Search dblp for Publications

export results for "toc:db/journals/ijics/ijics12.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AgrawalS20,
  author       = {Amrit Kumar Agrawal and
                  Yogendra Narain Singh},
  title        = {Unconstrained face recognition using deep convolution neural network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {332--348},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105183},
  doi          = {10.1504/IJICS.2020.105183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AgrawalS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DiwakarK20,
  author       = {Manoj Diwakar and
                  Pardeep Kumar},
  title        = {Blind noise estimation-based {CT} image denoising in tetrolet domain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {234--252},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105175},
  doi          = {10.1504/IJICS.2020.105175},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DiwakarK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GrayT20,
  author       = {John M. Gray and
                  Gurvirender P. Tejay},
  title        = {Introducing virtue ethics concepts into the decision processes of
                  information systems trusted workers: a Delphi study},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103997},
  doi          = {10.1504/IJICS.2020.103997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GrayT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaGC20,
  author       = {Shashank Gupta and
                  Brij B. Gupta and
                  Pooja Chaudhary},
  title        = {Nested context-aware sanitisation and feature injection in clustered
                  templates of JavaScript worms on the cloud-based {OSN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {147--180},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105153},
  doi          = {10.1504/IJICS.2020.105153},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KapadiaP20,
  author       = {Amishi Mahesh Kapadia and
                  Nithyanandam Pandian},
  title        = {Reversible data hiding methods in integer wavelet transform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {70--89},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104001},
  doi          = {10.1504/IJICS.2020.104001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KapadiaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhanOAMY20,
  author       = {Burhan Ul Islam Khan and
                  Rashidah Funke Olanrewaju and
                  Farhat Anwar and
                  Roohie Naaz Mir and
                  Mashkuri Yaacob},
  title        = {Scrutinising internet banking security solutions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {269--302},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105180},
  doi          = {10.1504/IJICS.2020.105180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhanOAMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarKK20,
  author       = {P. M. Ashok Kumar and
                  D. Kavitha and
                  S. Arun Kumar},
  title        = {A hybrid generative-discriminative model for abnormal event detection
                  in surveillance video scenes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {253--268},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105179},
  doi          = {10.1504/IJICS.2020.105179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LamkucheP20,
  author       = {Hemraj Shobharam Lamkuche and
                  Dhanya Pramod},
  title        = {{CSL:} {FPGA} implementation of lightweight block cipher for power-constrained
                  devices},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {349--377},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105185},
  doi          = {10.1504/IJICS.2020.105185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LamkucheP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MahantaK20,
  author       = {Hridoy Jyoti Mahanta and
                  Ajoy Kumar Khan},
  title        = {A secured modular exponentiation for {RSA} and {CRT-RSA} with dual
                  blinding to resist power analysis attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {112--129},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105187},
  doi          = {10.1504/IJICS.2020.105187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MahantaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MerzougAH20,
  author       = {Assia Merzoug and
                  Adda Ali{-}Pacha and
                  Naima Hadj{-}Said},
  title        = {New chaotic cryptosystem for the image encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {450--463},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107452},
  doi          = {10.1504/IJICS.2020.107452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MerzougAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohindruSB20,
  author       = {Vandana Mohindru and
                  Yashwant Singh and
                  Ravindara Bhatt},
  title        = {Securing wireless sensor networks from node clone attack: a lightweight
                  message authentication algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {217--233},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105174},
  doi          = {10.1504/IJICS.2020.105174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohindruSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MukherjeeS20,
  author       = {Srilekha Mukherjee and
                  Goutam Sanyal},
  title        = {Eight neighbour bits swap encryption-based image steganography using
                  arithmetic progression technique},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {130--146},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105188},
  doi          = {10.1504/IJICS.2020.105188},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MukherjeeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Olakanmi20,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {{SAPMS:} a secure and anonymous parking management system for autonomous
                  vehicles},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {20--39},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103996},
  doi          = {10.1504/IJICS.2020.103996},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Olakanmi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PintoJK20,
  author       = {Joey Pinto and
                  Pooja Jain and
                  Tapan Kumar},
  title        = {Fault prediction for distributed computing Hadoop clusters using real-time
                  higher order differential inputs to {SVM:} Zedacross},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {181--198},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105155},
  doi          = {10.1504/IJICS.2020.105155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PintoJK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahooG20,
  author       = {Somya Ranjan Sahoo and
                  Brij B. Gupta},
  title        = {Fake profile detection in multimedia big data on online social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {303--331},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105181},
  doi          = {10.1504/IJICS.2020.105181},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SahooG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SuriV20,
  author       = {Shelza Suri and
                  Ritu Vijay},
  title        = {A coupled map lattice-based image encryption approach using {DNA}
                  and bi-objective genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {2/3},
  pages        = {199--216},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.105156},
  doi          = {10.1504/IJICS.2020.105156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SuriV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThakkarP20,
  author       = {Ankit Thakkar and
                  Kajol Patel},
  title        = {{VIKAS:} a new virtual keyboard-based simple and efficient text {CAPTCHA}
                  verification scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {90--105},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104003},
  doi          = {10.1504/IJICS.2020.104003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThakkarP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangYGW20,
  author       = {Chundong Wang and
                  Lei Yang and
                  Hao Guo and
                  Fujin Wan},
  title        = {Data protection and provenance in cloud of things environment: research
                  challenges},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {416--435},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107449},
  doi          = {10.1504/IJICS.2020.107449},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangYGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangZL20,
  author       = {Chundong Wang and
                  Tong Zhao and
                  Zheli Liu},
  title        = {An activity theory model for dynamic evolution of attack graph based
                  on improved least square genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {397--415},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107448},
  doi          = {10.1504/IJICS.2020.107448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XieWGJH20,
  author       = {Xin Xie and
                  Jianan Wang and
                  Songlin Ge and
                  Nan Jiang and
                  Fengping Hu},
  title        = {An improved spatial-temporal correlation algorithm combined with compressed
                  sensing and {LEACH} protocol in WSNs},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {383--396},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107447},
  doi          = {10.1504/IJICS.2020.107447},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XieWGJH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YacoubaOE20,
  author       = {Kouraogo Yacouba and
                  Ghizlane Orhanou and
                  Said Elhajji},
  title        = {Advanced security of two-factor authentication system using stego
                  {QR} code},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {436--449},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.107451},
  doi          = {10.1504/IJICS.2020.107451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YacoubaOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YadavTRP20,
  author       = {Anil Yadav and
                  Anurag Tripathi and
                  Nitin Rakesh and
                  Sujata Pandey},
  title        = {Protecting composite IoT server by secure secret key exchange for
                  {XEN} intra virtual machines},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {53--69},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.104000},
  doi          = {10.1504/IJICS.2020.104000},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YadavTRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangLL20,
  author       = {Jianmin Zhang and
                  Hua Li and
                  Jian Li},
  title        = {An improved key pre-distribution scheme based on the security level
                  classification of keys for wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {40--52},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.103999},
  doi          = {10.1504/IJICS.2020.103999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics