Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics6.bht:"
@article{DBLP:journals/ijics/AlEroudKSH14, author = {Ahmed Aleroud and George Karabatis and Prayank Sharma and Peng He}, title = {Context and semantics for detection of cyber attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {63--92}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059791}, doi = {10.1504/IJICS.2014.059791}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlEroudKSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AliA14, author = {Syed Taqi Ali and B. B. Amberker}, title = {Attribute-based group signature without random oracles with attribute anonymity}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {109--132}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065162}, doi = {10.1504/IJICS.2014.065162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AliA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AngamuthuR14, author = {Muthulakshmi Angamuthu and Anitha Ramalingam}, title = {Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theorem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {286--305}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066661}, doi = {10.1504/IJICS.2014.066661}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AngamuthuR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ArogundadeJY14, author = {Oluwasefunmi 'Tale Arogundade and Zhi Jin and Xiaoguang Yang}, title = {Towards ontological approach to eliciting risk-based security requirements}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {143--178}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065168}, doi = {10.1504/IJICS.2014.065168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ArogundadeJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BagadeT14, author = {Anant M. Bagade and Sanjay N. Talbar}, title = {Secure transmission of morphed stego keys over internet using {IP} steganography}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {133--142}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065164}, doi = {10.1504/IJICS.2014.065164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BagadeT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Choi14, author = {Hyunjun Choi}, title = {Image encryption method for depth + texture video contents}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {333--343}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068093}, doi = {10.1504/IJICS.2014.068093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Choi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DasCGD14, author = {Suvrojit Das and Debayan Chatterjee and Debidas Ghosh and Narayan C. Debnath}, title = {Extracting the system call identifier from within {VFS:} a kernel stack parsing-based approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {12--50}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059786}, doi = {10.1504/IJICS.2014.059786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DasCGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/FerragNG14, author = {Mohamed Amine Ferrag and Mehdi Nafa and Salim Ghanemi}, title = {{SDPP:} an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {241--269}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066650}, doi = {10.1504/IJICS.2014.066650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/FerragNG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/IsmailMN14, author = {Ismahani Binti Ismail and Muhammad Nadzir Marsono and Sulaiman Mohd Nor}, title = {Malware detection using augmented naive Bayes with domain knowledge and under presence of class noise}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {2}, pages = {179--197}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.065173}, doi = {10.1504/IJICS.2014.065173}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/IsmailMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KangKJK14, author = {Yong Ho Kang and Kimoon Keum and Changbok Jang and Joo Man Kim}, title = {Study of mobile virtualisation-based security technology for smartwork environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {311--321}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068095}, doi = {10.1504/IJICS.2014.068095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KangKJK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KimH14, author = {Man Ki Kim and You Sik Hong}, title = {Development {AI} traffic-safety system using {RFID} technique and {USN} theory}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {322--332}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068098}, doi = {10.1504/IJICS.2014.068098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KimH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KuppuswamyA14, author = {Prakash Kuppuswamy and Saeed Q. Y. Al{-}Khalidi}, title = {Hybrid encryption/decryption technique using new public key and symmetric key algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {372--382}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068103}, doi = {10.1504/IJICS.2014.068103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KuppuswamyA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Lee14, author = {Kyujin Lee}, title = {An iterative layered interference canceller scheme for {OFDM} in wireless mesh security networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {344--353}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068094}, doi = {10.1504/IJICS.2014.068094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MangleP14, author = {Andrew Mangle and Sandip C. Patel}, title = {Issues in user authentication using security questions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {383--407}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068100}, doi = {10.1504/IJICS.2014.068100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MangleP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaB14, author = {P. M. Siva Raja and E. Baburaj}, title = {Genetic algorithms based data hiding scheme for digital images with {LSBMR}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {51--62}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059787}, doi = {10.1504/IJICS.2014.059787}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Rasheed14, author = {Hassan Rasheed}, title = {Vulnerability distribution scoring for software product security assessment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {270--285}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066653}, doi = {10.1504/IJICS.2014.066653}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Rasheed14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SakthivelVK14, author = {R. Sakthivel and M. Vanitha and Harish M. Kittur}, title = {Low power high throughput reconfigurable stream cipher hardware {VLSI} architectures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059785}, doi = {10.1504/IJICS.2014.059785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SakthivelVK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZSL14, author = {Limin Shen and Futai Zhang and Yinxia Sun and Sujuan Li}, title = {Cryptanalysis and improvement on a certificateless encryption scheme in the standard model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {4}, pages = {354--371}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.068104}, doi = {10.1504/IJICS.2014.068104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TsitroulisLT14, author = {Achilleas Tsitroulis and Dimitris Lampoudis and Emmanuel Tsekleves}, title = {Exposing {WPA2} security protocol vulnerabilities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {1}, pages = {93--107}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.059797}, doi = {10.1504/IJICS.2014.059797}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TsitroulisLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VinodLGC14, author = {P. Vinod and Vijay Laxmi and Manoj Singh Gaur and Grijesh Chauhan}, title = {Detecting malicious files using non-signature-based methods}, journal = {Int. J. Inf. Comput. Secur.}, volume = {6}, number = {3}, pages = {199--240}, year = {2014}, url = {https://doi.org/10.1504/IJICS.2014.066646}, doi = {10.1504/IJICS.2014.066646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.