Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics12.bht:"
@article{DBLP:journals/ijics/AgrawalS20, author = {Amrit Kumar Agrawal and Yogendra Narain Singh}, title = {Unconstrained face recognition using deep convolution neural network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {332--348}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105183}, doi = {10.1504/IJICS.2020.105183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AgrawalS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DiwakarK20, author = {Manoj Diwakar and Pardeep Kumar}, title = {Blind noise estimation-based {CT} image denoising in tetrolet domain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {234--252}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105175}, doi = {10.1504/IJICS.2020.105175}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DiwakarK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GrayT20, author = {John M. Gray and Gurvirender P. Tejay}, title = {Introducing virtue ethics concepts into the decision processes of information systems trusted workers: a Delphi study}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103997}, doi = {10.1504/IJICS.2020.103997}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GrayT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaGC20, author = {Shashank Gupta and Brij B. Gupta and Pooja Chaudhary}, title = {Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based {OSN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {147--180}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105153}, doi = {10.1504/IJICS.2020.105153}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GuptaGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KapadiaP20, author = {Amishi Mahesh Kapadia and Nithyanandam Pandian}, title = {Reversible data hiding methods in integer wavelet transform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {70--89}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104001}, doi = {10.1504/IJICS.2020.104001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KapadiaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhanOAMY20, author = {Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Farhat Anwar and Roohie Naaz Mir and Mashkuri Yaacob}, title = {Scrutinising internet banking security solutions}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {269--302}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105180}, doi = {10.1504/IJICS.2020.105180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhanOAMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarKK20, author = {P. M. Ashok Kumar and D. Kavitha and S. Arun Kumar}, title = {A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {253--268}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105179}, doi = {10.1504/IJICS.2020.105179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LamkucheP20, author = {Hemraj Shobharam Lamkuche and Dhanya Pramod}, title = {{CSL:} {FPGA} implementation of lightweight block cipher for power-constrained devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {349--377}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105185}, doi = {10.1504/IJICS.2020.105185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LamkucheP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MahantaK20, author = {Hridoy Jyoti Mahanta and Ajoy Kumar Khan}, title = {A secured modular exponentiation for {RSA} and {CRT-RSA} with dual blinding to resist power analysis attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {112--129}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105187}, doi = {10.1504/IJICS.2020.105187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MahantaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MerzougAH20, author = {Assia Merzoug and Adda Ali{-}Pacha and Naima Hadj{-}Said}, title = {New chaotic cryptosystem for the image encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {450--463}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107452}, doi = {10.1504/IJICS.2020.107452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MerzougAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohindruSB20, author = {Vandana Mohindru and Yashwant Singh and Ravindara Bhatt}, title = {Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {217--233}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105174}, doi = {10.1504/IJICS.2020.105174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohindruSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MukherjeeS20, author = {Srilekha Mukherjee and Goutam Sanyal}, title = {Eight neighbour bits swap encryption-based image steganography using arithmetic progression technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {130--146}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105188}, doi = {10.1504/IJICS.2020.105188}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MukherjeeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Olakanmi20, author = {Oladayo Olufemi Olakanmi}, title = {{SAPMS:} a secure and anonymous parking management system for autonomous vehicles}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {20--39}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103996}, doi = {10.1504/IJICS.2020.103996}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Olakanmi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PintoJK20, author = {Joey Pinto and Pooja Jain and Tapan Kumar}, title = {Fault prediction for distributed computing Hadoop clusters using real-time higher order differential inputs to {SVM:} Zedacross}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {181--198}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105155}, doi = {10.1504/IJICS.2020.105155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PintoJK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahooG20, author = {Somya Ranjan Sahoo and Brij B. Gupta}, title = {Fake profile detection in multimedia big data on online social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {303--331}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105181}, doi = {10.1504/IJICS.2020.105181}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SahooG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SuriV20, author = {Shelza Suri and Ritu Vijay}, title = {A coupled map lattice-based image encryption approach using {DNA} and bi-objective genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {2/3}, pages = {199--216}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.105156}, doi = {10.1504/IJICS.2020.105156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SuriV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThakkarP20, author = {Ankit Thakkar and Kajol Patel}, title = {{VIKAS:} a new virtual keyboard-based simple and efficient text {CAPTCHA} verification scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {90--105}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104003}, doi = {10.1504/IJICS.2020.104003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThakkarP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangYGW20, author = {Chundong Wang and Lei Yang and Hao Guo and Fujin Wan}, title = {Data protection and provenance in cloud of things environment: research challenges}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {416--435}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107449}, doi = {10.1504/IJICS.2020.107449}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangYGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangZL20, author = {Chundong Wang and Tong Zhao and Zheli Liu}, title = {An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {397--415}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107448}, doi = {10.1504/IJICS.2020.107448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XieWGJH20, author = {Xin Xie and Jianan Wang and Songlin Ge and Nan Jiang and Fengping Hu}, title = {An improved spatial-temporal correlation algorithm combined with compressed sensing and {LEACH} protocol in WSNs}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {383--396}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107447}, doi = {10.1504/IJICS.2020.107447}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XieWGJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YacoubaOE20, author = {Kouraogo Yacouba and Ghizlane Orhanou and Said Elhajji}, title = {Advanced security of two-factor authentication system using stego {QR} code}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {4}, pages = {436--449}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.107451}, doi = {10.1504/IJICS.2020.107451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YacoubaOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YadavTRP20, author = {Anil Yadav and Anurag Tripathi and Nitin Rakesh and Sujata Pandey}, title = {Protecting composite IoT server by secure secret key exchange for {XEN} intra virtual machines}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {53--69}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.104000}, doi = {10.1504/IJICS.2020.104000}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YadavTRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangLL20, author = {Jianmin Zhang and Hua Li and Jian Li}, title = {An improved key pre-distribution scheme based on the security level classification of keys for wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {12}, number = {1}, pages = {40--52}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.103999}, doi = {10.1504/IJICS.2020.103999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.