Search dblp for Publications

export results for "stream:streams/journals/ijics:"

 download as .bib file

@article{DBLP:journals/ijics/BhagwatP24,
  author       = {Laxmi Bhagwat and
                  Balaji Patil},
  title        = {Behavioural analysis and results of malware and ransomware using optimal
                  behavioural feature set},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {57--78},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.136719},
  doi          = {10.1504/IJICS.2024.136719},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/BhagwatP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhondeD24,
  author       = {Aparna Bhonde and
                  Satish R. Devane},
  title        = {Priority-based security-aware virtual machine allocation policy},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {40--56},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.136715},
  doi          = {10.1504/IJICS.2024.136715},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/BhondeD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuXSL24,
  author       = {Junlin Gu and
                  Yihan Xu and
                  Juan Sun and
                  Weiwei Liu},
  title        = {Image tampering detection based on feature consistency attention},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.136704},
  doi          = {10.1504/IJICS.2024.136704},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GuXSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarCK24,
  author       = {Devender Kumar and
                  Satish Chand and
                  Bijendra Kumar},
  title        = {A secure three-factor authentication protocol for mobile networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {119--138},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.137716},
  doi          = {10.1504/IJICS.2024.137716},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LarikWKSMA24,
  author       = {Raja Sohail Ahmed Larik and
                  Yongli Wang and
                  Irfan Ali Kandhro and
                  Nabila Sehito and
                  Ghulam Ali Mallah and
                  Fayyaz Ali},
  title        = {Trilinear pairing-based cryptosystem authentication: for electronic
                  health record security in healthcare system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {139--162},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.137717},
  doi          = {10.1504/IJICS.2024.137717},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LarikWKSMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuongD24,
  author       = {Tran Thi Luong and
                  Linh Hoang Dinh},
  title        = {On generating new key dependent {XOR} tables to improve {AES} security
                  and evaluating the randomness of the output of block ciphers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {16--39},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.136710},
  doi          = {10.1504/IJICS.2024.136710},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/LuongD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Nagunwa24,
  author       = {Thomas Nagunwa},
  title        = {AI-driven approach for robust real-time detection of zero-day phishing
                  websites},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {79--118},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.136735},
  doi          = {10.1504/IJICS.2024.136735},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/Nagunwa24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NahnahC24,
  author       = {Oussama Nahnah and
                  Sarra Cherbal},
  title        = {{SLAK:} secure lightweight scheme for authentication and key-agreement
                  in internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {200--226},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.137741},
  doi          = {10.1504/IJICS.2024.137741},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NahnahC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaP24,
  author       = {Payal Sharma and
                  B. R. Purushothama},
  title        = {User driven general framework to cap the joins in secure group communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {190--199},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.137722},
  doi          = {10.1504/IJICS.2024.137722},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TangYGQ24,
  author       = {Chenghua Tang and
                  Mengmeng Yang and
                  Qingze Gao and
                  Baohua Qiang},
  title        = {{PBDG:} a malicious code detection method based on precise behaviour
                  dependency graph},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {163--189},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.137719},
  doi          = {10.1504/IJICS.2024.137719},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TangYGQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AbebeSK23,
  author       = {Abiy Tadesse Abebe and
                  Yalemzewd Negash Shiferaw and
                  P. G. V. Suresh Kumar},
  title        = {Lightweight integrated cryptosystem based on reconfigurable hardware
                  for IoT security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {323--353},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135895},
  doi          = {10.1504/IJICS.2023.135895},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AbebeSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AbhilashA23,
  author       = {M. H. Abhilash and
                  B. B. Amberker},
  title        = {Dynamic group signature scheme using ideal lattices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {60--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133366},
  doi          = {10.1504/IJICS.2023.133366},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AbhilashA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AgarwalK23,
  author       = {Ruchi Agarwal and
                  Manoj Kumar},
  title        = {A privacy preserving scheme for encrypted medical images using {RDH}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {436--452},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135919},
  doi          = {10.1504/IJICS.2023.135919},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AgarwalK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlmehdharAR23,
  author       = {Mohammed Almehdhar and
                  Mohammed M. Abdelsamea and
                  Na Ruan},
  title        = {Deep multi-locality convolutional neural network for DDoS detection
                  in smart home IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {453--474},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135902},
  doi          = {10.1504/IJICS.2023.135902},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Amith0MHES23,
  author       = {K. K. Amith and
                  H. A. Sanjay and
                  Ajay Mahadevan and
                  K. Harshita and
                  D. Eshwar and
                  K. Aditya Shastry},
  title        = {Performance driven Hyperledger Fabric-based blockchain framework for
                  mass e-voting in India},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {109--134},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131094},
  doi          = {10.1504/IJICS.2023.131094},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Amith0MHES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ArcaH23,
  author       = {Sevgi Arca and
                  Rattikorn Hewett},
  title        = {Data privacy with heuristic anonymisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {104--132},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052968},
  doi          = {10.1504/IJICS.2023.10052968},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ArcaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzeezS23,
  author       = {Nureni Ayofe Azeez and
                  Odejinmi Oluwatobi Samuel},
  title        = {A cyberstalking-free global network with artificial intelligence approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {82--108},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131096},
  doi          = {10.1504/IJICS.2023.131096},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzeezS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzharYC23,
  author       = {Muhammad Kashif Azhar and
                  Bin Yao and
                  Zhongpu Chen},
  title        = {Enriching blockchain with spatial keyword query processing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {91--116},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133369},
  doi          = {10.1504/IJICS.2023.133369},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzharYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BaruahDB23,
  author       = {Bikash Baruah and
                  Manash Pratim Dutta and
                  Dhruba K. Bhattacharyya},
  title        = {An effective ensemble method for missing data imputation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {295--314},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10047377},
  doi          = {10.1504/IJICS.2022.10047377},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BaruahDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Belkebir23,
  author       = {Djalila Belkebir},
  title        = {{DIP-QGA:} a secure and robust watermarking technique based on direct
                  image projection and quantum genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {221--247},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10038272},
  doi          = {10.1504/IJICS.2022.10038272},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Belkebir23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChanderG23,
  author       = {Bhanu Chander and
                  Kumaravelan Gopalakrishnan},
  title        = {Outlier detection in {WSN} with {SVDD} via multi-interpolation auto-encoder},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {28--59},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133368},
  doi          = {10.1504/IJICS.2023.133368},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChanderG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChatterjeeBB23,
  author       = {Debanjan Chatterjee and
                  Barnali Gupta Banik and
                  Abhinandan Banik},
  title        = {Attack resistant chaos-based cryptosystem by modified baker map and
                  logistic map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {48--83},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052966},
  doi          = {10.1504/IJICS.2023.10052966},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ChatterjeeBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChenL23,
  author       = {Lijiao Chen and
                  Kewei Lv},
  title        = {Ciphertext-policy attribute-based delay encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {167--185},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134960},
  doi          = {10.1504/IJICS.2023.134960},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ChenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChithraA23,
  author       = {P. L. Chithra and
                  R. Aparna},
  title        = {Blockchain-based image encryption with spiral mapping and hashing
                  techniques in dual level security scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {185--204},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131100},
  doi          = {10.1504/IJICS.2023.131100},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChithraA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DaveBP23,
  author       = {Jay Dave and
                  Meghna Bhatt and
                  Deep Pancholi},
  title        = {Secure proof of ownership for deduplicated cloud storage system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {205--228},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131097},
  doi          = {10.1504/IJICS.2023.131097},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DaveBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DemighaH23,
  author       = {Oualid Demigha and
                  Nabil Haddad},
  title        = {Formal verification of software-only mechanisms for live migration
                  of {SGX} enclaves},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {230--261},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134965},
  doi          = {10.1504/IJICS.2023.134965},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/DemighaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DingXCFLH23,
  author       = {Zhenquan Ding and
                  Hui Xu and
                  Lei Cui and
                  Haiqiang Fei and
                  Yongji Liu and
                  Zhiyu Hao},
  title        = {{HEMC:} a dynamic behaviour analysis system for malware based on hardware
                  virtualisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {390--410},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135899},
  doi          = {10.1504/IJICS.2023.135899},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/DingXCFLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DixitC23,
  author       = {Veer Sain Dixit and
                  Akanksha Bansal Chopra},
  title        = {Push and nuke attacks detection using {DNN-HHO} algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {248--268},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10040154},
  doi          = {10.1504/IJICS.2022.10040154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DixitC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/EmaraAZ23,
  author       = {Sherif F. Emara and
                  Sayed Abdelhady and
                  M. Zaki},
  title        = {A novel traceback model for DDoS attacks using modified Floyd-Warshall
                  algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {84--103},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052967},
  doi          = {10.1504/IJICS.2023.10052967},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/EmaraAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaAS23,
  author       = {Sunil Gupta and
                  Pradeep Kumar Arya and
                  Hitesh Kumar Sharma},
  title        = {User anonymity-based secure authentication protocol for telemedical
                  server systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {199--219},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10040155},
  doi          = {10.1504/IJICS.2022.10040155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaBSS23,
  author       = {Sunil Gupta and
                  Akansha Bansiya and
                  Mansi Saini and
                  Amuleek Sidhu},
  title        = {Blockchain-based {EHR} storage and access control system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {70--81},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131098},
  doi          = {10.1504/IJICS.2023.131098},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaBSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaG23,
  author       = {Sahil Gupta and
                  Naresh Kumar Garg},
  title        = {Data hiding in the optimal keyframes using circular shifting and mutation
                  operations for improvement in imperceptibility},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {158--175},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10047994},
  doi          = {10.1504/IJICS.2022.10047994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HegdeM23,
  author       = {Nayana Hegde and
                  Sunilkumar S. Manvi},
  title        = {Distributed integrity and non-repudiation scheme in the dynamic vehicular
                  cloud environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {315--348},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10042652},
  doi          = {10.1504/IJICS.2022.10042652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HegdeM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JayashreeK23,
  author       = {S. Jayashree and
                  S. V. N. Santhosh Kumar},
  title        = {A comprehensive survey on effective key management schemes for secured
                  authentication in vehicular ad hoc network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {354--376},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135897},
  doi          = {10.1504/IJICS.2023.135897},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/JayashreeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JoseNP23,
  author       = {Ancy Sherin Jose and
                  Latha R. Nair and
                  Varghese Paul},
  title        = {Tree derived feature importance and Bayesian optimisation for improved
                  multi-class classification of DDoS attacks in software defined networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {139--166},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134962},
  doi          = {10.1504/IJICS.2023.134962},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/JoseNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarK23,
  author       = {Dilip Kumar and
                  Manoj Kumar},
  title        = {Outsourcing decryption of {KP-ABE} using elliptic curve cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {210--229},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134961},
  doi          = {10.1504/IJICS.2023.134961},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarV23,
  author       = {Umesh Kumar and
                  Vadlamudi Ch. Venkaiah},
  title        = {A novel stream cipher based on quasigroups and {QG-PRNG}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {411--435},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135900},
  doi          = {10.1504/IJICS.2023.135900},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumariM23,
  author       = {Shipra Kumari and
                  Hrishikesh Mahato},
  title        = {Construction of weighted orthogonal matrices over finite field and
                  its application in cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {263--276},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135894},
  doi          = {10.1504/IJICS.2023.135894},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KumariM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LakelB23,
  author       = {Kheira Lakel and
                  Fatima Bendella},
  title        = {A bio-inspired algorithm for enhancing {DNA} cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {436--456},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132779},
  doi          = {10.1504/IJICS.2023.132779},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LakelB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MahajanNPKM23,
  author       = {Akanksha S. Mahajan and
                  Pradnya K. Navale and
                  Vaishnavi V. Patil and
                  Vijay M. Khadse and
                  Parikshit N. Mahalle},
  title        = {The hybrid framework of ensemble technique in machine learning for
                  phishing detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {162--184},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131099},
  doi          = {10.1504/IJICS.2023.131099},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MahajanNPKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MalhiS23,
  author       = {Yuvraj Singh Malhi and
                  Virendra Singh Shekhawat},
  title        = {Two-level machine learning driven intrusion detection model for IoT
                  environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {229--261},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132708},
  doi          = {10.1504/IJICS.2023.132708},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MalhiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MasadehAA23,
  author       = {Shadi Rasheed Masadeh and
                  Hamza Abbass Al{-}Sewadi and
                  Mohammed Abbas Fadhil Al{-}Husainy},
  title        = {A message encryption scheme inspired by Sudoku puzzle},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {399--413},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132739},
  doi          = {10.1504/IJICS.2023.132739},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MasadehAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MathurG23,
  author       = {Monika Mathur and
                  Nidhi Goel},
  title        = {{FPGA} implementation of {AES} encryptor based on rolled and masked
                  approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131090},
  doi          = {10.1504/IJICS.2023.131090},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MathurG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Mayayise23,
  author       = {Thembekile O. Mayayise},
  title        = {{BYOD} security issues and controls framework: an outcome of a systematic
                  literature review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {135--161},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131095},
  doi          = {10.1504/IJICS.2023.131095},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Mayayise23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MerabetH23,
  author       = {Hoda El Merabet and
                  Abderrahmane Hajraoui},
  title        = {Malware detection approach based on deep convolutional neural networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {145--157},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052974},
  doi          = {10.1504/IJICS.2023.10052974},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/MerabetH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MukherjeePBD23,
  author       = {Pratyusa Mukherjee and
                  Chittaranjan Pradhan and
                  Rabindra Kumar Barik and
                  Harishchandra Dubey},
  title        = {Emerging {DNA} cryptography-based encryption schemes: a review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {27--47},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10036907},
  doi          = {10.1504/IJICS.2022.10036907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MukherjeePBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NandhiniK23,
  author       = {U. Nandhini and
                  S. V. N. Santhosh Kumar},
  title        = {A comprehensive survey on fuzzy-based intelligent intrusion detection
                  system for internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {383--398},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132724},
  doi          = {10.1504/IJICS.2023.132724},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NandhiniK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Niu23,
  author       = {Jing Niu},
  title        = {Design of automatic monitoring system for network information security
                  in cloud computing environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {19--34},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131091},
  doi          = {10.1504/IJICS.2023.131091},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Niu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OdoomHS23,
  author       = {Justice Odoom and
                  Xiaofang Huang and
                  Richlove Samuel Soglo},
  title        = {JPBlock: augmenting security of current journal and paper publication
                  processes using blockchain and smart contract},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {262--292},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132733},
  doi          = {10.1504/IJICS.2023.132733},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OdoomHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PandeyK23,
  author       = {Jagdish Chandra Pandey and
                  Mala Kalra},
  title        = {An approach for secure data transmission in smart grids},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {348--365},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10044642},
  doi          = {10.1504/IJICS.2022.10044642},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PandeyK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatelMW23,
  author       = {N. D. Patel and
                  B. M. Mehtre and
                  Rajeev Wankar},
  title        = {Artificial neural network-based intrusion detection system using multi-objective
                  genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {320--335},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132726},
  doi          = {10.1504/IJICS.2023.132726},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatelMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatroA23,
  author       = {K. Abhimanyu Kumar Patro and
                  Bibhudendra Acharya},
  title        = {An efficient two-level image encryption system using chaotic maps},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {35--69},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131092},
  doi          = {10.1504/IJICS.2023.131092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatroA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PawarGJ23,
  author       = {Ankush Balaram Pawar and
                  Shashikant U. Ghumbre and
                  Rashmi M. Jogdand},
  title        = {Performance analysis of privacy preservation-based authentication
                  scheme and cryptographic-based data protocols for DSaC in cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {298--322},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135896},
  doi          = {10.1504/IJICS.2023.135896},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/PawarGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RamyaE23,
  author       = {S. P. Ramya and
                  Rajagopal Eswari},
  title        = {A shallow-based neural network model for fake news detection in social
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {360--382},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132727},
  doi          = {10.1504/IJICS.2023.132727},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RamyaE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RanjanS23,
  author       = {Ranjeet Kumar Ranjan and
                  Amit Singh},
  title        = {A comparative study of deep transfer learning models for malware classification
                  using image datasets},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {293--319},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132735},
  doi          = {10.1504/IJICS.2023.132735},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RanjanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RavvaS23,
  author       = {Santosh Kumar Ravva and
                  Sureddi R. M. Krishna},
  title        = {Cryptanalysis of common prime {RSA} with two decryption exponents:
                  Jochemsz and May approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {377--389},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135901},
  doi          = {10.1504/IJICS.2023.135901},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/RavvaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SalankarAP23,
  author       = {Pritam S. Salankar and
                  Vinay Avasthi and
                  Ashutosh Pasricha},
  title        = {Lightweight authentication scheme based on modified {EAP} security
                  for CoAP protocol-based IoMT applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {176--198},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10044087},
  doi          = {10.1504/IJICS.2022.10044087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SalankarAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SaravananB23,
  author       = {A. Saravanan and
                  S. Sathya Bama},
  title        = {CloudSec {(3FA):} a multifactor with dynamic click colour-based dynamic
                  authentication for securing cloud environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {269--294},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10043102},
  doi          = {10.1504/IJICS.2022.10043102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SaravananB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SelimiRV23,
  author       = {Synim Selimi and
                  Blerim Rexha and
                  Kamer Vishi},
  title        = {CyberNFTs: conceptualising a decentralised and reward-driven intrusion
                  detection system with {ML}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {117--138},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133385},
  doi          = {10.1504/IJICS.2023.133385},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SelimiRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SubramaniS23,
  author       = {Shalini Subramani and
                  Munuswamy Selvi},
  title        = {Comprehensive review on distributed denial of service attacks in wireless
                  sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {414--438},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10043105},
  doi          = {10.1504/IJICS.2022.10043105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SubramaniS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SubramaniS23a,
  author       = {Shalini Subramani and
                  Munuswamy Selvi},
  title        = {Intrusion detection system using {RBPSO} and fuzzy neuro-genetic classification
                  algorithms in wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {439--461},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10048818},
  doi          = {10.1504/IJICS.2022.10048818},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SubramaniS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SureshPB23,
  author       = {K. Suresh and
                  Rajarshi Pal and
                  S. R. Balasundaram},
  title        = {A stable cryptographic key generation from fingerprint biometrics
                  using Gray code for secure data storage},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {366--398},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10043107},
  doi          = {10.1504/IJICS.2022.10043107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SureshPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SutarTS23,
  author       = {Swapnil Sutar and
                  Vikas Tiwari and
                  Ajeet Singh},
  title        = {Implementation of a secret sharing-based masking scheme against side-channel
                  attack for ultra-lightweight ciphers in IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {336--359},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132725},
  doi          = {10.1504/IJICS.2023.132725},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SutarTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TasneemAHRD23,
  author       = {Zareen Tasneem and
                  Maria Afnan and
                  Md. Arman Hossain and
                  Md. Mahbubur Rahman and
                  Samrat Kumar Dey},
  title        = {Performance evaluation of various deep convolutional neural network
                  models through classification of malware},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {414--435},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132767},
  doi          = {10.1504/IJICS.2023.132767},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TasneemAHRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TiwariSTS23,
  author       = {Vikas Tiwari and
                  Ajeet Singh and
                  Appala Naidu Tentu and
                  Ashutosh Saxena},
  title        = {Generation of 8 {\texttimes} 8 S-boxes using 4 {\texttimes} 4 optimal
                  S-boxes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {3/4},
  pages        = {399--413},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10044644},
  doi          = {10.1504/IJICS.2022.10044644},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TiwariSTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/UthirapathyS23,
  author       = {Samson Ebenezar Uthirapathy and
                  Domnic Sandanam},
  title        = {Sentiment analysis in social network data using multilayer perceptron
                  neural network with hill-climbing meta-heuristic optimisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {277--297},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135892},
  doi          = {10.1504/IJICS.2023.135892},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/UthirapathyS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VermaD23,
  author       = {Anjani Kumar Verma and
                  Veer Sain Dixit},
  title        = {Collaborative filtering-based recommendations against shilling attacks
                  with particle swarm optimiser and entropy-based mean clustering},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {133--144},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052969},
  doi          = {10.1504/IJICS.2023.10052969},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/VermaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WeiSHWP23,
  author       = {Zihao Wei and
                  Siwei Sun and
                  Lei Hu and
                  Man Wei and
                  Ren{\'{e}} Peralta},
  title        = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\)
                  inverter - with applications to AES, Camellia and {SM4}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {1--26},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052962},
  doi          = {10.1504/IJICS.2023.10052962},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WuZG23,
  author       = {Zhijun Wu and
                  Chenlei Zhang and
                  Junjun Guo},
  title        = {A method of speech information hiding in inactive frame based on pitch
                  modulation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.133367},
  doi          = {10.1504/IJICS.2023.133367},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WuZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangBWW23,
  author       = {Lizhe Zhang and
                  Zhuoning Bai and
                  Zhijun Wu and
                  Kenian Wang},
  title        = {Unified identity authentication scheme of system wide information
                  management based on {SAML-PKI-LDAP}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {186--209},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.134959},
  doi          = {10.1504/IJICS.2023.134959},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangBWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Abdmeziem22,
  author       = {Mohammed Riyadh Abdmeziem},
  title        = {Securing IoT-based collaborative applications using a new compressed
                  and distributed {MIKEY} mode},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {36--56},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121290},
  doi          = {10.1504/IJICS.2022.121290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Abdmeziem22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AkramVL22,
  author       = {Junaid Akram and
                  Danish Vasan and
                  Ping Luo},
  title        = {Obfuscated code is identifiable by a token-based code clone detection
                  technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {254--273},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2020.10041659},
  doi          = {10.1504/IJICS.2020.10041659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AkramVL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlKhodaidiG22,
  author       = {Taghreed AlKhodaidi and
                  Adnan Gutub},
  title        = {Scalable shares generation to increase participants of counting-based
                  secret sharing technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {119--146},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121294},
  doi          = {10.1504/IJICS.2022.121294},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlKhodaidiG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlibrahimM22,
  author       = {Omar Al{-}Ibrahim and
                  Majid Malaika},
  title        = {Botract: abusing smart contracts and blockchain for botnet command
                  and control},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {147--163},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121295},
  doi          = {10.1504/IJICS.2022.121295},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AlibrahimM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Amraoui22,
  author       = {Asma Amraoui},
  title        = {On a secured channel selection in cognitive radio networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {262--277},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050307},
  doi          = {10.1504/IJICS.2022.10050307},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Amraoui22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Azab22,
  author       = {Ahmad Azab},
  title        = {The effectiveness of cost sensitive machine learning algorithms in
                  classifying Zeus flows},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {332--350},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122378},
  doi          = {10.1504/IJICS.2022.122378},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Azab22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BadhaniM22,
  author       = {Shikha Badhani and
                  Sunil Kumar Muttoo},
  title        = {GENDroid - a graph-based ensemble classifier for detecting Android
                  malware},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {327--347},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10046938},
  doi          = {10.1504/IJICS.2022.10046938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BadhaniM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BejandiTH22,
  author       = {Saba Malekpour Bejandi and
                  Mohammad Reza Taghva and
                  Payam Hanafizadeh},
  title        = {Applying swarm intelligence and data mining approach in detecting
                  online and digital theft},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {142--167},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10047488},
  doi          = {10.1504/IJICS.2022.10047488},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BejandiTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhandeB22,
  author       = {Premala Bhande and
                  Mohammed Bakhar},
  title        = {Enhanced ant colony-based {AODV} for analysis of black and gray hole
                  attacks in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {133--147},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122916},
  doi          = {10.1504/IJICS.2022.122916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhandeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Bi22,
  author       = {Suhong Bi},
  title        = {Multiple backup method of financial encrypted data on internet of
                  things platform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {199--209},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10044645},
  doi          = {10.1504/IJICS.2022.10044645},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Bi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BouafiaH22,
  author       = {Khedoudja Bouafia and
                  Lamia Hamza},
  title        = {Game theory approach for analysing attack graphs},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {305--320},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10052286},
  doi          = {10.1504/IJICS.2022.10052286},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/BouafiaH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BrookesDOT22,
  author       = {Scott Brookes and
                  Robert Denz and
                  Martin Osterloh and
                  Stephen Taylor},
  title        = {ExOShim: preventing memory disclosure using execute-only kernel code},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {57--82},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121291},
  doi          = {10.1504/IJICS.2022.121291},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BrookesDOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ByamukamaN22,
  author       = {Duncan{-}Allan Byamukama and
                  John Ngubiri},
  title        = {DDoS amplification attacks and impacts on enterprise service-oriented
                  network infrastructures: {DNS} servers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {105--132},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122915},
  doi          = {10.1504/IJICS.2022.122915},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ByamukamaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChanderG22,
  author       = {Bhanu Chander and
                  Kumaravelan Gopalakrishnan},
  title        = {{RFID} tag-based mutual authentication protocol with improved security
                  for {TMIS}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {383--405},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10042827},
  doi          = {10.1504/IJICS.2022.10042827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChanderG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DamT22,
  author       = {Khanh{-}Huu{-}The Dam and
                  Tayssir Touili},
  title        = {Extracting malicious behaviours},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {365--404},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122380},
  doi          = {10.1504/IJICS.2022.122380},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DamT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DammakGSG22,
  author       = {Salma Dammak and
                  Faiza Ghozzi and
                  Asma Sellami and
                  Fa{\"{\i}}ez Gargouri},
  title        = {Managing vulnerabilities during the development of a secure {ETL}
                  processes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {75--104},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122914},
  doi          = {10.1504/IJICS.2022.122914},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DammakGSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DebnathKC22,
  author       = {Sumit Kumar Debnath and
                  Nibedita Kundu and
                  Tanmay Choudhury},
  title        = {Efficient post-quantum private set-intersection protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {405--423},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122381},
  doi          = {10.1504/IJICS.2022.122381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DebnathKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DsouzaPDGP22,
  author       = {Jessica Judith D'souza and
                  R. Padmavathy and
                  Abhinav Dayal and
                  Harika Gnanaveni and
                  Sreenu Ponnada},
  title        = {Secure exchange and incentivised collaboration of machine learning
                  models and datasets using blockchain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {443--462},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2023.10050596},
  doi          = {10.1504/IJICS.2023.10050596},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DsouzaPDGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/FernandezPCA22,
  author       = {Jincy J. Fernandez and
                  Nithyanandam Pandian and
                  Raghuvamsh Chavali and
                  Ashwanth Kumar Appalaghe},
  title        = {Augmenting the detection of online image theft using diagonal transformation
                  and iris biometric watermarking},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {321--345},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2023.10050990},
  doi          = {10.1504/IJICS.2023.10050990},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/FernandezPCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GaoZZW22,
  author       = {Jianqing Gao and
                  Haiyang Zou and
                  Fuquan Zhang and
                  Tsu{-}Yang Wu},
  title        = {An intelligent stage light-based actor identification and positioning
                  system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {204--218},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122920},
  doi          = {10.1504/IJICS.2022.122920},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GaoZZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Garg22,
  author       = {Hitendra Garg},
  title        = {A comprehensive study of watermarking schemes for 3D polygon mesh
                  objects},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {48--72},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2020.10047385},
  doi          = {10.1504/IJICS.2020.10047385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Garg22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GrzinicG22,
  author       = {Toni Grzinic and
                  Eduardo Bl{\'{a}}zquez Gonz{\'{a}}lez},
  title        = {Methods for automatic malware analysis and classification: a survey},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {179--203},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121297},
  doi          = {10.1504/IJICS.2022.121297},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GrzinicG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuoB22,
  author       = {Xian Guo and
                  Wei Bai},
  title        = {{ML-SDNIDS:} an attack detection mechanism for {SDN} based on machine
                  learning},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {118--141},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10049057},
  doi          = {10.1504/IJICS.2022.10049057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuoB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KadhiwalaP22,
  author       = {Bintu Kadhiwala and
                  Sankita J. Patel},
  title        = {Privacy-preserving collaborative social network data publishing against
                  colluding data providers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {346--378},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10051582},
  doi          = {10.1504/IJICS.2022.10051582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KadhiwalaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KangP22,
  author       = {Jiwoong Kang and
                  Jaehyun Park},
  title        = {SoC-based abnormal ethernet packet detector with automatic rule-set
                  generator},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {219--230},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122372},
  doi          = {10.1504/IJICS.2022.122372},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KangP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KannaV22,
  author       = {G. Prabu Kanna and
                  V. Vasudevan},
  title        = {An improved privacy aware secure multi-cloud model with proliferate
                  ElGamal encryption for big data storage},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121288},
  doi          = {10.1504/IJICS.2022.121288},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KannaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeCC22,
  author       = {Gang Ke and
                  Ruey{-}Shun Chen and
                  Yeh{-}Cheng Chen},
  title        = {Research on intrusion detection method based on {SMOTE} and {DBN-LSSVM}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {300--312},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050309},
  doi          = {10.1504/IJICS.2022.10050309},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeCCHW22,
  author       = {Gang Ke and
                  Ruey{-}Shun Chen and
                  Yeh{-}Cheng Chen and
                  Yu{-}Xi Hu and
                  Tsu{-}Yang Wu},
  title        = {Simple multi-scale human abnormal behaviour detection based on video},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {310--320},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122376},
  doi          = {10.1504/IJICS.2022.122376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeCCHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeCJY22,
  author       = {Gang Ke and
                  Ruey{-}Shun Chen and
                  Shanshan Ji and
                  Jyh{-}haw Yeh},
  title        = {Network traffic prediction based on least squares support vector machine
                  with simple estimation of Gaussian kernel width},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122910},
  doi          = {10.1504/IJICS.2022.122910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeCJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhurshidSI22,
  author       = {Shozab Khurshid and
                  Avinash K. Shrivastava and
                  Javaid Iqbal},
  title        = {Generalised multi release framework for fault determination with fault
                  reduction factor},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {164--178},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121296},
  doi          = {10.1504/IJICS.2022.121296},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhurshidSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KisoreK22,
  author       = {N. Raghu Kisore and
                  K. Shiva Kumar},
  title        = {{FFRR:} a software diversity technique for defending against buffer
                  overflow attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {40--74},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122913},
  doi          = {10.1504/IJICS.2022.122913},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KisoreK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarGK22,
  author       = {Rahul Kumar and
                  Mridul Kumar Gupta and
                  Saru Kumari},
  title        = {Cryptanalysis and improvement of an authentication scheme for IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {73--87},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10051392},
  doi          = {10.1504/IJICS.2022.10051392},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MehrabaniASG22,
  author       = {Yavar Safaei Mehrabani and
                  Roghayeh Ataie and
                  Mohammad Hossein Shafiabadi and
                  Abolghasem Ghasempour},
  title        = {Design and implementation of an {ASIP} for {SHA-3} hash algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {285--309},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122375},
  doi          = {10.1504/IJICS.2022.122375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MehrabaniASG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MistryGJ22,
  author       = {Nilay R. Mistry and
                  Krupa Gajjar and
                  S. O. Junare},
  title        = {Volatile memory forensics of privacy aware browsers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {313--326},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2020.10047607},
  doi          = {10.1504/IJICS.2020.10047607},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MistryGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MurthyVTL22,
  author       = {Mantripragada Yaswanth Bhanu Murthy and
                  Thonduri Vineela and
                  Godavarthi Amar Tej and
                  Movva Vasantha Lakshmi},
  title        = {Development of adaptive AdaBoost classifier with optimal feature selection
                  for enhanced intrusion detection in IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {168--198},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10046936},
  doi          = {10.1504/IJICS.2022.10046936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MurthyVTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NabouLO22,
  author       = {Abdellah Nabou and
                  My Driss Laanaoui and
                  Mohammed Ouzzif},
  title        = {Effect of black hole attack in different mobility models of {MANET}
                  using {OLSR} protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {219--235},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122921},
  doi          = {10.1504/IJICS.2022.122921},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NabouLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PadhyaJ22,
  author       = {Mukti Padhya and
                  Devesh C. Jinwala},
  title        = {Revocable key aggregate searchable encryption with user privacy and
                  anonymity},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {1--33},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10051390},
  doi          = {10.1504/IJICS.2022.10051390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PadhyaJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatilP22,
  author       = {Shravani Mahesh Patil and
                  B. R. Purushothama},
  title        = {{QC-PRE:} quorum controlled proxy re-encryption scheme for access
                  control enforcement delegation of outsourced data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {165--192},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122918},
  doi          = {10.1504/IJICS.2022.122918},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatilP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PrasadR22,
  author       = {Venkata Vara Prasad and
                  Polipalli Trinatha Rao},
  title        = {Reinforcement learning-based cooperative sensing in cognitive radio
                  networks for primary user detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {34--47},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10051391},
  doi          = {10.1504/IJICS.2022.10051391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PrasadR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaniV22,
  author       = {S. Jamuna Rani and
                  S. Vagdevi},
  title        = {Auto-encoder-based technique for effective detection of frauds in
                  social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {348--364},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10045346},
  doi          = {10.1504/IJICS.2022.10045346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaniV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ReddyBG22,
  author       = {Punugu Vasudeva Reddy and
                  A. Ramesh Babu and
                  N. B. Gayathri},
  title        = {Pairing-based strong key-insulated signature scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {148--164},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122917},
  doi          = {10.1504/IJICS.2022.122917},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ReddyBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RenWZ22,
  author       = {Min Ren and
                  Zhihao Wang and
                  Peiying Zhao},
  title        = {A feature selection method based on neighbourhood rough set and genetic
                  algorithm for intrusion detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {278--299},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050308},
  doi          = {10.1504/IJICS.2022.10050308},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RenWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahBD22,
  author       = {Gulab Sah and
                  Subhasish Banerjee and
                  Manash Pratim Dutta},
  title        = {Ensemble learning algorithms with feature reduction mechanism for
                  intrusion detection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {88--117},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2023.10050595},
  doi          = {10.1504/IJICS.2023.10050595},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Shah22,
  author       = {Monika Shah},
  title        = {Detecting over-claim permissions and recognising dangerous permission
                  in Android apps},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {204--218},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121298},
  doi          = {10.1504/IJICS.2022.121298},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Shah22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShanmugamR22,
  author       = {Dillibabu Shanmugam and
                  Jothi Rangasamy},
  title        = {Robust message authentication in the context of quantum key distribution},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {365--382},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10044643},
  doi          = {10.1504/IJICS.2022.10044643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShanmugamR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZ22,
  author       = {Jaryn Shen and
                  Qingkai Zeng},
  title        = {The count-min sketch is vulnerable to offline password-guessing attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {27--39},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122912},
  doi          = {10.1504/IJICS.2022.122912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SilvaNKAW22,
  author       = {Rangana De Silva and
                  Iranga Navaratna and
                  Malitha Kumarasiri and
                  Janaka Alawatugoda and
                  Chuah Chai Wen},
  title        = {On power analysis attacks against hardware stream ciphers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {21--35},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121289},
  doi          = {10.1504/IJICS.2022.121289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SilvaNKAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SilvaNKWA22,
  author       = {Rangana De Silva and
                  Iranga Navaratna and
                  Malitha Kumarasiri and
                  Chuah Chai Wen and
                  Janaka Alawatugoda},
  title        = {Correlation power analysis attack on software implementation of {TRIVIUM}
                  stream cipher},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {379--401},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10046026},
  doi          = {10.1504/IJICS.2022.10046026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SilvaNKWA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TaouilABHD22,
  author       = {Youssef Taouil and
                  El Bachir Ameur and
                  Amine Benhfid and
                  Rachid Harba and
                  Hassan Douzi},
  title        = {Adaptive steganographic scheme using a variable matrix embedding},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {231--260},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122373},
  doi          = {10.1504/IJICS.2022.122373},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TaouilABHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThiteN22,
  author       = {Sandip Thite and
                  J. NaveenKumar},
  title        = {SecureAuthKey: design and evaluation of a lightweight key agreement
                  technique for smart home applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {406--424},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10042826},
  doi          = {10.1504/IJICS.2022.10042826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThiteN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TiCW22,
  author       = {Yen{-}Wu Ti and
                  Shang{-}Kuan Chen and
                  Wen{-}Cheng Wang},
  title        = {A hierarchical particle swarm optimisation algorithm for cloud computing
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {12--26},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122911},
  doi          = {10.1504/IJICS.2022.122911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TiCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TianWL22,
  author       = {Junfeng Tian and
                  Zilong Wang and
                  Zhen Li},
  title        = {Hierarchical data partition defence against co-resident attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {288--304},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10052284},
  doi          = {10.1504/IJICS.2022.10052284},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/TianWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TingGL22,
  author       = {Grace C.{-}W. Ting and
                  Bok{-}Min Goi and
                  Sze Wei Lee},
  title        = {Robustness attack on copyright protection scheme for {H.264/AVC} and
                  {SVC}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {193--203},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122919},
  doi          = {10.1504/IJICS.2022.122919},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TingGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WanD22,
  author       = {Yujie Wan and
                  Baoxiang Du},
  title        = {A new image encryption algorithm based on cascaded chaos and Arnold
                  transform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {321--331},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122377},
  doi          = {10.1504/IJICS.2022.122377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WanD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangYWJ22,
  author       = {Mingyue Wang and
                  Shen Yan and
                  Wei Wang and
                  Jiwu Jing},
  title        = {Secure zero-effort two-factor authentication based on time-frequency
                  audio analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {237--261},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050306},
  doi          = {10.1504/IJICS.2022.10050306},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WuYZ22,
  author       = {Bin Wu and
                  Xiao Yi and
                  Dongning Zhao},
  title        = {A node screening algorithm for wireless sensor network based on threshold
                  measurement},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {424--437},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122382},
  doi          = {10.1504/IJICS.2022.122382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WuYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XiongL22,
  author       = {Junjie Xiong and
                  Biyi Lin},
  title        = {You are safe when you tell the truth: a blockchain-based privacy-preserving
                  evidence collection and distribution system for digital forensics},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {1/2},
  pages        = {210--236},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10044086},
  doi          = {10.1504/IJICS.2022.10044086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XiongL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YahiaBBB22,
  author       = {Youcef Ould Yahia and
                  Samia Bouzefrane and
                  Hanifa Boucheneb and
                  Soumya Banerjee},
  title        = {A data-owner centric privacy model with blockchain and adapted attribute-based
                  encryption for internet-of-things and cloud environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {261--284},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122374},
  doi          = {10.1504/IJICS.2022.122374},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YahiaBBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YaminiS22,
  author       = {B. Yamini and
                  R. Sabitha},
  title        = {Image steganalysis: real-time adaptive colour image segmentation for
                  hidden message retrieval and Matthew's correlation coefficient calculation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {83--103},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121292},
  doi          = {10.1504/IJICS.2022.121292},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YaminiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZengCL22,
  author       = {Zhixin Zeng and
                  Liang Chang and
                  Yi{-}Ning Liu},
  title        = {A fault tolerance data aggregation scheme for fog computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {3/4},
  pages        = {351--364},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122379},
  doi          = {10.1504/IJICS.2022.122379},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZengCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangYDILG22,
  author       = {Xichen Zhang and
                  Mohammad Mehdi Yadollahi and
                  Sajjad Dadkhah and
                  Haruna Isah and
                  Duc{-}Phong Le and
                  Ali A. Ghorbani},
  title        = {Data breach: analysis, countermeasures and challenges},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {402--442},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2023.10050154},
  doi          = {10.1504/IJICS.2023.10050154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangYDILG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhuDWZ22,
  author       = {Hongfeng Zhu and
                  Zhiqin Du and
                  Liwei Wang and
                  Yuanle Zhang},
  title        = {A \emph{N}-party authenticated group key distribution protocol using
                  quantum-reflection architecture},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {237--253},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10052282},
  doi          = {10.1504/IJICS.2022.10052282},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhuDWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhuWCW22,
  author       = {Hongfeng Zhu and
                  Xintong Wang and
                  Yeh{-}Cheng Chen and
                  Xueying Wang},
  title        = {Security analysis and improvements of a universal construction for
                  a round-optimal password authenticated key exchange protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {17},
  number       = {1/2},
  pages        = {104--118},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.121293},
  doi          = {10.1504/IJICS.2022.121293},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhuWCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhuXCC22,
  author       = {Xingtong Zhu and
                  Jianbin Xiong and
                  Yeh{-}Cheng Chen and
                  Yongda Cai},
  title        = {Safety monitoring of machinery equipment and fault diagnosis method
                  based on support vector machine and improved evidence theory},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {19},
  number       = {3/4},
  pages        = {274--287},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10052283},
  doi          = {10.1504/IJICS.2022.10052283},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhuXCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Abu-AmaraB21,
  author       = {Fadi Abu{-}Amara and
                  Ameur Bensefia},
  title        = {A handwriting document encryption scheme based on segmentation and
                  chaotic logarithmic map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {327--343},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114709},
  doi          = {10.1504/IJICS.2021.114709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Abu-AmaraB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AkramMJL21,
  author       = {Junaid Akram and
                  Majid Mumtaz and
                  Gul Jabeen and
                  Ping Luo},
  title        = {DroidMD: an efficient and scalable Android malware detection approach
                  at source code level},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {299--321},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116310},
  doi          = {10.1504/IJICS.2021.116310},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AkramMJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlimehajHDNR21,
  author       = {Vlera Alimehaj and
                  Arbnor Halili and
                  Ramadan Dervishi and
                  Vehbi Neziri and
                  Blerim Rexha},
  title        = {Analysing and comparing the digital seal according to eIDAS regulation
                  with and without blockchain technology},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {171--191},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113174},
  doi          = {10.1504/IJICS.2021.113174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlimehajHDNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlsmadiAS21,
  author       = {Izzat Alsmadi and
                  Ahmed Aleroud and
                  Ahmad A. Saifan},
  title        = {Fault-based testing for discovering {SQL} injection vulnerabilities
                  in web applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {51--62},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117394},
  doi          = {10.1504/IJICS.2021.117394},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AlsmadiAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlsuhibanyAA21,
  author       = {Suliman A. Alsuhibany and
                  Fatimah N. Almohaimeed and
                  Naseem A. Alrobah},
  title        = {Synthetic Arabic handwritten {CAPTCHA}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {385--398},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118959},
  doi          = {10.1504/IJICS.2021.118959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlsuhibanyAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AmbikaB21,
  author       = {B. J. Ambika and
                  M. K. Banga},
  title        = {A novel energy efficient routing algorithm for {MPLS-MANET} using
                  fuzzy logic controller},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {20--39},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112206},
  doi          = {10.1504/IJICS.2021.112206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmbikaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AmraniRA21,
  author       = {Ayoub Amrani and
                  Najat Rafalia and
                  Jaafar Abouchabaka},
  title        = {Mobile agent security using Amrani et al.'s protocol and binary serialisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {192--209},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113175},
  doi          = {10.1504/IJICS.2021.113175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmraniRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnandBA21,
  author       = {Adarsh Anand and
                  Navneet Bhatt and
                  Omar Hussain Alhazmi},
  title        = {Vulnerability discovery modelling: a general framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {192--206},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117402},
  doi          = {10.1504/IJICS.2021.117402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnandBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnilI21,
  author       = {G. L. Anil and
                  J. L. Mazher Iqbal},
  title        = {Secure energy efficient network priority routing protocol for effective
                  data collection and key management in dynamic WSNs},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {60--78},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112208},
  doi          = {10.1504/IJICS.2021.112208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnilI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnnaluriAP21,
  author       = {Sreenivasa Rao Annaluri and
                  Venkata Ramana Attili and
                  Kalli Srinivasa Nageswara Prasad},
  title        = {Secure and unifold mining model for pattern discovery from streaming
                  data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {136--145},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113170},
  doi          = {10.1504/IJICS.2021.113170},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnnaluriAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhatiaJ21,
  author       = {Jitesh Kumar Bhatia and
                  Anand Singh Jalal},
  title        = {Pixel-based hybrid copy move image forgery detection using Zernike
                  moments and auto colour correlogram},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {88--107},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115359},
  doi          = {10.1504/IJICS.2021.115359},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhatiaJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BoukhamlaG21,
  author       = {Akram Boukhamla and
                  Javier Coronel Gaviro},
  title        = {{CICIDS2017} dataset: performance improvements and validation as a
                  robust intrusion detection system testbed},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {20--32},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117392},
  doi          = {10.1504/IJICS.2021.117392},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BoukhamlaG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CaoCDW21,
  author       = {Nanyuan Cao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Haijiang Wang},
  title        = {Improved {RSA} lossy trapdoor function and applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {229--241},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114703},
  doi          = {10.1504/IJICS.2021.114703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CaoCDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CaoWL21,
  author       = {Zhengjun Cao and
                  Xiqi Wang and
                  Lihua Liu},
  title        = {One privacy-preserving multi-keyword ranked search scheme revisited},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {375--384},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118958},
  doi          = {10.1504/IJICS.2021.118958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CaoWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CaoZZ21,
  author       = {Yuchen Cao and
                  Yongbin Zhou and
                  Hailong Zhang},
  title        = {Multi-channel time-frequency fusion attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {84--102},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117396},
  doi          = {10.1504/IJICS.2021.117396},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CaoZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChengCSHL21,
  author       = {Ting{-}Fang Cheng and
                  Ying{-}Chin Chen and
                  Zhu{-}Dao Song and
                  Ngoc{-}Tu Huynh and
                  Jung{-}San Lee},
  title        = {Secure session between an IoT device and a cloud server based on elliptic
                  curve cryptosystem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {67--87},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115348},
  doi          = {10.1504/IJICS.2021.115348},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChengCSHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CuiZW21,
  author       = {Zhanwei Cui and
                  Jianping Zeng and
                  Chengrong Wu},
  title        = {A layer-crossing multi-factor and dynamic security model over a moving
                  target defence},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {150--169},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117400},
  doi          = {10.1504/IJICS.2021.117400},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CuiZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DuC21,
  author       = {Ningning Du and
                  Chongxu Chen},
  title        = {Research on privacy protection system of {RFID} personal consumption
                  data based on internet of things and cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {328--342},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116930},
  doi          = {10.1504/IJICS.2021.116930},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DuC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElkhadirB21,
  author       = {Zyad Elkhadir and
                  Mohammed Benattou},
  title        = {A truncated mean \emph{{\(\mathscr{l}\)}\({}_{\mbox{p}}\)}-LDA approach
                  for intrusion detection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {355--374},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118957},
  doi          = {10.1504/IJICS.2021.118957},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ElkhadirB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/FanTL21,
  author       = {Zhijie Fan and
                  Chengxiang Tan and
                  Xin Li},
  title        = {A hierarchical method for assessing cyber security situation based
                  on ontology and fuzzy cognitive maps},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {242--262},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114704},
  doi          = {10.1504/IJICS.2021.114704},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/FanTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GargSA21,
  author       = {Urvashi Garg and
                  Geeta Sikka and
                  Lalit Kumar Awasthi},
  title        = {Empirical risk assessment of attack graphs using time to compromise
                  framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {33--50},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117393},
  doi          = {10.1504/IJICS.2021.117393},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GargSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GavadeCR21,
  author       = {Jayashree D. Gavade and
                  S. R. Chougule and
                  Vishwaja Rathod},
  title        = {A robust passive blind copy-move image forgery detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {300--317},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114707},
  doi          = {10.1504/IJICS.2021.114707},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GavadeCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HaiderNSSHBK21,
  author       = {Waqas Haider and
                  Muhammad Wasif Nisar and
                  Tanzila Saba and
                  Muhammad Sharif and
                  Raja Umair Haider and
                  Nadeem Muhammad Bilal and
                  Muhammad Attique Khan},
  title        = {A complexity reduced and reliable integrity protection for large relational
                  data over clouds},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {49--66},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115347},
  doi          = {10.1504/IJICS.2021.115347},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HaiderNSSHBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JabeenYL21,
  author       = {Gul Jabeen and
                  Xi Yang and
                  Ping Luo},
  title        = {Vulnerability severity prediction model for software based on Markov
                  chain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {109--140},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116302},
  doi          = {10.1504/IJICS.2021.116302},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JabeenYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JayasimhaR21,
  author       = {Yenumaladoddi Jayasimha and
                  R. Venkata Siva Reddy},
  title        = {A facial expression recognition model using hybrid feature selection
                  and support vector machines},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {79--97},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112209},
  doi          = {10.1504/IJICS.2021.112209},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JayasimhaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KV21,
  author       = {Unnikrishnan K and
                  Pramod K. V},
  title        = {Prediction-based robust blind reversible watermarking for relational
                  databases},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {211--228},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114702},
  doi          = {10.1504/IJICS.2021.114702},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KaliaBS21,
  author       = {Parmod Kalia and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {A hybrid approach for preserving privacy for real estate data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {400--410},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116942},
  doi          = {10.1504/IJICS.2021.116942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KaliaBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KamilO21,
  author       = {Ismaila Adeniyi Kamil and
                  Sunday Oyinlola Ogundoyin},
  title        = {A provably secure lightweight certificateless aggregate signature
                  scheme for healthcare wireless sensor network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {183--215},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116305},
  doi          = {10.1504/IJICS.2021.116305},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KamilO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KovelamudiWZM21,
  author       = {Geetika Kovelamudi and
                  Bryan Watson and
                  Jun Zheng and
                  Srinivas Mukkamala},
  title        = {On the adoption of scramble keypad for unlocking PIN-protected smartphones},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115345},
  doi          = {10.1504/IJICS.2021.115345},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/KovelamudiWZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LathaRD21,
  author       = {S. Bhargavi Latha and
                  D. Venkata Reddy and
                  A. Damodaram},
  title        = {Video watermarking using neural networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {40--59},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112207},
  doi          = {10.1504/IJICS.2021.112207},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LathaRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiLWSL21,
  author       = {Boyu Li and
                  Yanheng Liu and
                  Minghai Wang and
                  Geng Sun and
                  Bin Li},
  title        = {Local anatomy for personalised privacy protection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {254--271},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116308},
  doi          = {10.1504/IJICS.2021.116308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiLWSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiangSTFZ21,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Peter Foytik and
                  Lingchen Zhang},
  title        = {Leveraging Intel {SGX} to enable trusted and privacy preserving membership
                  service in distributed ledgers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {63--83},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117395},
  doi          = {10.1504/IJICS.2021.117395},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/LiangSTFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LinYL21,
  author       = {Zhixing Lin and
                  Jian Yu and
                  Shunfa Liu},
  title        = {The prediction of network security situation based on deep learning
                  method},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {386--399},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116941},
  doi          = {10.1504/IJICS.2021.116941},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LinYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiuLLW21,
  author       = {Xiaoqian Liu and
                  Qianmu Li and
                  Tao Li and
                  Ming Wu},
  title        = {Privacy preserving techniques for decision trees},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {255--271},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118952},
  doi          = {10.1504/IJICS.2021.118952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiuLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuoYZ21,
  author       = {Xiao Luo and
                  Chengchao Yao and
                  Nur Zincir{-}Heywood},
  title        = {Modelling and visualising {SSH} brute force attack behaviours through
                  a hybrid learning framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {170--191},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117401},
  doi          = {10.1504/IJICS.2021.117401},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/LuoYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MaSM21,
  author       = {Fengming Ma and
                  Gang Sheng and
                  Yuefeng Ma},
  title        = {E-commerce process reengineering for customer privacy protection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {373--385},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116940},
  doi          = {10.1504/IJICS.2021.116940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MaSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoonR21,
  author       = {Sunil K. Moon and
                  Rajshree D. Raut},
  title        = {Anti-forensic reversible multi frame block to block pixel mapping
                  information concealing approach to increase the robustness and perceptibility},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {403--439},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114713},
  doi          = {10.1504/IJICS.2021.114713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoonR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MuhammadK21,
  author       = {Nooh Bany Muhammad and
                  Aya Kandil},
  title        = {Information protection of end users on the web: privacy issues and
                  measures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {357--372},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116939},
  doi          = {10.1504/IJICS.2021.116939},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MuhammadK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MumtazL21,
  author       = {Majid Mumtaz and
                  Ping Luo},
  title        = {An improved cryptanalysis of large {RSA} decryption exponent with
                  constrained secret key},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {102--117},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113168},
  doi          = {10.1504/IJICS.2021.113168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MumtazL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OguOAK21,
  author       = {Emmanuel C. Ogu and
                  Olusegun A. Ojesanmi and
                  Oludele Awodele and
                  Shade O. Kuyoro},
  title        = {Supporting features for flow-level packet analysis towards cyber threat
                  detection: a pilot study},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {137--149},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117399},
  doi          = {10.1504/IJICS.2021.117399},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OguOAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Olakanmi21,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {A lightweight security and privacy-aware routing scheme for energy-constraint
                  multi-hop wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {231--253},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116307},
  doi          = {10.1504/IJICS.2021.116307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Olakanmi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OuaddahB21,
  author       = {Aafaf Ouaddah and
                  Badr Bellaj},
  title        = {FairAccess2.0: a smart contract-based authorisation framework for
                  enabling granular access control in IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {18--48},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115346},
  doi          = {10.1504/IJICS.2021.115346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OuaddahB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ParamasivamS21,
  author       = {P. Saravanan and
                  Shanthi Rekha Shanmugham},
  title        = {Time-shared {AES-128} implementation with extremely low-cost for smart
                  card applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {239--254},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118951},
  doi          = {10.1504/IJICS.2021.118951},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ParamasivamS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PareekP21,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {Blockchain-based decentralised access control scheme for dynamic hierarchies},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {324--354},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118956},
  doi          = {10.1504/IJICS.2021.118956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PareekP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PonguwalaR21,
  author       = {Maitreyi Ponguwala and
                  Meda Sreenivasa Rao},
  title        = {Secured spray and focus protocol design in intermittently connected
                  mobile networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {344--353},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114710},
  doi          = {10.1504/IJICS.2021.114710},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PonguwalaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RB21,
  author       = {Lakshmi H. R. and
                  Surekha Borra},
  title        = {Digital video watermarking tools: an overview},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117391},
  doi          = {10.1504/IJICS.2021.117391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaghavenderP21,
  author       = {K. V. Raghavender and
                  P. Premchand},
  title        = {Accurate and reliable detection of DDoS attacks based on {ARIMA-SWGARCH}
                  model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {118--135},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113169},
  doi          = {10.1504/IJICS.2021.113169},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaghavenderP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RathP21,
  author       = {Mamata Rath and
                  Binod Kumar Pattanayak},
  title        = {Performance evaluation of optimised protocol in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {318--326},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114708},
  doi          = {10.1504/IJICS.2021.114708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RathP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RezaeibaghaMHZ21,
  author       = {Fatemeh Rezaeibagha and
                  Yi Mu and
                  Ke Huang and
                  Leyou Zhang},
  title        = {Enhanced bitcoin with two-factor authentication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {292--306},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118954},
  doi          = {10.1504/IJICS.2021.118954},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RezaeibaghaMHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahaKRK21,
  author       = {Rahul Saha and
                  Gulshan Kumar and
                  Mritunjay Kumar Rai and
                  Hye{-}Jin Kim},
  title        = {Adaptive classifier-based intrusion detection system using logistic
                  regression and Euclidean distance on network probe vectors in resource
                  constrained networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {226--238},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118950},
  doi          = {10.1504/IJICS.2021.118950},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahaKRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SaradiK21,
  author       = {V. Partha Saradi and
                  P. Kailasapathi},
  title        = {A novel binary encryption algorithm for navigation control of robotic
                  vehicles through visible light communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {160--170},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113172},
  doi          = {10.1504/IJICS.2021.113172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SaradiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SarafSI21,
  author       = {Iqra Saraf and
                  Avinash K. Shrivastava and
                  Javaid Iqbal},
  title        = {Effort-based fault detection and correction modelling for multi release
                  of software},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {354--379},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114711},
  doi          = {10.1504/IJICS.2021.114711},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SarafSI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SathishK21,
  author       = {Kuppani Sathish and
                  Kamakshaiah Kolli},
  title        = {Sustainable wireless clouds with security assurance},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {146--159},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113171},
  doi          = {10.1504/IJICS.2021.113171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SathishK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sedaghat21,
  author       = {Shahrzad Sedaghat},
  title        = {New approach in the applications and forensics of the networks of
                  the internet of things based on the fog infrastructure using {SDN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {272--298},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116309},
  doi          = {10.1504/IJICS.2021.116309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sedaghat21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SenoussiBB21,
  author       = {Nour El Houda Senoussi and
                  Abdelmalik Bachir and
                  Abdelmadjid Bouabdallah},
  title        = {On QoS-aware location privacy in mobile networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {163--182},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116304},
  doi          = {10.1504/IJICS.2021.116304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SenoussiBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShailajaN21,
  author       = {A. Shailaja and
                  Krishnamurthy Gorappa Ningappa},
  title        = {A low area {VLSI} implementation of extended tiny encryption algorithm
                  using Lorenz chaotic system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {3--19},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112205},
  doi          = {10.1504/IJICS.2021.112205},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShailajaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaJ21,
  author       = {Dhruti Sharma and
                  Devesh C. Jinwala},
  title        = {Multi-writer multi-reader conjunctive keyword searchable encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {141--162},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116303},
  doi          = {10.1504/IJICS.2021.116303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaK21,
  author       = {Geeta Sharma and
                  Sheetal Kalra},
  title        = {A robust multi-factor remote user authentication scheme for cloud-IoT
                  services},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {272--291},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118953},
  doi          = {10.1504/IJICS.2021.118953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SheikP21,
  author       = {Syed Amma Sheik and
                  M. Amutha Prabakar},
  title        = {An efficient and provably secure authentication scheme based on elliptic
                  curve signature using a smart card},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {207--225},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118967},
  doi          = {10.1504/IJICS.2021.118967},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SheikP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghSBS21,
  author       = {Amardeep Singh and
                  Monika Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {Optimised K-anonymisation technique to deal with mutual friends and
                  degree attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {281--299},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114706},
  doi          = {10.1504/IJICS.2021.114706},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghSBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghTV21,
  author       = {Ajeet Singh and
                  Appala Naidu Tentu and
                  V. Ch. Venkaiah},
  title        = {A dynamic key management paradigm for secure wireless ad hoc network
                  communications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {380--402},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114712},
  doi          = {10.1504/IJICS.2021.114712},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghalR21,
  author       = {Chetna Singhal and
                  A. Rajesh},
  title        = {Heuristic trust-based neighbour centric routing for CPS-enabled wireless
                  sensor and ad hoc network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {120--136},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117398},
  doi          = {10.1504/IJICS.2021.117398},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghalR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SongM21,
  author       = {Fagen Song and
                  Tinghuai Ma},
  title        = {High utility differential privacy based on smooth sensitivity and
                  individual ranking},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {2/3},
  pages        = {216--230},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116306},
  doi          = {10.1504/IJICS.2021.116306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SongM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SukumaranM21,
  author       = {Sreeja Cherillath Sukumaran and
                  Mohammed Misbahuddin},
  title        = {Secure key exchange scheme: a {DNA} computing-based approach to resist
                  {MITM} in {DHKE}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {307--323},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118955},
  doi          = {10.1504/IJICS.2021.118955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SukumaranM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Wang21,
  author       = {Geng Wang},
  title        = {Time-based key management in attribute-based encryption using piecewise
                  key generation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {103--119},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117397},
  doi          = {10.1504/IJICS.2021.117397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangW21,
  author       = {Chien{-}Ming Wang and
                  Chih{-}Hung Wang},
  title        = {A highly secure three-party authentication key exchange protocol and
                  its application in e-business communication with {ECK} model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {399--419},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118965},
  doi          = {10.1504/IJICS.2021.118965},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WaqasAMY21,
  author       = {Umer Waqas and
                  Shazia Afzal and
                  Mubeen Akhtar Mir and
                  Muhammad Yousaf},
  title        = {Cryptographic strength evaluation of {AES} s-box variants},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {263--280},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114705},
  doi          = {10.1504/IJICS.2021.114705},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WaqasAMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Zhao21,
  author       = {Jianchao Zhao},
  title        = {Research on network security defence based on big data clustering
                  algorithms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {343--356},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.116931},
  doi          = {10.1504/IJICS.2021.116931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Zhao21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AgrawalS20,
  author       = {Amrit Kumar Agrawal and
                  Yogendra Narain Singh},
  title        = {Unconstrained face recognition using deep convolution neural network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {332--348},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105183},
  doi          = {10.1504/IJICS.2020.105183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AgrawalS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-AhmadAI20,
  author       = {Ahmad Salah Al{-}Ahmad and
                  Syed Ahmad Aljunid and
                  Normaly Kamal Ismail},
  title        = {Mobile cloud computing applications penetration testing model design},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {210--226},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108849},
  doi          = {10.1504/IJICS.2020.108849},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-AhmadAI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BikshamV20,
  author       = {V. Biksham and
                  D. Vasumathi},
  title        = {A lightweight fully homomorphic encryption scheme for cloud security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {357--371},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109482},
  doi          = {10.1504/IJICS.2020.109482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BikshamV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BogawarB20,
  author       = {Pranjal S. Bogawar and
                  Kishor K. Bhoyar},
  title        = {Comparative study of classification approaches for e-mail analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {411--427},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109485},
  doi          = {10.1504/IJICS.2020.109485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BogawarB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DiwakarK20,
  author       = {Manoj Diwakar and
                  Pardeep Kumar},
  title        = {Blind noise estimation-based {CT} image denoising in tetrolet domain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {234--252},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105175},
  doi          = {10.1504/IJICS.2020.105175},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DiwakarK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElhosenyA20,
  author       = {Mohamed Elhoseny and
                  Hosny A. Abbas},
  title        = {Towards automated {SCADA} forensic investigation: challenges, opportunities
                  and promising paradigms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {268--288},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109477},
  doi          = {10.1504/IJICS.2020.109477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ElhosenyA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElmasryAZ20,
  author       = {Wisam Elmasry and
                  Akhan Akbulut and
                  Abdul Halim Zaim},
  title        = {Comparative evaluation of different classification techniques for
                  masquerade attack detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {187--209},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108848},
  doi          = {10.1504/IJICS.2020.108848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ElmasryAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GrayT20,
  author       = {John M. Gray and
                  Gurvirender P. Tejay},
  title        = {Introducing virtue ethics concepts into the decision processes of
                  information systems trusted workers: a Delphi study},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103997},
  doi          = {10.1504/IJICS.2020.103997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GrayT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaGC20,
  author       = {Shashank Gupta and
                  Brij B. Gupta and
                  Pooja Chaudhary},
  title        = {Nested context-aware sanitisation and feature injection in clustered
                  templates of JavaScript worms on the cloud-based {OSN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {147--180},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105153},
  doi          = {10.1504/IJICS.2020.105153},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaS20,
  author       = {Alka Gupta and
                  Lalit Sen Sharma},
  title        = {A categorical survey of state-of-the-art intrusion detection system-\emph{Snort}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {337--356},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109481},
  doi          = {10.1504/IJICS.2020.109481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HafsaSMMM20,
  author       = {Amal Hafsa and
                  Anissa Sghaier and
                  Medien Zeghid and
                  Jihene Malek and
                  Mohsen Machhout},
  title        = {An improved co-designed {AES-ECC} cryptosystem for secure data transmission},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {118--140},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108145},
  doi          = {10.1504/IJICS.2020.108145},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HafsaSMMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hamza20,
  author       = {Lamia Hamza},
  title        = {Intruder model for generating attack scenarios in computer systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {428--443},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109486},
  doi          = {10.1504/IJICS.2020.109486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hamza20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JanQ20,
  author       = {Saeed Ullah Jan and
                  Fawad Qayum},
  title        = {An authentication scheme for distributed computing environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {227--248},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108858},
  doi          = {10.1504/IJICS.2020.108858},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JanQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JauroY20,
  author       = {Suleiman Salihu Jauro and
                  Raghav Yadav},
  title        = {An efficient interior and exterior boundary detection-based two level
                  iris segmentation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {97--117},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108129},
  doi          = {10.1504/IJICS.2020.108129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JauroY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KantharajuM20,
  author       = {Handenahalli Channareddy Kantharaju and
                  K. N. Narasimha Murthy},
  title        = {An energy efficient authentication scheme based on hierarchical {IBDS}
                  and {EIBDS} in grid-based wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {48--72},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108127},
  doi          = {10.1504/IJICS.2020.108127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KantharajuM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KapadiaP20,
  author       = {Amishi Mahesh Kapadia and
                  Nithyanandam Pandian},
  title        = {Reversible data hiding methods in integer wavelet transform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {70--89},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104001},
  doi          = {10.1504/IJICS.2020.104001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KapadiaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhanOAMY20,
  author       = {Burhan Ul Islam Khan and
                  Rashidah Funke Olanrewaju and
                  Farhat Anwar and
                  Roohie Naaz Mir and
                  Mashkuri Yaacob},
  title        = {Scrutinising internet banking security solutions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {269--302},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105180},
  doi          = {10.1504/IJICS.2020.105180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhanOAMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarKK20,
  author       = {P. M. Ashok Kumar and
                  D. Kavitha and
                  S. Arun Kumar},
  title        = {A hybrid generative-discriminative model for abnormal event detection
                  in surveillance video scenes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {253--268},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105179},
  doi          = {10.1504/IJICS.2020.105179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LamkucheP20,
  author       = {Hemraj Shobharam Lamkuche and
                  Dhanya Pramod},
  title        = {{CSL:} {FPGA} implementation of lightweight block cipher for power-constrained
                  devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {349--377},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105185},
  doi          = {10.1504/IJICS.2020.105185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LamkucheP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MahantaK20,
  author       = {Hridoy Jyoti Mahanta and
                  Ajoy Kumar Khan},
  title        = {A secured modular exponentiation for {RSA} and {CRT-RSA} with dual
                  blinding to resist power analysis attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {112--129},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105187},
  doi          = {10.1504/IJICS.2020.105187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MahantaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MaiPHC20,
  author       = {Guizhen Mai and
                  Shuiguo Peng and
                  Yinghan Hong and
                  Pinghua Chen},
  title        = {Fast causal division for supporting robust causal discovery},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {289--308},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109478},
  doi          = {10.1504/IJICS.2020.109478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MaiPHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MerzougAH20,
  author       = {Assia Merzoug and
                  Adda Ali{-}Pacha and
                  Naima Hadj{-}Said},
  title        = {New chaotic cryptosystem for the image encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {450--463},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107452},
  doi          = {10.1504/IJICS.2020.107452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MerzougAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MirchevM20,
  author       = {Mircho Mirchev and
                  Seferin Mirtchev},
  title        = {System for DDoS attack mitigation by discovering the attack vectors
                  through statistical traffic analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {309--321},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109479},
  doi          = {10.1504/IJICS.2020.109479},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MirchevM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohanE20,
  author       = {Lija Mohan and
                  M. Sudheep Elayidom},
  title        = {Secure and privacy-preserving multi-keyword ranked information retrieval
                  from encrypted big data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {141--165},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108839},
  doi          = {10.1504/IJICS.2020.108839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohanE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohindruSB20,
  author       = {Vandana Mohindru and
                  Yashwant Singh and
                  Ravindara Bhatt},
  title        = {Securing wireless sensor networks from node clone attack: a lightweight
                  message authentication algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {217--233},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105174},
  doi          = {10.1504/IJICS.2020.105174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohindruSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MukherjeeS20,
  author       = {Srilekha Mukherjee and
                  Goutam Sanyal},
  title        = {Eight neighbour bits swap encryption-based image steganography using
                  arithmetic progression technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {130--146},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105188},
  doi          = {10.1504/IJICS.2020.105188},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MukherjeeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Olakanmi20,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {{SAPMS:} a secure and anonymous parking management system for autonomous
                  vehicles},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {20--39},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103996},
  doi          = {10.1504/IJICS.2020.103996},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Olakanmi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PintoJK20,
  author       = {Joey Pinto and
                  Pooja Jain and
                  Tapan Kumar},
  title        = {Fault prediction for distributed computing Hadoop clusters using real-time
                  higher order differential inputs to {SVM:} Zedacross},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {181--198},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105155},
  doi          = {10.1504/IJICS.2020.105155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PintoJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajagopalKP20,
  author       = {A. Rajagopal and
                  K. Karibasappa and
                  K. S. Vasundara Patel},
  title        = {Study of {LDPC} decoders with quadratic residue sequence for communication
                  system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {18--31},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108122},
  doi          = {10.1504/IJICS.2020.108122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajagopalKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RameshPE20,
  author       = {Dharavath Ramesh and
                  Rashmi Priya Sharma and
                  Damodar Reddy Edla},
  title        = {{HHDSSC:} harnessing healthcare data security in cloud using ciphertext
                  policy attribute-based encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {322--336},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109480},
  doi          = {10.1504/IJICS.2020.109480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RameshPE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahooG20,
  author       = {Somya Ranjan Sahoo and
                  Brij B. Gupta},
  title        = {Fake profile detection in multimedia big data on online social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {303--331},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105181},
  doi          = {10.1504/IJICS.2020.105181},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SahooG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SainiPS20,
  author       = {Natasha Saini and
                  Nitin Pandey and
                  Ajeet Pal Singh},
  title        = {Developing malevolent node-based protection system against jamming
                  attack in agent assisted {CRN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {73--96},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108128},
  doi          = {10.1504/IJICS.2020.108128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SainiPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sekhavat20,
  author       = {Yoones A. Sekhavat},
  title        = {{CFM:} collusion-free model of privacy preserving frequent itemset
                  mining},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {249--267},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109476},
  doi          = {10.1504/IJICS.2020.109476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sekhavat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShrivastavaP20,
  author       = {Sonika Shrivastava and
                  Rajesh Kumar Pateriya},
  title        = {Data encoding and cost optimised distribution for efficient and secure
                  storage in cloud federation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {396--410},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109484},
  doi          = {10.1504/IJICS.2020.109484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShrivastavaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghAAS20,
  author       = {Indu Singh and
                  Nikhil Arora and
                  Shivam Arora and
                  Parteek Singhal},
  title        = {Fuzzy {ARM} and cluster analysis for database intrusion detection
                  and prevention},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {372--395},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109483},
  doi          = {10.1504/IJICS.2020.109483},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghAAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SuriV20,
  author       = {Shelza Suri and
                  Ritu Vijay},
  title        = {A coupled map lattice-based image encryption approach using {DNA}
                  and bi-objective genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {199--216},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105156},
  doi          = {10.1504/IJICS.2020.105156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SuriV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThakkarP20,
  author       = {Ankit Thakkar and
                  Kajol Patel},
  title        = {{VIKAS:} a new virtual keyboard-based simple and efficient text {CAPTCHA}
                  verification scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {90--105},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104003},
  doi          = {10.1504/IJICS.2020.104003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThakkarP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/UshaKMSV20,
  author       = {Usha Gopal and
                  Kannimuthu Subramanian and
                  P. D. Mahendiran and
                  Anusha Kadambari Shanker and
                  Deepti Venugopal},
  title        = {Static analysis method for detecting cross site scripting vulnerabilities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {32--47},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108123},
  doi          = {10.1504/IJICS.2020.108123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/UshaKMSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VinothkannaSP20,
  author       = {R. Vinothkanna and
                  S. Sivakannan and
                  N. Prabakaran},
  title        = {A novel {GAAC} optimisation algorithm for multimodal fusion score
                  decision making in secured biometric systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {3--17},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108113},
  doi          = {10.1504/IJICS.2020.108113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VinothkannaSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangYGW20,
  author       = {Chundong Wang and
                  Lei Yang and
                  Hao Guo and
                  Fujin Wan},
  title        = {Data protection and provenance in cloud of things environment: research
                  challenges},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {416--435},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107449},
  doi          = {10.1504/IJICS.2020.107449},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangYGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangZL20,
  author       = {Chundong Wang and
                  Tong Zhao and
                  Zheli Liu},
  title        = {An activity theory model for dynamic evolution of attack graph based
                  on improved least square genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {397--415},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107448},
  doi          = {10.1504/IJICS.2020.107448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XieWGJH20,
  author       = {Xin Xie and
                  Jianan Wang and
                  Songlin Ge and
                  Nan Jiang and
                  Fengping Hu},
  title        = {An improved spatial-temporal correlation algorithm combined with compressed
                  sensing and {LEACH} protocol in WSNs},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {383--396},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107447},
  doi          = {10.1504/IJICS.2020.107447},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XieWGJH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YacoubaOE20,
  author       = {Kouraogo Yacouba and
                  Ghizlane Orhanou and
                  Said Elhajji},
  title        = {Advanced security of two-factor authentication system using stego
                  {QR} code},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {436--449},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107451},
  doi          = {10.1504/IJICS.2020.107451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YacoubaOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YadavTRP20,
  author       = {Anil Yadav and
                  Anurag Tripathi and
                  Nitin Rakesh and
                  Sujata Pandey},
  title        = {Protecting composite IoT server by secure secret key exchange for
                  {XEN} intra virtual machines},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {53--69},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104000},
  doi          = {10.1504/IJICS.2020.104000},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YadavTRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangLL20,
  author       = {Jianmin Zhang and
                  Hua Li and
                  Jian Li},
  title        = {An improved key pre-distribution scheme based on the security level
                  classification of keys for wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {40--52},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103999},
  doi          = {10.1504/IJICS.2020.103999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhaoWZL20,
  author       = {Jian{-}Feng Zhao and
                  Shu{-}Ying Wang and
                  Li{-}Tao Zhang and
                  Xian{-}Feng Li},
  title        = {Image encryption scheme based on a novel fractional order compound
                  chaotic attractor},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {166--186},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108847},
  doi          = {10.1504/IJICS.2020.108847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhaoWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AgarkarA19,
  author       = {Aarti Amod Agarkar and
                  Himanshu Agrawal},
  title        = {Lightweight R-LWE-based privacy preservation scheme for smart grid
                  network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {233--254},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099433},
  doi          = {10.1504/IJICS.2019.099433},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AgarkarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AhujaB19,
  author       = {Rakesh Ahuja and
                  Sarabjeet Singh Bedi},
  title        = {Video watermarking scheme based on {IDR} frames using {MPEG-2} structure},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {585--603},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103065},
  doi          = {10.1504/IJICS.2019.103065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AhujaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-Saraireh19,
  author       = {Ja'afer Al{-}Saraireh},
  title        = {A novel approach for query over encrypted data in database},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {621--636},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103083},
  doi          = {10.1504/IJICS.2019.103083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-Saraireh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW19,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang and
                  Xing Li},
  title        = {On mapping of address and port using translation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {214--232},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099419},
  doi          = {10.1504/IJICS.2019.099419},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BrownA19,
  author       = {Adam J. Brown and
                  Todd R. Andel},
  title        = {What's in your honeypot: a privacy compliance perspective},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {289--309},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099443},
  doi          = {10.1504/IJICS.2019.099443},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BrownA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CarterT19,
  author       = {Henry Carter and
                  Patrick Traynor},
  title        = {Outsourcing computation for private function evaluation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {525--561},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103052},
  doi          = {10.1504/IJICS.2019.103052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CarterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DeviS19,
  author       = {B. S. Kiruthika Devi and
                  T. Subbulakshmi},
  title        = {Cloud-based DDoS attack detection and defence system using statistical
                  approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {447--475},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101935},
  doi          = {10.1504/IJICS.2019.101935},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DeviS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Elngar19,
  author       = {Ahmed A. Elngar},
  title        = {An efficient user authentication model for IOT-based healthcare environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {431--446},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101932},
  doi          = {10.1504/IJICS.2019.101932},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Elngar19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Faraoun19,
  author       = {Kamel Mohamed Faraoun},
  title        = {A novel verifiable and unconditionally secure (m, t, n)-threshold
                  multi-secret sharing scheme using overdetermined systems of linear
                  equations over finite Galois fields},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {61--82},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096849},
  doi          = {10.1504/IJICS.2019.096849},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Faraoun19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Fredj19,
  author       = {Ouissem Ben Fredj},
  title        = {{SPHERES:} an efficient server-side web application protection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {33--60},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096848},
  doi          = {10.1504/IJICS.2019.096848},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Fredj19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HuXWTY19,
  author       = {Xiaoming Hu and
                  Huajie Xu and
                  Jian Wang and
                  WenAn Tan and
                  Yinchun Yang},
  title        = {A generic construction of identity-based proxy signature scheme in
                  the standard model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {83--100},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096850},
  doi          = {10.1504/IJICS.2019.096850},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HuXWTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeerthikaM19,
  author       = {V. Keerthika and
                  Nandagopal Malarvizhi},
  title        = {Mitigate black hole attack using bee optimised weighted trust with
                  {AODV} in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {275--288},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099437},
  doi          = {10.1504/IJICS.2019.099437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeerthikaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhanOAMN19,
  author       = {Burhan Ul Islam Khan and
                  Rashidah Funke Olanrewaju and
                  Farhat Anwar and
                  Roohie Naaz Mir and
                  Athaur Rahman Najeeb},
  title        = {A critical insight into the effectiveness of research methods evolved
                  to secure IoT ecosystem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {332--354},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101908},
  doi          = {10.1504/IJICS.2019.101908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhanOAMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhemissaTB19,
  author       = {Hamza Khemissa and
                  Djamel Tandjaoui and
                  Samia Bouzefrane},
  title        = {An efficient authentication and key agreement scheme for e-health
                  applications in the context of internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {355--390},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101926},
  doi          = {10.1504/IJICS.2019.101926},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhemissaTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiZ19,
  author       = {Jiaying Li and
                  Baowen Zhang},
  title        = {An ontology-based approach to improve access policy administration
                  of attribute-based access control},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {391--412},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101928},
  doi          = {10.1504/IJICS.2019.101928},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ManikandasaranA19,
  author       = {S. S. Manikandasaran and
                  Lawrence Arockiam and
                  P. D. Sheba Kezia Malarchelvi},
  title        = {MONcrypt: a technique to ensure the confidentiality of outsourced
                  data in cloud storage},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {1--16},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096846},
  doi          = {10.1504/IJICS.2019.096846},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ManikandasaranA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MuTL19,
  author       = {Sheng{-}dong Mu and
                  Yixiang Tian and
                  Yiwei Luo},
  title        = {A study of the internet financial interest rate risk evaluation index
                  system in cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {103--119},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098198},
  doi          = {10.1504/IJICS.2019.098198},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MuTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NishaP19,
  author       = {T. N. Nisha and
                  Dhanya Pramod},
  title        = {Sequential pattern analysis for event-based intrusion detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {476--492},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101936},
  doi          = {10.1504/IJICS.2019.101936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NishaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RasheedNGF19,
  author       = {Mohammad M. Rasheed and
                  Norita Md Norwawi and
                  Osman Ghazali and
                  Munadil K. Faaeq},
  title        = {Detection algorithm for internet worms scanning that used user datagram
                  protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {17--32},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096847},
  doi          = {10.1504/IJICS.2019.096847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RasheedNGF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RevaneshSA19,
  author       = {M. Revanesh and
                  V. Sridhar and
                  John M. Acken},
  title        = {{CB-ALCA:} a cluster-based adaptive lightweight cryptographic algorithm
                  for secure routing in wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {637--662},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103108},
  doi          = {10.1504/IJICS.2019.103108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RevaneshSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sajedi19,
  author       = {Hedieh Sajedi},
  title        = {An ensemble algorithm for discovery of malicious web pages},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {203--213},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099408},
  doi          = {10.1504/IJICS.2019.099408},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sajedi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaB19,
  author       = {Kirti Sharma and
                  Shobha Bhatt},
  title        = {{SQL} injection attacks - a systematic review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {493--509},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101937},
  doi          = {10.1504/IJICS.2019.101937},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZ19,
  author       = {Jaryn Shen and
                  Qingkai Zeng},
  title        = {{CSPS:} catchy short passwords making offline and online attacks impossible},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {255--274},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099434},
  doi          = {10.1504/IJICS.2019.099434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VenkateswarluK19,
  author       = {Isunuri Bala Venkateswarlu and
                  Jagadeesh Kakarla},
  title        = {Password security by encryption using an extended {ADFGVX} cipher},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {510--523},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101938},
  doi          = {10.1504/IJICS.2019.101938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VenkateswarluK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangXWH19,
  author       = {Haixing Wang and
                  Guiping Xiao and
                  Zhen Wei and
                  Tao Hai},
  title        = {Network optimisation for improving security and safety level of dangerous
                  goods transportation based on cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {160--177},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098204},
  doi          = {10.1504/IJICS.2019.098204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangXWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangY19,
  author       = {Xiaolei Wang and
                  Yuexiang Yang},
  title        = {PrivacyContext: identifying malicious mobile privacy leak using program
                  context},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {562--584},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103054},
  doi          = {10.1504/IJICS.2019.103054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XuSLMWLY19,
  author       = {He Xu and
                  Weiwei Shen and
                  Peng Li and
                  Keith Mayes and
                  Ruchuan Wang and
                  Dashen Li and
                  Shengxiang Yang},
  title        = {Novel implementation of defence strategy of relay attack based on
                  cloud in {RFID} systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {120--144},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098199},
  doi          = {10.1504/IJICS.2019.098199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XuSLMWLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YagoubKB19,
  author       = {Mohammed Amine Yagoub and
                  Okba Kazar and
                  Mounir Beggas},
  title        = {A multi-agent system approach based on cryptographic algorithm for
                  securing communications and protecting stored data in the cloud-computing
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {413--430},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101931},
  doi          = {10.1504/IJICS.2019.101931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YagoubKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YangJW19,
  author       = {Su Yang and
                  Shen Junwei and
                  Wang Wei},
  title        = {Reconfigurable design and implementation of nonlinear Boolean function
                  for cloud computing security platform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {145--159},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098201},
  doi          = {10.1504/IJICS.2019.098201},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YangJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YingyingH19,
  author       = {Mao Yingying and
                  Yuan Hao},
  title        = {Study on data fuzzy breakpoint detection in massive dynamic data flow},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {604--620},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103074},
  doi          = {10.1504/IJICS.2019.103074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YingyingH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YoussefNR19,
  author       = {Ben Charhi Youssef and
                  Mannane Nada and
                  Boubker Regragui},
  title        = {Behavioural analysis approach for {IDS} based on attack pattern and
                  risk assessment in cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {315--331},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101907},
  doi          = {10.1504/IJICS.2019.101907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YoussefNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangLH19,
  author       = {Xiao Zhang and
                  Shengli Liu and
                  Shuai Han},
  title        = {Proofs of retrievability from linearly homomorphic structure-preserving
                  signatures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {178--202},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098205},
  doi          = {10.1504/IJICS.2019.098205},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AmitaKK18,
  author       = {Amita and
                  Amandeep Kaur and
                  Marut Kumar},
  title        = {Reversible data hiding in absolute moment block truncation coding
                  compressed images using adaptive multilevel histogram shifting technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {261--275},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012572},
  doi          = {10.1504/IJICS.2018.10012572},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmitaKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzeemCDRR18,
  author       = {Muhammad Azeem and
                  Yongquan Cai and
                  Allah Ditta and
                  Khurram Gulzar Rana and
                  Faheem Akhtar Rajpoot},
  title        = {Information hiding: a novel algorithm for enhancement of cover text
                  capacity by using unicode characters},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {437--453},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095357},
  doi          = {10.1504/IJICS.2018.095357},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzeemCDRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW18,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang},
  title        = {An end-to-end user two-way authenticated double encrypted messaging
                  scheme based on hybrid {RSA} for the future internet architectures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {63--79},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10005506},
  doi          = {10.1504/IJICS.2018.10005506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW18a,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang and
                  Xing Li},
  title        = {Hybrid RSA-based highly efficient, reliable and strong personal full
                  mesh networked messaging scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {418--436},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095341},
  doi          = {10.1504/IJICS.2018.095341},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GoreDPE18,
  author       = {Ross Gore and
                  Saikou Y. Diallo and
                  Jose J. Padilla and
                  Barry Ezell},
  title        = {Assessing cyber-incidents using machine learning},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {341--360},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095298},
  doi          = {10.1504/IJICS.2018.095298},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GoreDPE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaG18,
  author       = {Shashank Gupta and
                  Brij Bhooshan Gupta},
  title        = {Robust injection point-based framework for modern applications against
                  {XSS} vulnerabilities in online social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {170--200},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012568},
  doi          = {10.1504/IJICS.2018.10012568},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HotaSS18,
  author       = {H. S. Hota and
                  Dinesh K. Sharma and
                  Akhilesh Kumar Shrivas},
  title        = {Development of an efficient classifier using proposed sensitivity-based
                  feature selection technique for intrusion detection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {80--101},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010649},
  doi          = {10.1504/IJICS.2018.10010649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HotaSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JainG18,
  author       = {Ankit Kumar Jain and
                  Brij B. Gupta},
  title        = {Detection of phishing attacks in financial and e-banking websites
                  using link and visual similarity relation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {398--417},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095303},
  doi          = {10.1504/IJICS.2018.095303},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JainG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KarNK18,
  author       = {Dulal C. Kar and
                  Anusha Madhuri Nakka and
                  Ajay K. Katangur},
  title        = {A new statistical attack resilient steganography scheme for hiding
                  messages in audio files},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {276--302},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012578},
  doi          = {10.1504/IJICS.2018.10012578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KarNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarSB18,
  author       = {C. Pavan Kumar and
                  R. Selvakumar and
                  Raghunadh K. Bhattar},
  title        = {Reliable and secure communication using fundamental cut-sets and fundamental
                  circuits},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {41--62},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010648},
  doi          = {10.1504/IJICS.2018.10010648},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiS18,
  author       = {Shaojing Li and
                  Wanli Su},
  title        = {The research of reputation incentive mechanism of {P2P} network file
                  sharing system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {149--169},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012570},
  doi          = {10.1504/IJICS.2018.10012570},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohindruS18,
  author       = {Vandana Mohindru and
                  Yashwant Singh},
  title        = {Node authentication algorithm for securing static wireless sensor
                  networks from node clone attack},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {129--148},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012571},
  doi          = {10.1504/IJICS.2018.10012571},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohindruS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoonR18,
  author       = {Sunil K. Moon and
                  Rajeshree D. Raut},
  title        = {Innovative data security model using forensic audio video steganography
                  for improving hidden data security and robustness},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {374--397},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095300},
  doi          = {10.1504/IJICS.2018.095300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoonR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoumniFT18,
  author       = {Soufiane El Moumni and
                  Mohamed Fettach and
                  Abderrahim Tragha},
  title        = {High frequency implementation of cryptographic hash function Keccak-512
                  on {FPGA} devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {361--373},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095299},
  doi          = {10.1504/IJICS.2018.095299},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoumniFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PalR18,
  author       = {Arup Kumar Pal and
                  Soumitra Roy},
  title        = {A robust and blind image watermarking scheme in {DCT} domain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {321--340},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095296},
  doi          = {10.1504/IJICS.2018.095296},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PalR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PathakRC18,
  author       = {Sanchita Pathak and
                  Ratnakirti Roy and
                  Suvamoy Changder},
  title        = {Performance analysis of image steganalysis techniques and future research
                  directives},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1--24},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010646},
  doi          = {10.1504/IJICS.2018.10010646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PathakRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaSPT18,
  author       = {Rohit Raja and
                  Tilendra Shishir Sinha and
                  Raj Kumar Patra and
                  Shrikant Tiwari},
  title        = {Physiological trait-based biometrical authentication of human-face
                  using {LGXP} and {ANN} techniques},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {303--320},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012575},
  doi          = {10.1504/IJICS.2018.10012575},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaSPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajendranD18,
  author       = {Sujarani Rajendran and
                  Manivannan Doraipandian},
  title        = {A nonlinear two dimensional logistic-tent map for secure image communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {201--215},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012577},
  doi          = {10.1504/IJICS.2018.10012577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajendranD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RoyP18,
  author       = {Soumitra Roy and
                  Arup Kumar Pal},
  title        = {A robust reversible image watermarking scheme in {DCT} domain using
                  Arnold scrambling and histogram modification},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {216--236},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012576},
  doi          = {10.1504/IJICS.2018.10012576},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RoyP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShafiqYL18,
  author       = {Muhammad Shafiq and
                  Xiangzhan Yu and
                  Asif Ali Laghari},
  title        = {WeChat traffic classification using machine learning algorithms and
                  comparative analysis of datasets},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {109--128},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012574},
  doi          = {10.1504/IJICS.2018.10012574},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShafiqYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SongZ18,
  author       = {Lihua Song and
                  Xiaofeng Zhang},
  title        = {Improved pixel relevance based on Mahalanobis distance for image segmentation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {237--247},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012573},
  doi          = {10.1504/IJICS.2018.10012573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SongZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SumanaH18,
  author       = {M. Sumana and
                  K. S. Hareesha},
  title        = {Modelling a secure support vector machine classifier for private data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {25--40},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010647},
  doi          = {10.1504/IJICS.2018.10010647},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SumanaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SunZJ18,
  author       = {Yujuan Sun and
                  Xiaofeng Zhang and
                  Muwei Jian},
  title        = {3D reconstruction of human face from an input image under random lighting
                  condition},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {248--260},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012569},
  doi          = {10.1504/IJICS.2018.10012569},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SunZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-JarrahAJ17,
  author       = {Omar M. Al{-}Jarrah and
                  Moath Al{-}Ayoub and
                  Yaser Jararweh},
  title        = {Hierarchical detection of insider attacks in cloud computing systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {85--99},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003601},
  doi          = {10.1504/IJICS.2017.10003601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-JarrahAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Alsaghier17,
  author       = {Hisham M. Alsaghier},
  title        = {A secure mobile commerce framework based on community cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {100--113},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003604},
  doi          = {10.1504/IJICS.2017.10003604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Alsaghier17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnushaS17,
  author       = {K. Anusha and
                  E. Sathiyamoorthy},
  title        = {{MAM-ISSIDS:} multi-agent model-based intelligent and self-sharing
                  intrusion detection system for distributed network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {361--386},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008448},
  doi          = {10.1504/IJICS.2017.10008448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnushaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AroraT17,
  author       = {Vasudha Arora and
                  Shyam Sunder Tyagi},
  title        = {Update enabled multi-keyword searchable encryption scheme for secure
                  data outsourcing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {288--301},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008445},
  doi          = {10.1504/IJICS.2017.10008445},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AroraT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DabirAM17,
  author       = {Abes Dabir and
                  AbdelRahman Abdou and
                  Ashraf Matrawy},
  title        = {A survey on forensic event reconstruction systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {337--360},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008447},
  doi          = {10.1504/IJICS.2017.10008447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DabirAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DjellabB17,
  author       = {Rima Djellab and
                  Mohamed Benmohammed},
  title        = {A novel quantum distributed key management protocol for ring-organised
                  group},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {302--323},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10004329},
  doi          = {10.1504/IJICS.2017.10004329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DjellabB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaMB17,
  author       = {Amit Kr. Gupta and
                  Jyotsna Kumar Mandal and
                  Indrajit Bhattacharya},
  title        = {Mitigating selfish, blackhole and wormhole attacks in {DTN} in a secure,
                  cooperative way},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {130--155},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003609},
  doi          = {10.1504/IJICS.2017.10003609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JaiswalG17,
  author       = {Shruti Jaiswal and
                  Daya Gupta},
  title        = {Security engineering methods - in-depth analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {180--211},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005903},
  doi          = {10.1504/IJICS.2017.10005903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JaiswalG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KasanaSB17,
  author       = {Geeta Kasana and
                  Kulbir Singh and
                  Satvinder Singh Bhatia},
  title        = {Data hiding using lifting scheme and genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {271--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008444},
  doi          = {10.1504/IJICS.2017.10008444},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KasanaSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Khan17,
  author       = {Arif Khan},
  title        = {Virtual machine security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {49--84},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003599},
  doi          = {10.1504/IJICS.2017.10003599},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Khan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Manasrah17,
  author       = {Ahmad M. Manasrah},
  title        = {Dynamic weighted {VM} load balancing for cloud-analyst},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {5--19},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003596},
  doi          = {10.1504/IJICS.2017.10003596},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Manasrah17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MenesidouK17,
  author       = {Sofia{-}Anna Menesidou and
                  Vasilios Katos},
  title        = {Opportunistic key management in delay tolerant networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {212--228},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005904},
  doi          = {10.1504/IJICS.2017.10005904},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MenesidouK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Montasari17,
  author       = {Reza Montasari},
  title        = {A standardised data acquisition process model for digital forensic
                  investigations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {229--249},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005908},
  doi          = {10.1504/IJICS.2017.10005908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Montasari17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RangasamyKKV17,
  author       = {Jothi Rangasamy and
                  Lakshmi Kuppusamy and
                  Gopi Krishnan and
                  Velmurugan},
  title        = {Evaluation of puzzle-enabled proxy-assisted denial-of-service protection
                  for web services},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {114--129},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003606},
  doi          = {10.1504/IJICS.2017.10003606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RangasamyKKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaniB17,
  author       = {Prathuri Jhansi Rani and
                  S. Durga Bhavani},
  title        = {Keyed hash function using Bernoulli shift map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {250--270},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005909},
  doi          = {10.1504/IJICS.2017.10005909},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaniB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TawalbehAJA17,
  author       = {Lo'ai Ali Tawalbeh and
                  Fadi Ababneh and
                  Yaser Jararweh and
                  Fahd M. Al{-}Dosari},
  title        = {Trust delegation-based secure mobile cloud computing framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {36--48},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003598},
  doi          = {10.1504/IJICS.2017.10003598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TouaziOBB17,
  author       = {Djoudi Touazi and
                  Mawloud Omar and
                  Abdelhakim Bendib and
                  Abdelmadjid Bouabdallah},
  title        = {A trust-based approach for securing data communication in delay tolerant
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {324--336},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008446},
  doi          = {10.1504/IJICS.2017.10008446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TouaziOBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZearSK17,
  author       = {Aditi Zear and
                  Amit Kumar Singh and
                  Pardeep Kumar},
  title        = {Robust watermarking technique using back propagation neural network:
                  a security protection mechanism for social applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {20--35},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003597},
  doi          = {10.1504/IJICS.2017.10003597},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZearSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZengCX17,
  author       = {Lei Zeng and
                  Hui Chen and
                  Yang Xiao},
  title        = {Accountable administration in operating systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {157--179},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005900},
  doi          = {10.1504/IJICS.2017.10005900},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZengCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Ammayappan16,
  author       = {Kavitha Ammayappan},
  title        = {Formally verified {TSM} centric privacy preserving {NFC} mobile payment
                  framework and protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {181--204},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078126},
  doi          = {10.1504/IJICS.2016.078126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Ammayappan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BabuIRSN16,
  author       = {M. Swagath Babu and
                  G. Idayachandran and
                  A. Rajesh and
                  T. Shankar and
                  Rangaswamy Nakkeeran},
  title        = {Investigation on defected ground-plane structures to improve isolation
                  and correlation in multi-band {MIMO} antenna},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {258--271},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079186},
  doi          = {10.1504/IJICS.2016.079186},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BabuIRSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BeloucifNN16,
  author       = {Assia Beloucif and
                  Oussama Noui and
                  Lemnouar Noui},
  title        = {Design of a tweakable image encryption algorithm using chaos-based
                  schema},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {205--220},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079183},
  doi          = {10.1504/IJICS.2016.079183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BeloucifNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CS16,
  author       = {Pramod T. C and
                  N. R. Sunitha},
  title        = {Key pre-distribution schemes to support various architectural deployment
                  models in {WSN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {139--157},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078124},
  doi          = {10.1504/IJICS.2016.078124},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DhavaleDPP16,
  author       = {Sunita Vikrant Dhavale and
                  Rajendra S. Deodhar and
                  Debasish Pradhan and
                  L. M. Patnaik},
  title        = {A robust zero watermarking algorithm for stereo audio signals},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {330--346},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001268},
  doi          = {10.1504/IJICS.2016.10001268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DhavaleDPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GayathriS16,
  author       = {J. Gayathri and
                  S. Subashini},
  title        = {A survey on security and efficiency issues in chaotic image encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {347--381},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001271},
  doi          = {10.1504/IJICS.2016.10001271},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GayathriS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GhalebZR16,
  author       = {Fuad A. Ghaleb and
                  Anazida Zainal and
                  Murad A. Rassam},
  title        = {Mobility information estimation algorithm using Kalman-filter for
                  vehicular ad hoc networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {221--240},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079184},
  doi          = {10.1504/IJICS.2016.079184},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GhalebZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GhebghoubOB16,
  author       = {Yasmina Ghebghoub and
                  Saliha Oukid and
                  Omar Boussaid},
  title        = {An {MDA} approach to secure access to data on cloud using implicit
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {107--120},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078120},
  doi          = {10.1504/IJICS.2016.078120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GhebghoubOB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GnanambigaiR16,
  author       = {J. Gnanambigai and
                  N. Rengarajan},
  title        = {A novel approach to enhance the network lifetime for hybrid routing
                  protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {95--106},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078117},
  doi          = {10.1504/IJICS.2016.078117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GnanambigaiR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Kisore16,
  author       = {N. Raghu Kisore},
  title        = {A qualitative framework for evaluating buffer overflow protection
                  mechanisms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {272--307},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079187},
  doi          = {10.1504/IJICS.2016.079187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Kisore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OuadaOBT16,
  author       = {Farah{-}Sarah Ouada and
                  Mawloud Omar and
                  Abdelmadjid Bouabdallah and
                  Abdelkamel Tari},
  title        = {Lightweight identity-based authentication protocol for wireless sensor
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {121--138},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078123},
  doi          = {10.1504/IJICS.2016.078123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OuadaOBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PhadikarJPM16,
  author       = {Amit Phadikar and
                  Poulami Jana and
                  Baisakhi Sur Phadikar and
                  Goutam Kumar Maity},
  title        = {Reversible watermarking using channel coding and lifting for cultural
                  heritage and medical image},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {34--54},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075308},
  doi          = {10.1504/IJICS.2016.075308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PhadikarJPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PraherS16,
  author       = {Christian Praher and
                  Michael Sonntag},
  title        = {Applicability of keystroke dynamics as a biometric security feature
                  for mobile touchscreen devices with virtualised keyboards},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {72--91},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075311},
  doi          = {10.1504/IJICS.2016.075311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PraherS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaboinaRKV16,
  author       = {RajaSekhar Rajaboina and
                  P. Chenna Reddy and
                  Raja Ashok Kumar and
                  Nangil Venkatramana},
  title        = {Performance comparison of TCP, {UDP} and {TFRC} in static wireless
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {158--180},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078125},
  doi          = {10.1504/IJICS.2016.078125},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaboinaRKV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahayiniM16,
  author       = {T. Sahayini and
                  M. S. K. Manikandan},
  title        = {Enhancing the security of modern {ICT} systems with multimodal biometric
                  cryptosystem and continuous user authentication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {55--71},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075310},
  doi          = {10.1504/IJICS.2016.075310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahayiniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahooT16,
  author       = {Anoop Jyoti Sahoo and
                  Rajesh Kumar Tiwari},
  title        = {A novel approach for hiding secret data in program files},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {1--10},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075305},
  doi          = {10.1504/IJICS.2016.075305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahooT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sood16,
  author       = {Sandeep K. Sood},
  title        = {Advanced dynamic identity-based authentication protocol using smart
                  card},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {11--33},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075307},
  doi          = {10.1504/IJICS.2016.075307},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sood16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TripathiS16,
  author       = {Anshu Tripathi and
                  Umesh Kumar Singh},
  title        = {Application of quantitative security measurement model for prioritisation
                  of vulnerability mitigation: a real case study},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {309--329},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001267},
  doi          = {10.1504/IJICS.2016.10001267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TripathiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VeeramreddyV16,
  author       = {Jyothsna Veeramreddy and
                  Rama Prasad V. Vaddella},
  title        = {Anomaly-based network intrusion detection through assessing feature
                  association impact scale},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {241--257},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079185},
  doi          = {10.1504/IJICS.2016.079185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VeeramreddyV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangJL16,
  author       = {Shengzhi Zhang and
                  Xiaoqi Jia and
                  Peng Liu},
  title        = {Towards service continuity for transactional applications via diverse
                  device drivers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {382--400},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001273},
  doi          = {10.1504/IJICS.2016.10001273},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CurranMH15,
  author       = {Kevin Curran and
                  Vivian Maynes and
                  Declan Harkin},
  title        = {Mobile device security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069205},
  doi          = {10.1504/IJICS.2015.069205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CurranMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhouryT15,
  author       = {Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  title        = {Equivalence-preserving corrective enforcement of security properties},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {113--139},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073011},
  doi          = {10.1504/IJICS.2015.073011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhouryT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarM15,
  author       = {Rakesh Kumar and
                  Geetu Mahajan},
  title        = {A novel framework for secure file transmission using modified {AES}
                  and {MD5} algorithms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {91--112},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073012},
  doi          = {10.1504/IJICS.2015.073012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Mahoney15,
  author       = {William R. Mahoney},
  title        = {Modifications to {GCC} for increased software privacy},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {160--176},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073024},
  doi          = {10.1504/IJICS.2015.073024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Mahoney15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MantasSGJG15,
  author       = {Georgios Mantas and
                  Natalia Stakhanova and
                  Hugo Gonzalez and
                  Hossein Hadian Jazi and
                  Ali A. Ghorbani},
  title        = {Application-layer denial of service attacks: taxonomy and survey},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {216--239},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073028},
  doi          = {10.1504/IJICS.2015.073028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MantasSGJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NiuZXY15,
  author       = {Lei Niu and
                  Changqing Zhang and
                  Qi Xia and
                  Yong Yu},
  title        = {Advanced security analysis of a signature scheme with message recovery},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {39--48},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069212},
  doi          = {10.1504/IJICS.2015.069212},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/NiuZXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OlaniyiAOO15,
  author       = {Olayemi M. Olaniyi and
                  Oladiran T. Arulogun and
                  Oluwasayo E. Omidiora and
                  Oladotun Olusola Okediran},
  title        = {Implementing generic security requirements in e-voting using modified
                  stegano-cryptographic approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {64--90},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069214},
  doi          = {10.1504/IJICS.2015.069214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OlaniyiAOO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Pan15,
  author       = {Jonathan Pan},
  title        = {Data leakage triage: quantitative measure of effectiveness of containment
                  plan},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {240--254},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073032},
  doi          = {10.1504/IJICS.2015.073032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Pan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PrasanthB15,
  author       = {Narayanan Prasanth and
                  Kannan Balasubramanian},
  title        = {Performance analysis of buffered crossbar switch scheduling algorithms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {49--63},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069208},
  doi          = {10.1504/IJICS.2015.069208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PrasanthB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RoySC15,
  author       = {Ratnakirti Roy and
                  Shabnam Samima and
                  Suvamoy Changder},
  title        = {A map-based image steganography scheme for {RGB} images},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {196--215},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073026},
  doi          = {10.1504/IJICS.2015.073026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RoySC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThangavelVMN15,
  author       = {M. Thangavel and
                  P. Varalakshmi and
                  Mukund Murrali and
                  K. Nithya},
  title        = {Secure file storage and retrieval in cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {177--195},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073025},
  doi          = {10.1504/IJICS.2015.073025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThangavelVMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangR15,
  author       = {Peng Wang and
                  Chinya V. Ravishankar},
  title        = {Hierarchical policy delegation in multiple-authority {ABE}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {140--159},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073020},
  doi          = {10.1504/IJICS.2015.073020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XuLM15,
  author       = {Haixia Xu and
                  Bao Li and
                  Qixiang Mei},
  title        = {Complementary witness soundness for witness indistinguishable proof
                  system and {CCA2} public-key encryption schemes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {14--38},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069211},
  doi          = {10.1504/IJICS.2015.069211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XuLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlEroudKSH14,
  author       = {Ahmed Aleroud and
                  George Karabatis and
                  Prayank Sharma and
                  Peng He},
  title        = {Context and semantics for detection of cyber attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {63--92},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059791},
  doi          = {10.1504/IJICS.2014.059791},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlEroudKSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AliA14,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {Attribute-based group signature without random oracles with attribute
                  anonymity},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {109--132},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065162},
  doi          = {10.1504/IJICS.2014.065162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AliA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AngamuthuR14,
  author       = {Muthulakshmi Angamuthu and
                  Anitha Ramalingam},
  title        = {Identity-based broadcast encryption for multi-privileged groups using
                  Chinese remainder theorem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {286--305},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066661},
  doi          = {10.1504/IJICS.2014.066661},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AngamuthuR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ArogundadeJY14,
  author       = {Oluwasefunmi 'Tale Arogundade and
                  Zhi Jin and
                  Xiaoguang Yang},
  title        = {Towards ontological approach to eliciting risk-based security requirements},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {143--178},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065168},
  doi          = {10.1504/IJICS.2014.065168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ArogundadeJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BagadeT14,
  author       = {Anant M. Bagade and
                  Sanjay N. Talbar},
  title        = {Secure transmission of morphed stego keys over internet using {IP}
                  steganography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {133--142},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065164},
  doi          = {10.1504/IJICS.2014.065164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BagadeT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Choi14,
  author       = {Hyunjun Choi},
  title        = {Image encryption method for depth + texture video contents},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {333--343},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068093},
  doi          = {10.1504/IJICS.2014.068093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Choi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DasCGD14,
  author       = {Suvrojit Das and
                  Debayan Chatterjee and
                  Debidas Ghosh and
                  Narayan C. Debnath},
  title        = {Extracting the system call identifier from within {VFS:} a kernel
                  stack parsing-based approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {12--50},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059786},
  doi          = {10.1504/IJICS.2014.059786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DasCGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/FerragNG14,
  author       = {Mohamed Amine Ferrag and
                  Mehdi Nafa and
                  Salim Ghanemi},
  title        = {{SDPP:} an intelligent secure detection scheme with strong privacy-preserving
                  for mobile peer-to-peer social network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {241--269},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066650},
  doi          = {10.1504/IJICS.2014.066650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/FerragNG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/IsmailMN14,
  author       = {Ismahani Binti Ismail and
                  Muhammad Nadzir Marsono and
                  Sulaiman Mohd Nor},
  title        = {Malware detection using augmented naive Bayes with domain knowledge
                  and under presence of class noise},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {179--197},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065173},
  doi          = {10.1504/IJICS.2014.065173},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/IsmailMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KangKJK14,
  author       = {Yong Ho Kang and
                  Kimoon Keum and
                  Changbok Jang and
                  Joo Man Kim},
  title        = {Study of mobile virtualisation-based security technology for smartwork
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {311--321},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068095},
  doi          = {10.1504/IJICS.2014.068095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KangKJK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KimH14,
  author       = {Man Ki Kim and
                  You Sik Hong},
  title        = {Development {AI} traffic-safety system using {RFID} technique and
                  {USN} theory},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {322--332},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068098},
  doi          = {10.1504/IJICS.2014.068098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KimH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KuppuswamyA14,
  author       = {Prakash Kuppuswamy and
                  Saeed Q. Y. Al{-}Khalidi},
  title        = {Hybrid encryption/decryption technique using new public key and symmetric
                  key algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {372--382},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068103},
  doi          = {10.1504/IJICS.2014.068103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KuppuswamyA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Lee14,
  author       = {Kyujin Lee},
  title        = {An iterative layered interference canceller scheme for {OFDM} in wireless
                  mesh security networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {344--353},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068094},
  doi          = {10.1504/IJICS.2014.068094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Lee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MangleP14,
  author       = {Andrew Mangle and
                  Sandip C. Patel},
  title        = {Issues in user authentication using security questions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {383--407},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068100},
  doi          = {10.1504/IJICS.2014.068100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MangleP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaB14,
  author       = {P. M. Siva Raja and
                  E. Baburaj},
  title        = {Genetic algorithms based data hiding scheme for digital images with
                  {LSBMR}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {51--62},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059787},
  doi          = {10.1504/IJICS.2014.059787},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Rasheed14,
  author       = {Hassan Rasheed},
  title        = {Vulnerability distribution scoring for software product security assessment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {270--285},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066653},
  doi          = {10.1504/IJICS.2014.066653},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Rasheed14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SakthivelVK14,
  author       = {R. Sakthivel and
                  M. Vanitha and
                  Harish M. Kittur},
  title        = {Low power high throughput reconfigurable stream cipher hardware {VLSI}
                  architectures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059785},
  doi          = {10.1504/IJICS.2014.059785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SakthivelVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZSL14,
  author       = {Limin Shen and
                  Futai Zhang and
                  Yinxia Sun and
                  Sujuan Li},
  title        = {Cryptanalysis and improvement on a certificateless encryption scheme
                  in the standard model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {354--371},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068104},
  doi          = {10.1504/IJICS.2014.068104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TsitroulisLT14,
  author       = {Achilleas Tsitroulis and
                  Dimitris Lampoudis and
                  Emmanuel Tsekleves},
  title        = {Exposing {WPA2} security protocol vulnerabilities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {93--107},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059797},
  doi          = {10.1504/IJICS.2014.059797},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TsitroulisLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VinodLGC14,
  author       = {P. Vinod and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Grijesh Chauhan},
  title        = {Detecting malicious files using non-signature-based methods},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {199--240},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066646},
  doi          = {10.1504/IJICS.2014.066646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-HaijaB13,
  author       = {Qasem Abu Al{-}Haija and
                  Ahmad Al Badawi},
  title        = {Cost-effective design for binary Edwards elliptic curves crypto-processor
                  over {GF} (2\({}^{\mbox{N}}\)) using parallel multipliers and architectures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {236--250},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.055840},
  doi          = {10.1504/IJICS.2013.055840},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-HaijaB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-khassawenehT13,
  author       = {Mahmood Al{-}khassaweneh and
                  Shefa Tawalbeh},
  title        = {A value transformation and random permutation-based coloured image
                  encryption technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {290--300},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058212},
  doi          = {10.1504/IJICS.2013.058212},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-khassawenehT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AouinatouB13,
  author       = {Rkia Aouinatou and
                  Mostafa Belkasmi},
  title        = {On the conventional public key in identification-based encryption:
                  the case of {RSA}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {171--201},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.055837},
  doi          = {10.1504/IJICS.2013.055837},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AouinatouB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Ma13,
  author       = {Zhanshan Ma},
  title        = {First passage time and first passage percolation models for analysing
                  network resilience and effective strategies in strategic information
                  warfare research: a brief survey and perspective},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {334--358},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058219},
  doi          = {10.1504/IJICS.2013.058219},
  timestamp    = {Sun, 11 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Ma13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MahajanK13,
  author       = {Manish Mahajan and
                  Navdeep Kaur},
  title        = {Steganography in coloured images using wavelet domain-based saliency
                  map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {224--235},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.055839},
  doi          = {10.1504/IJICS.2013.055839},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MahajanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NatwichaiLK13,
  author       = {Juggapong Natwichai and
                  Xue Li and
                  Asanee Kawtrakul},
  title        = {Incremental processing and indexing for (k, e)-anonymisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {151--170},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.055836},
  doi          = {10.1504/IJICS.2013.055836},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/NatwichaiLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SanthiTA13,
  author       = {V. Santhi and
                  Arunkumar Thangavelu and
                  Pachiyappan Arulmozhivarman},
  title        = {Adaptive visible watermarking in Hadamard domain for digital images},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {202--223},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.055838},
  doi          = {10.1504/IJICS.2013.055838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SanthiTA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaGZMS13,
  author       = {Anup C. Sharma and
                  Robin A. Gandhi and
                  Qiuming Zhu and
                  William R. Mahoney and
                  William L. Sousan},
  title        = {A social dimensional cyber threat model with formal concept analysis
                  and fact-proposition inference},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {301--333},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058213},
  doi          = {10.1504/IJICS.2013.058213},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaGZMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TeoA13,
  author       = {Lawrence Teo and
                  Gail{-}Joon Ahn},
  title        = {Extensible policy framework for heterogeneous network environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {251--274},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058210},
  doi          = {10.1504/IJICS.2013.058210},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TeoA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TripathiS13,
  author       = {Anshu Tripathi and
                  Umesh Kumar Singh},
  title        = {Evaluation of severity index of vulnerability categories},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {275--289},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058211},
  doi          = {10.1504/IJICS.2013.058211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TripathiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Bernardo12,
  author       = {Danilo Valeros Bernardo},
  title        = {Security risk assessment: toward a comprehensive practical risk management},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {77--104},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051775},
  doi          = {10.1504/IJICS.2012.051775},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Bernardo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GaoMJY12,
  author       = {Haichang Gao and
                  Licheng Ma and
                  Wei Jia and
                  Fei Ye},
  title        = {Multiple password interference in graphical passwords},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {11--27},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051078},
  doi          = {10.1504/IJICS.2012.051078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GaoMJY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hedabou12,
  author       = {Mustapha Hedabou},
  title        = {Securing pairing-based cryptography on smartcards},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {68--76},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051091},
  doi          = {10.1504/IJICS.2012.051091},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hedabou12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MehtaVN12,
  author       = {Sachin Mehta and
                  Vijayaraghavan Varadharajan and
                  Rajarathnam Nallusamy},
  title        = {Tampering resistant self recoverable watermarking method using error
                  correction codes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {28--47},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051089},
  doi          = {10.1504/IJICS.2012.051089},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MehtaVN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PanF12,
  author       = {Jonathan Pan and
                  Chun Che Fung},
  title        = {An agent-based model to simulate coordinated response to malware outbreak
                  within an organisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {115--131},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051777},
  doi          = {10.1504/IJICS.2012.051777},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PanF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SalamL12,
  author       = {Md. Iftekhar Salam and
                  Hoon{-}Jae Lee},
  title        = {On the algebraic attack against summation type keystream generators},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {132--149},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051778},
  doi          = {10.1504/IJICS.2012.051778},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SalamL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SubramanianSRL12,
  author       = {Vimalathithan Subramanian and
                  Remzi Seker and
                  Srini Ramaswamy and
                  Rathinasamy B. Lenin},
  title        = {{PCIEF:} a policy conflict identification and evaluation framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {48--67},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051090},
  doi          = {10.1504/IJICS.2012.051090},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SubramanianSRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VesalF12,
  author       = {Somayeh Naderi Vesal and
                  Mohammad Fathian},
  title        = {Efficient and secure credit card payment protocol for mobile devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {105--114},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051776},
  doi          = {10.1504/IJICS.2012.051776},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VesalF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XuLG12,
  author       = {Zhongqiu Xu and
                  Liangju Li and
                  Haibo Gao},
  title        = {Bandwidth efficient buyer-seller watermarking protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {1--10},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJICS.2012.051079},
  doi          = {10.1504/IJICS.2012.051079},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XuLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-khassaweneh11,
  author       = {Mahmood Al{-}khassaweneh},
  title        = {Image encryption method based on using least square error techniques
                  at the decryption stage},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {332--344},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.044823},
  doi          = {10.1504/IJICS.2011.044823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-khassaweneh11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Desoky11,
  author       = {Abdelrahman Desoky},
  title        = {Sumstega: summarisation-based steganography methodology},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {234--263},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040182},
  doi          = {10.1504/IJICS.2011.040182},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Desoky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GaaloulPZCG11,
  author       = {Khaled Gaaloul and
                  Henderik Alex Proper and
                  Ehtesham Zahoor and
                  Fran{\c{c}}ois Charoy and
                  Claude Godart},
  title        = {A logical framework for reasoning about delegation policies in workflow
                  management systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {365--388},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.044825},
  doi          = {10.1504/IJICS.2011.044825},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GaaloulPZCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HuL11,
  author       = {Defa Hu and
                  Juanjuan Luo},
  title        = {Digital fingerprinting: problems and solutions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {316--331},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.044822},
  doi          = {10.1504/IJICS.2011.044822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JinA11,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn},
  title        = {Assured resource sharing in Grid environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {215--233},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040181},
  doi          = {10.1504/IJICS.2011.040181},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JinA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KarthigaikumarB11,
  author       = {P. Karthigaikumar and
                  K. Baskaran and
                  K. Jaraline Kirubavathy},
  title        = {Low power implementation of audio watermarking using chirp spread
                  spectrum technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {199--214},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040180},
  doi          = {10.1504/IJICS.2011.040180},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KarthigaikumarB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Ma11,
  author       = {Zhanshan (Sam) Ma},
  title        = {Frailty modelling for risk analysis in network security and survivability},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {276--294},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040184},
  doi          = {10.1504/IJICS.2011.040184},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Ma11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Oladayo11,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {RC42's innovative way for data security in wireless data communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {264--275},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.040183},
  doi          = {10.1504/IJICS.2011.040183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Oladayo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Rrushi11,
  author       = {Julian L. Rrushi},
  title        = {Anomaly detection via statistical learning in industrial communication
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {295--315},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.044821},
  doi          = {10.1504/IJICS.2011.044821},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Rrushi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SodiyaAO11,
  author       = {Adesina S. Sodiya and
                  A. Afolorunso and
                  Omoniyi Paul Ogunderu},
  title        = {A countermeasure algorithm for password guessing attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {345--364},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICS.2011.044824},
  doi          = {10.1504/IJICS.2011.044824},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SodiyaAO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AtluriGSV10,
  author       = {Vijayalakshmi Atluri and
                  Qi Guo and
                  Heechang Shin and
                  Jaideep Vaidya},
  title        = {A unified index structure for efficient enforcement of spatiotemporal
                  authorisations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {118--151},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.034814},
  doi          = {10.1504/IJICS.2010.034814},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AtluriGSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Awasthi10,
  author       = {Amit K. Awasthi},
  title        = {Remarks on the security of the strong proxy signature scheme with
                  proxy signer privacy protection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {24--29},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031857},
  doi          = {10.1504/IJICS.2010.031857},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Awasthi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChiouCY10,
  author       = {Che Wun Chiou and
                  Fu{-}Hua Chou and
                  Yun{-}Chi Yeh},
  title        = {Speeding up Euclid's {GCD} algorithm with no magnitude comparisons},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--8},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031855},
  doi          = {10.1504/IJICS.2010.031855},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChiouCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Desoky10,
  author       = {Abdelrahman Desoky},
  title        = {Comprehensive linguistic steganography survey},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {164--197},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.034816},
  doi          = {10.1504/IJICS.2010.034816},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Desoky10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hu10,
  author       = {Shiyan Hu},
  title        = {A secure partition-based document image watermarking scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {9--23},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031856},
  doi          = {10.1504/IJICS.2010.031856},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HuL10,
  author       = {Defa Hu and
                  Qiaoliang Li},
  title        = {Bandwidth efficient asymmetric fingerprinting based on one-out-of-two
                  oblivious transfer},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {152--163},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.034815},
  doi          = {10.1504/IJICS.2010.034815},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HuL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Ma10,
  author       = {Zhanshan (Sam) Ma},
  title        = {An integrated approach to network intrusion detection with block clustering
                  analysis, generalised logistic regression and linear discriminant
                  analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {76--97},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031860},
  doi          = {10.1504/IJICS.2010.031860},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Ma10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/QinA10,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  title        = {Semantics-aware security policy specification for the semantic web
                  data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {52--75},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031859},
  doi          = {10.1504/IJICS.2010.031859},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/QinA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangWCZ10,
  author       = {Ping Wang and
                  Lei Wu and
                  Ryan Cunningham and
                  Cliff C. Zou},
  title        = {Honeypot detection in advanced botnet attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {30--51},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031858},
  doi          = {10.1504/IJICS.2010.031858},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangWCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WoodallB10,
  author       = {Philip Woodall and
                  Pearl Brereton},
  title        = {A systematic literature review of inference strategies},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {99--117},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.034813},
  doi          = {10.1504/IJICS.2010.034813},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WoodallB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/0001S09,
  author       = {Sanjay Rawat and
                  Ashutosh Saxena},
  title        = {Application security code analysis: a step towards software assurance},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {86--110},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.026622},
  doi          = {10.1504/IJICS.2009.026622},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/0001S09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BertolissiF09,
  author       = {Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez},
  title        = {Distributed event-based access control},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {306--320},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031042},
  doi          = {10.1504/IJICS.2009.031042},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BertolissiF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Cuppens-Boulahia09,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Herv{\'{e}} Debar},
  title        = {An ontology-based approach to react to network attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {280--305},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031041},
  doi          = {10.1504/IJICS.2009.031041},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DewanDB09,
  author       = {Prashant Dewan and
                  Partha Dasgupta and
                  Amiya Bhattacharya},
  title        = {Mitigating routing vulnerabilities in ad hoc networks using reputations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {150--172},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.028811},
  doi          = {10.1504/IJICS.2009.028811},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DewanDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElhdhiliAK09,
  author       = {Mohamed Elhoucine Elhdhili and
                  Lamia Ben Azzouz and
                  Farouk Kamoun},
  title        = {REputation based Clustering Algorithm for security management in ad
                  hoc networks with liars},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {228--244},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031032},
  doi          = {10.1504/IJICS.2009.031032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ElhdhiliAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HietTMM09,
  author       = {Guillaume Hiet and
                  Val{\'{e}}rie Viet Triem Tong and
                  Ludovic M{\'{e}} and
                  Benjamin Morin},
  title        = {Policy-based intrusion detection in web applications by monitoring
                  Java information flows},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {265--279},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031040},
  doi          = {10.1504/IJICS.2009.031040},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HietTMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HuCKSC09,
  author       = {Hongbing Hu and
                  Yu Chen and
                  Wei{-}Shinn Ku and
                  Zhou Su and
                  Chung{-}Han Chen},
  title        = {Weighted trust evaluation-based malicious node detection for wireless
                  sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {132--149},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.028810},
  doi          = {10.1504/IJICS.2009.028810},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HuCKSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KallelCMJS09,
  author       = {Slim Kallel and
                  Anis Charfi and
                  Mira Mezini and
                  Mohamed Jmaiel and
                  Andreas Sewe},
  title        = {A holistic approach for access control policies: from formal specification
                  to aspect-based enforcement},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {337--354},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031044},
  doi          = {10.1504/IJICS.2009.031044},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KallelCMJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LongW09,
  author       = {Men Long and
                  Chwan{-}Hwa John Wu},
  title        = {Design and simulation on data-forwarding security in sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {173--194},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.028812},
  doi          = {10.1504/IJICS.2009.028812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LongW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LoulouJM09,
  author       = {Monia Loulou and
                  Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {Dynamic security framework for mobile agent systems: specification,
                  verification and enforcement},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {321--336},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031043},
  doi          = {10.1504/IJICS.2009.031043},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LoulouJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MostafaKF09,
  author       = {Mahmoud Mostafa and
                  Anas Abou El Kalam and
                  Christian Fraboul},
  title        = {A new protocol for security and QoS in {IP} networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {245--264},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031038},
  doi          = {10.1504/IJICS.2009.031038},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MostafaKF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NicolDO09,
  author       = {David M. Nicol and
                  Charles M. Davis and
                  Thomas J. Overbye},
  title        = {A testbed for power system security evaluation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {114--131},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.028809},
  doi          = {10.1504/IJICS.2009.028809},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NicolDO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NikamA09,
  author       = {Shankar Bhausaheb Nikam and
                  Suneeta Agarwal},
  title        = {Wavelet-based multiresolution analysis of ridges for fingerprint liveness
                  detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {1--46},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.026619},
  doi          = {10.1504/IJICS.2009.026619},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NikamA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Renaud09,
  author       = {Karen Renaud},
  title        = {Guidelines for designing graphical authentication mechanism interfaces},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {60--85},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.026621},
  doi          = {10.1504/IJICS.2009.026621},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Renaud09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WuLHI09,
  author       = {Chwan{-}Hwa John Wu and
                  Tong Liu and
                  Chun{-}Ching Andy Huang and
                  J. David Irwin},
  title        = {Modelling and simulations for Identity-Based Privacy-Protected Access
                  Control Filter {(IPACF)} capability to resist massive denial of service
                  attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {195--223},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.028813},
  doi          = {10.1504/IJICS.2009.028813},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WuLHI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YangMZ09,
  author       = {Min Yang and
                  Qingshu Meng and
                  Huanguo Zhang},
  title        = {The evolutionary design of trace form bent functions in cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {47--59},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.026620},
  doi          = {10.1504/IJICS.2009.026620},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YangMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-AhmadiRW08,
  author       = {Mohammad Saad Al{-}Ahmadi and
                  Peter A. Rosen and
                  Rick L. Wilson},
  title        = {Data mining performance on perturbed databases: important influences
                  on classification accuracy},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {71--85},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.016822},
  doi          = {10.1504/IJICS.2008.016822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-AhmadiRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-Somani08,
  author       = {Turki F. Al{-}Somani},
  title        = {Overlapped parallel computations of scalar multiplication with resistance
                  against Side Channel Attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {250--267},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.020605},
  doi          = {10.1504/IJICS.2008.020605},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-Somani08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChakrabortyGMS08,
  author       = {Anindya Chakraborty and
                  Manoj K. Garg and
                  Arun K. Majumdar and
                  Shamik Sural},
  title        = {Attack recovery from malicious transactions in distributed database
                  systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {197--217},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.018519},
  doi          = {10.1504/IJICS.2008.018519},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChakrabortyGMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KantarciogluK08,
  author       = {Murat Kantarcioglu and
                  Onur Kardes},
  title        = {Privacy-preserving data mining in the malicious model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {353--375},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.022488},
  doi          = {10.1504/IJICS.2008.022488},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KantarciogluK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhelladiCBB08,
  author       = {Lyes Khelladi and
                  Yacine Challal and
                  Abdelmadjid Bouabdallah and
                  Nadjib Badache},
  title        = {On security issues in embedded systems: challenges and solutions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {140--174},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.018515},
  doi          = {10.1504/IJICS.2008.018515},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhelladiCBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LinW08,
  author       = {Chien{-}Chuan Lin and
                  Ming{-}Shi Wang},
  title        = {Genetic-clustering algorithm for intrusion detection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {218--234},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.018521},
  doi          = {10.1504/IJICS.2008.018521},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LinW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuT08,
  author       = {Wei Lu and
                  Issa Traor{\'{e}}},
  title        = {Unsupervised anomaly detection using an evolutionary extension of
                  k-means algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {107--139},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.018513},
  doi          = {10.1504/IJICS.2008.018513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LuT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MavridisMPKI08,
  author       = {Ioannis Mavridis and
                  Andreas K. Mattas and
                  Ioannis Pagkalos and
                  Isabella Kotini and
                  Christos Ilioudis},
  title        = {Supporting dynamic administration of {RBAC} in web-based collaborative
                  applications during run-time},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {328--352},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.022487},
  doi          = {10.1504/IJICS.2008.022487},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MavridisMPKI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MukherjeeCG08,
  author       = {Shibnath Mukherjee and
                  Zhiyuan Chen and
                  Aryya Gangopadhyay},
  title        = {A fuzzy programming approach for data reduction and privacy in distance-based
                  mining},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {27--47},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.016820},
  doi          = {10.1504/IJICS.2008.016820},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MukherjeeCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ParameswaranB08,
  author       = {Rupa Parameswaran and
                  Douglas M. Blough},
  title        = {Privacy preserving data obfuscation for inherently clustered data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {4--26},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.016819},
  doi          = {10.1504/IJICS.2008.016819},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ParameswaranB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RiceGG08,
  author       = {Daniel O. Rice and
                  Robert S. Garfinkel and
                  Ram D. Gopal},
  title        = {{CVC-STAR:} Protecting data confidentiality while increasing flexibility
                  and quality of responses},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {175--196},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.018517},
  doi          = {10.1504/IJICS.2008.018517},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RiceGG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SaxenaS08,
  author       = {Amitabh Saxena and
                  Ben Soh},
  title        = {One-Way Signature Chaining: a new paradigm for group cryptosystems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {268--296},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.020606},
  doi          = {10.1504/IJICS.2008.020606},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SaxenaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghLA08,
  author       = {Aameek Singh and
                  Ling Liu and
                  Mustaque Ahamad},
  title        = {Privacy analysis and enhancements for data sharing in *nix systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {376--410},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.022489},
  doi          = {10.1504/IJICS.2008.022489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghLA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TingFT08,
  author       = {Daniel Ting and
                  Stephen E. Fienberg and
                  Mario Trottini},
  title        = {Random orthogonal matrix masking methodology for microdata release},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {86--105},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.016823},
  doi          = {10.1504/IJICS.2008.016823},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/TingFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VenkataramPBM08,
  author       = {Pallapa Venkataram and
                  Jeremy Pitt and
                  B. Sathish Babu and
                  Ebrahim Mamdani},
  title        = {An intelligent proactive security system for cyber centres using Cognitive
                  Agents},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {235--249},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.020604},
  doi          = {10.1504/IJICS.2008.020604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VenkataramPBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Wang0XZ08,
  author       = {Jie Wang and
                  Jun Zhang and
                  Shuting Xu and
                  Weijun Zhong},
  title        = {A novel data distortion approach via selective {SSVD} for privacy
                  protection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {48--70},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.016821},
  doi          = {10.1504/IJICS.2008.016821},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Wang0XZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WeiASPZF08,
  author       = {Huaqiang Wei and
                  Jim Alves{-}Foss and
                  Terence Soule and
                  Hugh Pforsich and
                  Du Zhang and
                  Deborah A. Frincke},
  title        = {A Layered Decision Model for cost-effective system security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {297--324},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.020607},
  doi          = {10.1504/IJICS.2008.020607},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WeiASPZF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Zuo08,
  author       = {Yanjun Zuo},
  title        = {Prompt damage identification for system survivability},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {411--433},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJICS.2008.022490},
  doi          = {10.1504/IJICS.2008.022490},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Zuo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AliO07,
  author       = {Khidir M. Ali and
                  Thomas J. Owens},
  title        = {Selection of an {EAP} authentication method for a {WLAN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {210--233},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012251},
  doi          = {10.1504/IJICS.2007.012251},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AliO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AtluriC07,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun},
  title        = {A geotemporal role-based authorisation system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {143--168},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012247},
  doi          = {10.1504/IJICS.2007.012247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AtluriC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AwasthiK07,
  author       = {Lalit Kumar Awasthi and
                  Prashant Kumar},
  title        = {A synchronous checkpointing protocol for mobile distributed systems:
                  probabilistic approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {298--314},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013957},
  doi          = {10.1504/IJICS.2007.013957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AwasthiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Bolan07,
  author       = {Christopher Bolan},
  title        = {Radio Frequency Identification: a review of low cost tag security
                  proposals},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {391--399},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015500},
  doi          = {10.1504/IJICS.2007.015500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Bolan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChangC07,
  author       = {Ya{-}Fen Chang and
                  Chin{-}Chen Chang},
  title        = {An RSA-based (t, n) threshold proxy signature scheme with freewill
                  identities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {201--209},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012250},
  doi          = {10.1504/IJICS.2007.012250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DamianiBP07,
  author       = {Maria Luisa Damiani and
                  Elisa Bertino and
                  Paolo Perlasca},
  title        = {Data security in location-aware applications: an approach based on
                  {RBAC}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {5--38},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012243},
  doi          = {10.1504/IJICS.2007.012243},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DamianiBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DuLW07,
  author       = {Timon C. Du and
                  Eldon Y. Li and
                  Jacqueline W. Wong},
  title        = {Document access control in organisational workflows},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {437--454},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015504},
  doi          = {10.1504/IJICS.2007.015504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DuLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HelmerWSHMWWS07,
  author       = {Guy G. Helmer and
                  Johnny Wong and
                  Mark Slagell and
                  Vasant G. Honavar and
                  Les Miller and
                  Yanxin Wang and
                  Xia Wang and
                  Natalia Stakhanova},
  title        = {Software fault tree and coloured Petri net-based specification, design
                  and implementation of agent-based intrusion detection systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {109--142},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012246},
  doi          = {10.1504/IJICS.2007.012246},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HelmerWSHMWWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hutchinson07,
  author       = {William Hutchinson},
  title        = {An information-centric and proactive approach to Information Security
                  teaching},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {369--377},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015498},
  doi          = {10.1504/IJICS.2007.015498},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hutchinson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/IndrakantiVA07,
  author       = {Sarath Indrakanti and
                  Vijay Varadharajan and
                  Ritesh Agarwal},
  title        = {On the design, implementation and application of an authorisation
                  architecture for web services},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {64--108},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012245},
  doi          = {10.1504/IJICS.2007.012245},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/IndrakantiVA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JansenGS07,
  author       = {Wayne A. Jansen and
                  Serban I. Gavrila and
                  Cl{\'{e}}ment S{\'{e}}veillac},
  title        = {Smart Cards for mobile devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {400--413},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015501},
  doi          = {10.1504/IJICS.2007.015501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JansenGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JohnsonS07,
  author       = {Robert Johnson and
                  Jessica Staddon},
  title        = {Deflation-secure web metering},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {39--63},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012244},
  doi          = {10.1504/IJICS.2007.012244},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JohnsonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Kondakci07,
  author       = {Suleyman Kondakci},
  title        = {A new assessment and improvement model of risk propagation in information
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {341--366},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013959},
  doi          = {10.1504/IJICS.2007.013959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Kondakci07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LuiHY07,
  author       = {Richard W. C. Lui and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Accountability in organisations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {237--255},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013954},
  doi          = {10.1504/IJICS.2007.013954},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LuiHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PirzadaM07,
  author       = {Asad Amir Pirzada and
                  Chris McDonald},
  title        = {Collaborative Dynamic Source Routing using transitional trust filters},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {278--297},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013956},
  doi          = {10.1504/IJICS.2007.013956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PirzadaM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PyeW07,
  author       = {Graeme Pye and
                  Matthew J. Warren},
  title        = {E-business security benchmarking: a model and framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {378--390},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015499},
  doi          = {10.1504/IJICS.2007.015499},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PyeW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/StakhanovaBW07,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {A taxonomy of intrusion response systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {169--184},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012248},
  doi          = {10.1504/IJICS.2007.012248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/StakhanovaBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Valli07,
  author       = {Craig Valli},
  title        = {Honeypot technologies and their applicability as a strategic internal
                  countermeasure},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {430--436},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015503},
  doi          = {10.1504/IJICS.2007.015503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Valli07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Wang0L07,
  author       = {Alex Hai Wang and
                  Peng Liu and
                  Lunquan Li},
  title        = {Evaluating the survivability of Intrusion Tolerant Database systems
                  and the impact of intrusion detection deficiencies},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {315--340},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013958},
  doi          = {10.1504/IJICS.2007.013958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Wang0L07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangSM07,
  author       = {Chiou{-}Pirng Wang and
                  Don Snyder and
                  Kathaleena Monds},
  title        = {A conceptual framework for curbing the epidemic of information malice:
                  e-hygiene model with a human-factor approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {455--465},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015505},
  doi          = {10.1504/IJICS.2007.015505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Williams07,
  author       = {Patricia A. H. Williams},
  title        = {Medical data security: Are you informed or afraid?},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {414--429},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015502},
  doi          = {10.1504/IJICS.2007.015502},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Williams07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YangY07,
  author       = {Lili Yang and
                  Shuang{-}Hua Yang},
  title        = {A framework of security and safety checking for internet-based control
                  systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {185--200},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012249},
  doi          = {10.1504/IJICS.2007.012249},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YangY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YuSG07,
  author       = {Zhen Yu and
                  William Sears and
                  Yong Guan},
  title        = {PeerCredential: a reputation-based trust framework for Peer-to-Peer
                  applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {256--277},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.013955},
  doi          = {10.1504/IJICS.2007.013955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YuSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics