Search dblp for Publications

export results for "toc:db/journals/ijics/ijics10.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AmitaKK18,
  author       = {Amita and
                  Amandeep Kaur and
                  Marut Kumar},
  title        = {Reversible data hiding in absolute moment block truncation coding
                  compressed images using adaptive multilevel histogram shifting technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {261--275},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012572},
  doi          = {10.1504/IJICS.2018.10012572},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmitaKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzeemCDRR18,
  author       = {Muhammad Azeem and
                  Yongquan Cai and
                  Allah Ditta and
                  Khurram Gulzar Rana and
                  Faheem Akhtar Rajpoot},
  title        = {Information hiding: a novel algorithm for enhancement of cover text
                  capacity by using unicode characters},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {437--453},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095357},
  doi          = {10.1504/IJICS.2018.095357},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzeemCDRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW18,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang},
  title        = {An end-to-end user two-way authenticated double encrypted messaging
                  scheme based on hybrid {RSA} for the future internet architectures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {63--79},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10005506},
  doi          = {10.1504/IJICS.2018.10005506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW18a,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang and
                  Xing Li},
  title        = {Hybrid RSA-based highly efficient, reliable and strong personal full
                  mesh networked messaging scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {418--436},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095341},
  doi          = {10.1504/IJICS.2018.095341},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GoreDPE18,
  author       = {Ross Gore and
                  Saikou Y. Diallo and
                  Jose J. Padilla and
                  Barry Ezell},
  title        = {Assessing cyber-incidents using machine learning},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {341--360},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095298},
  doi          = {10.1504/IJICS.2018.095298},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GoreDPE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaG18,
  author       = {Shashank Gupta and
                  Brij Bhooshan Gupta},
  title        = {Robust injection point-based framework for modern applications against
                  {XSS} vulnerabilities in online social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {170--200},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012568},
  doi          = {10.1504/IJICS.2018.10012568},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HotaSS18,
  author       = {H. S. Hota and
                  Dinesh K. Sharma and
                  Akhilesh Kumar Shrivas},
  title        = {Development of an efficient classifier using proposed sensitivity-based
                  feature selection technique for intrusion detection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {80--101},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010649},
  doi          = {10.1504/IJICS.2018.10010649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HotaSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JainG18,
  author       = {Ankit Kumar Jain and
                  Brij B. Gupta},
  title        = {Detection of phishing attacks in financial and e-banking websites
                  using link and visual similarity relation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {398--417},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095303},
  doi          = {10.1504/IJICS.2018.095303},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JainG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KarNK18,
  author       = {Dulal C. Kar and
                  Anusha Madhuri Nakka and
                  Ajay K. Katangur},
  title        = {A new statistical attack resilient steganography scheme for hiding
                  messages in audio files},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {276--302},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012578},
  doi          = {10.1504/IJICS.2018.10012578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KarNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarSB18,
  author       = {C. Pavan Kumar and
                  R. Selvakumar and
                  Raghunadh K. Bhattar},
  title        = {Reliable and secure communication using fundamental cut-sets and fundamental
                  circuits},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {41--62},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010648},
  doi          = {10.1504/IJICS.2018.10010648},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiS18,
  author       = {Shaojing Li and
                  Wanli Su},
  title        = {The research of reputation incentive mechanism of {P2P} network file
                  sharing system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {149--169},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012570},
  doi          = {10.1504/IJICS.2018.10012570},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohindruS18,
  author       = {Vandana Mohindru and
                  Yashwant Singh},
  title        = {Node authentication algorithm for securing static wireless sensor
                  networks from node clone attack},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {129--148},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012571},
  doi          = {10.1504/IJICS.2018.10012571},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohindruS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoonR18,
  author       = {Sunil K. Moon and
                  Rajeshree D. Raut},
  title        = {Innovative data security model using forensic audio video steganography
                  for improving hidden data security and robustness},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {374--397},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095300},
  doi          = {10.1504/IJICS.2018.095300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoonR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoumniFT18,
  author       = {Soufiane El Moumni and
                  Mohamed Fettach and
                  Abderrahim Tragha},
  title        = {High frequency implementation of cryptographic hash function Keccak-512
                  on {FPGA} devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {361--373},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095299},
  doi          = {10.1504/IJICS.2018.095299},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoumniFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PalR18,
  author       = {Arup Kumar Pal and
                  Soumitra Roy},
  title        = {A robust and blind image watermarking scheme in {DCT} domain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {321--340},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.095296},
  doi          = {10.1504/IJICS.2018.095296},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PalR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PathakRC18,
  author       = {Sanchita Pathak and
                  Ratnakirti Roy and
                  Suvamoy Changder},
  title        = {Performance analysis of image steganalysis techniques and future research
                  directives},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1--24},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010646},
  doi          = {10.1504/IJICS.2018.10010646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PathakRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaSPT18,
  author       = {Rohit Raja and
                  Tilendra Shishir Sinha and
                  Raj Kumar Patra and
                  Shrikant Tiwari},
  title        = {Physiological trait-based biometrical authentication of human-face
                  using {LGXP} and {ANN} techniques},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {303--320},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012575},
  doi          = {10.1504/IJICS.2018.10012575},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaSPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajendranD18,
  author       = {Sujarani Rajendran and
                  Manivannan Doraipandian},
  title        = {A nonlinear two dimensional logistic-tent map for secure image communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {201--215},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012577},
  doi          = {10.1504/IJICS.2018.10012577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajendranD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RoyP18,
  author       = {Soumitra Roy and
                  Arup Kumar Pal},
  title        = {A robust reversible image watermarking scheme in {DCT} domain using
                  Arnold scrambling and histogram modification},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {216--236},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012576},
  doi          = {10.1504/IJICS.2018.10012576},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RoyP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShafiqYL18,
  author       = {Muhammad Shafiq and
                  Xiangzhan Yu and
                  Asif Ali Laghari},
  title        = {WeChat traffic classification using machine learning algorithms and
                  comparative analysis of datasets},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {109--128},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012574},
  doi          = {10.1504/IJICS.2018.10012574},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShafiqYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SongZ18,
  author       = {Lihua Song and
                  Xiaofeng Zhang},
  title        = {Improved pixel relevance based on Mahalanobis distance for image segmentation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {237--247},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012573},
  doi          = {10.1504/IJICS.2018.10012573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SongZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SumanaH18,
  author       = {M. Sumana and
                  K. S. Hareesha},
  title        = {Modelling a secure support vector machine classifier for private data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {25--40},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10010647},
  doi          = {10.1504/IJICS.2018.10010647},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SumanaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SunZJ18,
  author       = {Yujuan Sun and
                  Xiaofeng Zhang and
                  Muwei Jian},
  title        = {3D reconstruction of human face from an input image under random lighting
                  condition},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {10},
  number       = {2/3},
  pages        = {248--260},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJICS.2018.10012569},
  doi          = {10.1504/IJICS.2018.10012569},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SunZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics