrojit Das and Debayan Chatterjee and Debidas Ghosh and Narayan C. Debnath}, title = {Extracting the system call identifier from within {VFS:} a kernel stack parsing-based approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {12--50}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059786}, doi = {10.1504/IJICS.2014.059786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DasCGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/FerragNG14, author = {Mohamed Amine Ferrag and Mehdi Nafa and Salim Ghanemi}, title = {{SDPP:} an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {241--269}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066650}, doi = {10.1504/IJICS.2014.066650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/FerragNG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/IsmailMN14, author = {Ismahani Binti Ismail and Muhammad Nadzir Marsono and Sulaiman Mohd Nor}, title = {Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {179--197}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065173}, doi = {10.1504/IJICS.2014.065173}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/IsmailMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KangKJK14, author = {Yong Ho Kang and Kimoon Keum and Changbok Jang and Joo Man Kim}, title = {Study of mobile virtualisation-based security technology for smartwork environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {311--321}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068095}, doi = {10.1504/IJICS.2014.068095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KangKJK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KimH14, author = {Man Ki Kim and You Sik Hong}, title = {Development {AI} traffic-safety system using {RFID} technique and {USN} theory}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {322--332}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068098}, doi = {10.1504/IJICS.2014.068098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KimH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KuppuswamyA14, author = {Prakash Kuppuswamy and Saeed Q. Y. Al{-}Khalidi}, title = {Hybrid encryption/decryption technique using new public key and symmetric key algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {372--382}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068103}, doi = {10.1504/IJICS.2014.068103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KuppuswamyA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Lee14, author = {Kyujin Lee}, title = {An iterative layered interference canceller scheme for {OFDM} in wireless mesh security networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {344--353}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068094}, doi = {10.1504/IJICS.2014.068094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MangleP14, author = {Andrew Mangle and Sandip C. Patel}, title = {Issues in user authentication using security questions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {383--407}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068100}, doi = {10.1504/IJICS.2014.068100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MangleP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaB14, author = {P. M. Siva Raja and E. Baburaj}, title = {Genetic algorithms based data hiding scheme for digital images with {LSBMR}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {51--62}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059787}, doi = {10.1504/IJICS.2014.059787}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Rasheed14, author = {Hassan Rasheed}, title = {Vulnerability distribution scoring for software product security assessment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {270--285}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066653}, doi = {10.1504/IJICS.2014.066653}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Rasheed14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SakthivelVK14, author = {R. Sakthivel and M. Vanitha and Harish M. Kittur}, title = {Low power high throughput reconfigurable stream cipher hardware {VLSI} architectures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059785}, doi = {10.1504/IJICS.2014.059785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SakthivelVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZSL14, author = {Limin Shen and Futai Zhang and Yinxia Sun and Sujuan Li}, title = {Cryptanalysis and improvement on a certificateless encryption scheme in the standard model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {354--371}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068104}, doi = {10.1504/IJICS.2014.068104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TsitroulisLT14, author = {Achilleas Tsitroulis and Dimitris Lampoudis and Emmanuel Tsekleves}, title = {Exposing {WPA2} security protocol vulnerabilities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {93--107}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059797}, doi = {10.1504/IJICS.2014.059797}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TsitroulisLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VinodLGC14, author = {P. Vinod and Vijay Laxmi and Manoj Singh Gaur and Grijesh Chauhan}, title = {Detecting malicious files using non-signature-based methods}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {199--240}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066646}, doi = {10.1504/IJICS.2014.066646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-HaijaB13, author = {Qasem Abu Al{-}Haija and Ahmad Al Badawi}, title = {Cost-effective design for binary Edwards elliptic curves crypto-processor over {GF} (2\({}^{\mbox{N}}\)) using parallel multipliers and architectures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {3}, pages = {236--250}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.055840}, doi = {10.1504/IJICS.2013.055840}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-HaijaB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-khassawenehT13, author = {Mahmood Al{-}khassaweneh and Shefa Tawalbeh}, title = {A value transformation and random permutation-based coloured image encryption technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {290--300}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058212}, doi = {10.1504/IJICS.2013.058212}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-khassawenehT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AouinatouB13, author = {Rkia Aouinatou and Mostafa Belkasmi}, title = {On the conventional public key in identification-based encryption: the case of {RSA}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {3}, pages = {171--201}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.055837}, doi = {10.1504/IJICS.2013.055837}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AouinatouB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Ma13, author = {Zhanshan Ma}, title = {First passage time and first passage percolation models for analysing network resilience and effective strategies in strategic information warfare research: a brief survey and perspective}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {334--358}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058219}, doi = {10.1504/IJICS.2013.058219}, timestamp = {Sun, 11 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Ma13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MahajanK13, author = {Manish Mahajan and Navdeep Kaur}, title = {Steganography in coloured images using wavelet domain-based saliency map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {3}, pages = {224--235}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.055839}, doi = {10.1504/IJICS.2013.055839}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MahajanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NatwichaiLK13, author = {Juggapong Natwichai and Xue Li and Asanee Kawtrakul}, title = {Incremental processing and indexing for (k, e)-anonymisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {3}, pages = {151--170}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.055836}, doi = {10.1504/IJICS.2013.055836}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/NatwichaiLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SanthiTA13, author = {V. Santhi and Arunkumar Thangavelu and Pachiyappan Arulmozhivarman}, title = {Adaptive visible watermarking in Hadamard domain for digital images}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {3}, pages = {202--223}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.055838}, doi = {10.1504/IJICS.2013.055838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SanthiTA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaGZMS13, author = {Anup C. Sharma and Robin A. Gandhi and Qiuming Zhu and William R. Mahoney and William L. Sousan}, title = {A social dimensional cyber threat model with formal concept analysis and fact-proposition inference}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {301--333}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058213}, doi = {10.1504/IJICS.2013.058213}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaGZMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TeoA13, author = {Lawrence Teo and Gail{-}Joon Ahn}, title = {Extensible policy framework for heterogeneous network environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {251--274}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058210}, doi = {10.1504/IJICS.2013.058210}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TeoA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TripathiS13, author = {Anshu Tripathi and Umesh Kumar Singh}, title = {Evaluation of severity index of vulnerability categories}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {275--289}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058211}, doi = {10.1504/IJICS.2013.058211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TripathiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Bernardo12, author = {Danilo Valeros Bernardo}, title = {Security risk assessment: toward a comprehensive practical risk management}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {2}, pages = {77--104}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051775}, doi = {10.1504/IJICS.2012.051775}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Bernardo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GaoMJY12, author = {Haichang Gao and Licheng Ma and Wei Jia and Fei Ye}, title = {Multiple password interference in graphical passwords}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {11--27}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051078}, doi = {10.1504/IJICS.2012.051078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GaoMJY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hedabou12, author = {Mustapha Hedabou}, title = {Securing pairing-based cryptography on smartcards}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {68--76}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051091}, doi = {10.1504/IJICS.2012.051091}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hedabou12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MehtaVN12, author = {Sachin Mehta and Vijayaraghavan Varadharajan and Rajarathnam Nallusamy}, title = {Tampering resistant self recoverable watermarking method using error correction codes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {28--47}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051089}, doi = {10.1504/IJICS.2012.051089}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MehtaVN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PanF12, author = {Jonathan Pan and Chun Che Fung}, title = {An agent-based model to simulate coordinated response to malware outbreak within an organisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {2}, pages = {115--131}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051777}, doi = {10.1504/IJICS.2012.051777}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PanF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SalamL12, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {On the algebraic attack against summation type keystream generators}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {2}, pages = {132--149}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051778}, doi = {10.1504/IJICS.2012.051778}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SalamL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SubramanianSRL12, author = {Vimalathithan Subramanian and Remzi Seker and Srini Ramaswamy and Rathinasamy B. Lenin}, title = {{PCIEF:} a policy conflict identification and evaluation framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {48--67}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051090}, doi = {10.1504/IJICS.2012.051090}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SubramanianSRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VesalF12, author = {Somayeh Naderi Vesal and Mohammad Fathian}, title = {Efficient and secure credit card payment protocol for mobile devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {2}, pages = {105--114}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051776}, doi = {10.1504/IJICS.2012.051776}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VesalF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XuLG12, author = {Zhongqiu Xu and Liangju Li and Haibo Gao}, title = {Bandwidth efficient buyer-seller watermarking protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {1}, pages = {1--10}, year = {2012}, url = {https://doi.org/10.1504/IJICS.2012.051079}, doi = {10.1504/IJICS.2012.051079}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XuLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-khassaweneh11, author = {Mahmood Al{-}khassaweneh}, title = {Image encryption method based on using least square error techniques at the decryption stage}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {4}, pages = {332--344}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.044823}, doi = {10.1504/IJICS.2011.044823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-khassaweneh11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Desoky11, author = {Abdelrahman Desoky}, title = {Sumstega: summarisation-based steganography methodology}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {234--263}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040182}, doi = {10.1504/IJICS.2011.040182}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Desoky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GaaloulPZCG11, author = {Khaled Gaaloul and Henderik Alex Proper and Ehtesham Zahoor and Fran{\c{c}}ois Charoy and Claude Godart}, title = {A logical framework for reasoning about delegation policies in workflow management systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {4}, pages = {365--388}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.044825}, doi = {10.1504/IJICS.2011.044825}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GaaloulPZCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HuL11, author = {Defa Hu and Juanjuan Luo}, title = {Digital fingerprinting: problems and solutions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {4}, pages = {316--331}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.044822}, doi = {10.1504/IJICS.2011.044822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JinA11, author = {Jing Jin and Gail{-}Joon Ahn}, title = {Assured resource sharing in Grid environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {215--233}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040181}, doi = {10.1504/IJICS.2011.040181}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JinA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KarthigaikumarB11, author = {P. Karthigaikumar and K. Baskaran and K. Jaraline Kirubavathy}, title = {Low power implementation of audio watermarking using chirp spread spectrum technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {199--214}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040180}, doi = {10.1504/IJICS.2011.040180}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KarthigaikumarB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Ma11, author = {Zhanshan (Sam) Ma}, title = {Frailty modelling for risk analysis in network security and survivability}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {276--294}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040184}, doi = {10.1504/IJICS.2011.040184}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Ma11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Oladayo11, author = {Oladayo Olufemi Olakanmi}, title = {RC42's innovative way for data security in wireless data communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {3}, pages = {264--275}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.040183}, doi = {10.1504/IJICS.2011.040183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Oladayo11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Rrushi11, author = {Julian L. Rrushi}, title = {Anomaly detection via statistical learning in industrial communication networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {4}, pages = {295--315}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.044821}, doi = {10.1504/IJICS.2011.044821}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Rrushi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SodiyaAO11, author = {Adesina S. Sodiya and A. Afolorunso and Omoniyi Paul Ogunderu}, title = {A countermeasure algorithm for password guessing attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {4}, pages = {345--364}, year = {2011}, url = {https://doi.org/10.1504/IJICS.2011.044824}, doi = {10.1504/IJICS.2011.044824}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SodiyaAO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AtluriGSV10, author = {Vijayalakshmi Atluri and Qi Guo and Heechang Shin and Jaideep Vaidya}, title = {A unified index structure for efficient enforcement of spatiotemporal authorisations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {2}, pages = {118--151}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.034814}, doi = {10.1504/IJICS.2010.034814}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AtluriGSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Awasthi10, author = {Amit K. Awasthi}, title = {Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {24--29}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031857}, doi = {10.1504/IJICS.2010.031857}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Awasthi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChiouCY10, author = {Che Wun Chiou and Fu{-}Hua Chou and Yun{-}Chi Yeh}, title = {Speeding up Euclid's {GCD} algorithm with no magnitude comparisons}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {1--8}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031855}, doi = {10.1504/IJICS.2010.031855}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChiouCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Desoky10, author = {Abdelrahman Desoky}, title = {Comprehensive linguistic steganography survey}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {2}, pages = {164--197}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.034816}, doi = {10.1504/IJICS.2010.034816}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Desoky10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hu10, author = {Shiyan Hu}, title = {A secure partition-based document image watermarking scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {9--23}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031856}, doi = {10.1504/IJICS.2010.031856}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HuL10, author = {Defa Hu and Qiaoliang Li}, title = {Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {2}, pages = {152--163}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.034815}, doi = {10.1504/IJICS.2010.034815}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HuL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Ma10, author = {Zhanshan (Sam) Ma}, title = {An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {76--97}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031860}, doi = {10.1504/IJICS.2010.031860}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Ma10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/QinA10, author = {Li Qin and Vijayalakshmi Atluri}, title = {Semantics-aware security policy specification for the semantic web data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {52--75}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031859}, doi = {10.1504/IJICS.2010.031859}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/QinA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangWCZ10, author = {Ping Wang and Lei Wu and Ryan Cunningham and Cliff C. Zou}, title = {Honeypot detection in advanced botnet attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {30--51}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031858}, doi = {10.1504/IJICS.2010.031858}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangWCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WoodallB10, author = {Philip Woodall and Pearl Brereton}, title = {A systematic literature review of inference strategies}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {2}, pages = {99--117}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.034813}, doi = {10.1504/IJICS.2010.034813}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WoodallB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/0001S09, author = {Sanjay Rawat and Ashutosh Saxena}, title = {Application security code analysis: a step towards software assurance}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {1}, pages = {86--110}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.026622}, doi = {10.1504/IJICS.2009.026622}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/0001S09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BertolissiF09, author = {Clara Bertolissi and Maribel Fern{\'{a}}ndez}, title = {Distributed event-based access control}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {306--320}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031042}, doi = {10.1504/IJICS.2009.031042}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BertolissiF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Cuppens-Boulahia09, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Herv{\'{e}} Debar}, title = {An ontology-based approach to react to network attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {280--305}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031041}, doi = {10.1504/IJICS.2009.031041}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DewanDB09, author = {Prashant Dewan and Partha Dasgupta and Amiya Bhattacharya}, title = {Mitigating routing vulnerabilities in ad hoc networks using reputations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {2}, pages = {150--172}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.028811}, doi = {10.1504/IJICS.2009.028811}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DewanDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElhdhiliAK09, author = {Mohamed Elhoucine Elhdhili and Lamia Ben Azzouz and Farouk Kamoun}, title = {REputation based Clustering Algorithm for security management in ad hoc networks with liars}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {228--244}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031032}, doi = {10.1504/IJICS.2009.031032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ElhdhiliAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HietTMM09, author = {Guillaume Hiet and Val{\'{e}}rie Viet Triem Tong and Ludovic M{\'{e}} and Benjamin Morin}, title = {Policy-based intrusion detection in web applications by monitoring Java information flows}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {265--279}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031040}, doi = {10.1504/IJICS.2009.031040}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HietTMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HuCKSC09, author = {Hongbing Hu and Yu Chen and Wei{-}Shinn Ku and Zhou Su and Chung{-}Han Chen}, title = {Weighted trust evaluation-based malicious node detection for wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {2}, pages = {132--149}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.028810}, doi = {10.1504/IJICS.2009.028810}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HuCKSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KallelCMJS09, author = {Slim Kallel and Anis Charfi and Mira Mezini and Mohamed Jmaiel and Andreas Sewe}, title = {A holistic approach for access control policies: from formal specification to aspect-based enforcement}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {337--354}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031044}, doi = {10.1504/IJICS.2009.031044}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KallelCMJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LongW09, author = {Men Long and Chwan{-}Hwa John Wu}, title = {Design and simulation on data-forwarding security in sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {2}, pages = {173--194}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.028812}, doi = {10.1504/IJICS.2009.028812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LongW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LoulouJM09, author = {Monia Loulou and Mohamed Jmaiel and Mohamed Mosbah}, title = {Dynamic security framework for mobile agent systems: specification, verification and enforcement}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {321--336}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031043}, doi = {10.1504/IJICS.2009.031043}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LoulouJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MostafaKF09, author = {Mahmoud Mostafa and Anas Abou El Kalam and Christian Fraboul}, title = {A new protocol for security and QoS in {IP} networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {245--264}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031038}, doi = {10.1504/IJICS.2009.031038}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MostafaKF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NicolDO09, author = {David M. Nicol and Charles M. Davis and Thomas J. Overbye}, title = {A testbed for power system security evaluation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {2}, pages = {114--131}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.028809}, doi = {10.1504/IJICS.2009.028809}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NicolDO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NikamA09, author = {Shankar Bhausaheb Nikam and Suneeta Agarwal}, title = {Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {1}, pages = {1--46}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.026619}, doi = {10.1504/IJICS.2009.026619}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NikamA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Renaud09, author = {Karen Renaud}, title = {Guidelines for designing graphical authentication mechanism interfaces}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {1}, pages = {60--85}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.026621}, doi = {10.1504/IJICS.2009.026621}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Renaud09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WuLHI09, author = {Chwan{-}Hwa John Wu and Tong Liu and Chun{-}Ching Andy Huang and J. David Irwin}, title = {Modelling and simulations for Identity-Based Privacy-Protected Access Control Filter {(IPACF)} capability to resist massive denial of service attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {2}, pages = {195--223}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.028813}, doi = {10.1504/IJICS.2009.028813}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WuLHI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YangMZ09, author = {Min Yang and Qingshu Meng and Huanguo Zhang}, title = {The evolutionary design of trace form bent functions in cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {1}, pages = {47--59}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.026620}, doi = {10.1504/IJICS.2009.026620}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YangMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-AhmadiRW08, author = {Mohammad Saad Al{-}Ahmadi and Peter A. Rosen and Rick L. Wilson}, title = {Data mining performance on perturbed databases: important influences on classification accuracy}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {1}, pages = {71--85}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.016822}, doi = {10.1504/IJICS.2008.016822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-AhmadiRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-Somani08, author = {Turki F. Al{-}Somani}, title = {Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {3}, pages = {250--267}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.020605}, doi = {10.1504/IJICS.2008.020605}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-Somani08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChakrabortyGMS08, author = {Anindya Chakraborty and Manoj K. Garg and Arun K. Majumdar and Shamik Sural}, title = {Attack recovery from malicious transactions in distributed database systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {2}, pages = {197--217}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.018519}, doi = {10.1504/IJICS.2008.018519}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChakrabortyGMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KantarciogluK08, author = {Murat Kantarcioglu and Onur Kardes}, title = {Privacy-preserving data mining in the malicious model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {4}, pages = {353--375}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.022488}, doi = {10.1504/IJICS.2008.022488}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KantarciogluK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhelladiCBB08, author = {Lyes Khelladi and Yacine Challal and Abdelmadjid Bouabdallah and Nadjib Badache}, title = {On security issues in embedded systems: challenges and solutions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {2}, pages = {140--174}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.018515}, doi = {10.1504/IJICS.2008.018515}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhelladiCBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LinW08, author = {Chien{-}Chuan Lin and Ming{-}Shi Wang}, title = {Genetic-clustering algorithm for intrusion detection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {2}, pages = {218--234}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.018521}, doi = {10.1504/IJICS.2008.018521}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LinW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuT08, author = {Wei Lu and Issa Traor{\'{e}}}, title = {Unsupervised anomaly detection using an evolutionary extension of k-means algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {2}, pages = {107--139}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.018513}, doi = {10.1504/IJICS.2008.018513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LuT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MavridisMPKI08, author = {Ioannis Mavridis and Andreas K. Mattas and Ioannis Pagkalos and Isabella Kotini and Christos Ilioudis}, title = {Supporting dynamic administration of {RBAC} in web-based collaborative applications during run-time}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {4}, pages = {328--352}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.022487}, doi = {10.1504/IJICS.2008.022487}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MavridisMPKI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MukherjeeCG08, author = {Shibnath Mukherjee and Zhiyuan Chen and Aryya Gangopadhyay}, title = {A fuzzy programming approach for data reduction and privacy in distance-based mining}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {1}, pages = {27--47}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.016820}, doi = {10.1504/IJICS.2008.016820}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MukherjeeCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ParameswaranB08, author = {Rupa Parameswaran and Douglas M. Blough}, title = {Privacy preserving data obfuscation for inherently clustered data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {1}, pages = {4--26}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.016819}, doi = {10.1504/IJICS.2008.016819}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ParameswaranB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RiceGG08, author = {Daniel O. Rice and Robert S. Garfinkel and Ram D. Gopal}, title = {{CVC-STAR:} Protecting data confidentiality while increasing flexibility and quality of responses}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {2}, pages = {175--196}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.018517}, doi = {10.1504/IJICS.2008.018517}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RiceGG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SaxenaS08, author = {Amitabh Saxena and Ben Soh}, title = {One-Way Signature Chaining: a new paradigm for group cryptosystems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {3}, pages = {268--296}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.020606}, doi = {10.1504/IJICS.2008.020606}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SaxenaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghLA08, author = {Aameek Singh and Ling Liu and Mustaque Ahamad}, title = {Privacy analysis and enhancements for data sharing in *nix systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {4}, pages = {376--410}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.022489}, doi = {10.1504/IJICS.2008.022489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghLA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TingFT08, author = {Daniel Ting and Stephen E. Fienberg and Mario Trottini}, title = {Random orthogonal matrix masking methodology for microdata release}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {1}, pages = {86--105}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.016823}, doi = {10.1504/IJICS.2008.016823}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/TingFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VenkataramPBM08, author = {Pallapa Venkataram and Jeremy Pitt and B. Sathish Babu and Ebrahim Mamdani}, title = {An intelligent proactive security system for cyber centres using Cognitive Agents}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {3}, pages = {235--249}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.020604}, doi = {10.1504/IJICS.2008.020604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VenkataramPBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Wang0XZ08, author = {Jie Wang and Jun Zhang and Shuting Xu and Weijun Zhong}, title = {A novel data distortion approach via selective {SSVD} for privacy protection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {1}, pages = {48--70}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.016821}, doi = {10.1504/IJICS.2008.016821}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Wang0XZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WeiASPZF08, author = {Huaqiang Wei and Jim Alves{-}Foss and Terence Soule and Hugh Pforsich and Du Zhang and Deborah A. Frincke}, title = {A Layered Decision Model for cost-effective system security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {3}, pages = {297--324}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.020607}, doi = {10.1504/IJICS.2008.020607}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WeiASPZF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Zuo08, author = {Yanjun Zuo}, title = {Prompt damage identification for system survivability}, journal = {Int. J. Inf. Comput. Secur.}, volume = {2}, number = {4}, pages = {411--433}, year = {2008}, url = {https://doi.org/10.1504/IJICS.2008.022490}, doi = {10.1504/IJICS.2008.022490}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Zuo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AliO07, author = {Khidir M. Ali and Thomas J. Owens}, title = {Selection of an {EAP} authentication method for a {WLAN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {210--233}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012251}, doi = {10.1504/IJICS.2007.012251}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AliO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AtluriC07, author = {Vijayalakshmi Atluri and Soon Ae Chun}, title = {A geotemporal role-based authorisation system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {143--168}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012247}, doi = {10.1504/IJICS.2007.012247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AtluriC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AwasthiK07, author = {Lalit Kumar Awasthi and Prashant Kumar}, title = {A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {298--314}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013957}, doi = {10.1504/IJICS.2007.013957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AwasthiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Bolan07, author = {Christopher Bolan}, title = {Radio Frequency Identification: a review of low cost tag security proposals}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {391--399}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015500}, doi = {10.1504/IJICS.2007.015500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Bolan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChangC07, author = {Ya{-}Fen Chang and Chin{-}Chen Chang}, title = {An RSA-based (t, n) threshold proxy signature scheme with freewill identities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {201--209}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012250}, doi = {10.1504/IJICS.2007.012250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DamianiBP07, author = {Maria Luisa Damiani and Elisa Bertino and Paolo Perlasca}, title = {Data security in location-aware applications: an approach based on {RBAC}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {5--38}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012243}, doi = {10.1504/IJICS.2007.012243}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DamianiBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DuLW07, author = {Timon C. Du and Eldon Y. Li and Jacqueline W. Wong}, title = {Document access control in organisational workflows}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {437--454}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015504}, doi = {10.1504/IJICS.2007.015504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DuLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HelmerWSHMWWS07, author = {Guy G. Helmer and Johnny Wong and Mark Slagell and Vasant G. Honavar and Les Miller and Yanxin Wang and Xia Wang and Natalia Stakhanova}, title = {Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {109--142}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012246}, doi = {10.1504/IJICS.2007.012246}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HelmerWSHMWWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hutchinson07, author = {William Hutchinson}, title = {An information-centric and proactive approach to Information Security teaching}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {369--377}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015498}, doi = {10.1504/IJICS.2007.015498}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hutchinson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/IndrakantiVA07, author = {Sarath Indrakanti and Vijay Varadharajan and Ritesh Agarwal}, title = {On the design, implementation and application of an authorisation architecture for web services}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {64--108}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012245}, doi = {10.1504/IJICS.2007.012245}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/IndrakantiVA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JansenGS07, author = {Wayne A. Jansen and Serban I. Gavrila and Cl{\'{e}}ment S{\'{e}}veillac}, title = {Smart Cards for mobile devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {400--413}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015501}, doi = {10.1504/IJICS.2007.015501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JansenGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JohnsonS07, author = {Robert Johnson and Jessica Staddon}, title = {Deflation-secure web metering}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {39--63}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012244}, doi = {10.1504/IJICS.2007.012244}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JohnsonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Kondakci07, author = {Suleyman Kondakci}, title = {A new assessment and improvement model of risk propagation in information security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {341--366}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013959}, doi = {10.1504/IJICS.2007.013959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Kondakci07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LuiHY07, author = {Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Accountability in organisations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {237--255}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013954}, doi = {10.1504/IJICS.2007.013954}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LuiHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PirzadaM07, author = {Asad Amir Pirzada and Chris McDonald}, title = {Collaborative Dynamic Source Routing using transitional trust filters}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {278--297}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013956}, doi = {10.1504/IJICS.2007.013956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PirzadaM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PyeW07, author = {Graeme Pye and Matthew J. Warren}, title = {E-business security benchmarking: a model and framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {378--390}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015499}, doi = {10.1504/IJICS.2007.015499}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PyeW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/StakhanovaBW07, author = {Natalia Stakhanova and Samik Basu and Johnny Wong}, title = {A taxonomy of intrusion response systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {169--184}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012248}, doi = {10.1504/IJICS.2007.012248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/StakhanovaBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Valli07, author = {Craig Valli}, title = {Honeypot technologies and their applicability as a strategic internal countermeasure}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {430--436}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015503}, doi = {10.1504/IJICS.2007.015503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Valli07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Wang0L07, author = {Alex Hai Wang and Peng Liu and Lunquan Li}, title = {Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {315--340}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013958}, doi = {10.1504/IJICS.2007.013958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Wang0L07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangSM07, author = {Chiou{-}Pirng Wang and Don Snyder and Kathaleena Monds}, title = {A conceptual framework for curbing the epidemic of information malice: e-hygiene model with a human-factor approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {455--465}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015505}, doi = {10.1504/IJICS.2007.015505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Williams07, author = {Patricia A. H. Williams}, title = {Medical data security: Are you informed or afraid?}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {414--429}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015502}, doi = {10.1504/IJICS.2007.015502}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Williams07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YangY07, author = {Lili Yang and Shuang{-}Hua Yang}, title = {A framework of security and safety checking for internet-based control systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {185--200}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012249}, doi = {10.1504/IJICS.2007.012249}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YangY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YuSG07, author = {Zhen Yu and William Sears and Yong Guan}, title = {PeerCredential: a reputation-based trust framework for Peer-to-Peer applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {3}, pages = {256--277}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.013955}, doi = {10.1504/IJICS.2007.013955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YuSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.