Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics22.bht:"
@article{DBLP:journals/ijics/AbebeSK23, author = {Abiy Tadesse Abebe and Yalemzewd Negash Shiferaw and P. G. V. Suresh Kumar}, title = {Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {323--353}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135895}, doi = {10.1504/IJICS.2023.135895}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AbebeSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AbhilashA23, author = {M. H. Abhilash and B. B. Amberker}, title = {Dynamic group signature scheme using ideal lattices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {60--90}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133366}, doi = {10.1504/IJICS.2023.133366}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AbhilashA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AgarwalK23, author = {Ruchi Agarwal and Manoj Kumar}, title = {A privacy preserving scheme for encrypted medical images using {RDH}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {436--452}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135919}, doi = {10.1504/IJICS.2023.135919}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AgarwalK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlmehdharAR23, author = {Mohammed Almehdhar and Mohammed M. Abdelsamea and Na Ruan}, title = {Deep multi-locality convolutional neural network for DDoS detection in smart home IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {453--474}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135902}, doi = {10.1504/IJICS.2023.135902}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AzharYC23, author = {Muhammad Kashif Azhar and Bin Yao and Zhongpu Chen}, title = {Enriching blockchain with spatial keyword query processing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {91--116}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133369}, doi = {10.1504/IJICS.2023.133369}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AzharYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChanderG23, author = {Bhanu Chander and Kumaravelan Gopalakrishnan}, title = {Outlier detection in {WSN} with {SVDD} via multi-interpolation auto-encoder}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {28--59}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133368}, doi = {10.1504/IJICS.2023.133368}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChanderG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChenL23, author = {Lijiao Chen and Kewei Lv}, title = {Ciphertext-policy attribute-based delay encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {167--185}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134960}, doi = {10.1504/IJICS.2023.134960}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ChenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DemighaH23, author = {Oualid Demigha and Nabil Haddad}, title = {Formal verification of software-only mechanisms for live migration of {SGX} enclaves}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {230--261}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134965}, doi = {10.1504/IJICS.2023.134965}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/DemighaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DingXCFLH23, author = {Zhenquan Ding and Hui Xu and Lei Cui and Haiqiang Fei and Yongji Liu and Zhiyu Hao}, title = {{HEMC:} a dynamic behaviour analysis system for malware based on hardware virtualisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {390--410}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135899}, doi = {10.1504/IJICS.2023.135899}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/DingXCFLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JayashreeK23, author = {S. Jayashree and S. V. N. Santhosh Kumar}, title = {A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {354--376}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135897}, doi = {10.1504/IJICS.2023.135897}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/JayashreeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JoseNP23, author = {Ancy Sherin Jose and Latha R. Nair and Varghese Paul}, title = {Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {139--166}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134962}, doi = {10.1504/IJICS.2023.134962}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/JoseNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarK23, author = {Dilip Kumar and Manoj Kumar}, title = {Outsourcing decryption of {KP-ABE} using elliptic curve cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {210--229}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134961}, doi = {10.1504/IJICS.2023.134961}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarV23, author = {Umesh Kumar and Vadlamudi Ch. Venkaiah}, title = {A novel stream cipher based on quasigroups and {QG-PRNG}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {411--435}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135900}, doi = {10.1504/IJICS.2023.135900}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumarV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumariM23, author = {Shipra Kumari and Hrishikesh Mahato}, title = {Construction of weighted orthogonal matrices over finite field and its application in cryptography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {263--276}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135894}, doi = {10.1504/IJICS.2023.135894}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/KumariM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PawarGJ23, author = {Ankush Balaram Pawar and Shashikant U. Ghumbre and Rashmi M. Jogdand}, title = {Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {298--322}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135896}, doi = {10.1504/IJICS.2023.135896}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/PawarGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RavvaS23, author = {Santosh Kumar Ravva and Sureddi R. M. Krishna}, title = {Cryptanalysis of common prime {RSA} with two decryption exponents: Jochemsz and May approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {377--389}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135901}, doi = {10.1504/IJICS.2023.135901}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/RavvaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SelimiRV23, author = {Synim Selimi and Blerim Rexha and Kamer Vishi}, title = {CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with {ML}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {117--138}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133385}, doi = {10.1504/IJICS.2023.133385}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SelimiRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/UthirapathyS23, author = {Samson Ebenezar Uthirapathy and Domnic Sandanam}, title = {Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {277--297}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135892}, doi = {10.1504/IJICS.2023.135892}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/UthirapathyS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WuZG23, author = {Zhijun Wu and Chenlei Zhang and Junjun Guo}, title = {A method of speech information hiding in inactive frame based on pitch modulation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {1}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.133367}, doi = {10.1504/IJICS.2023.133367}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WuZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangBWW23, author = {Lizhe Zhang and Zhuoning Bai and Zhijun Wu and Kenian Wang}, title = {Unified identity authentication scheme of system wide information management based on {SAML-PKI-LDAP}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {2}, pages = {186--209}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.134959}, doi = {10.1504/IJICS.2023.134959}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ZhangBWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.