Search dblp for Publications

export results for "toc:db/journals/ijics/ijics21.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Amith0MHES23,
  author       = {K. K. Amith and
                  H. A. Sanjay and
                  Ajay Mahadevan and
                  K. Harshita and
                  D. Eshwar and
                  K. Aditya Shastry},
  title        = {Performance driven Hyperledger Fabric-based blockchain framework for
                  mass e-voting in India},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {109--134},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131094},
  doi          = {10.1504/IJICS.2023.131094},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Amith0MHES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AzeezS23,
  author       = {Nureni Ayofe Azeez and
                  Odejinmi Oluwatobi Samuel},
  title        = {A cyberstalking-free global network with artificial intelligence approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {82--108},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131096},
  doi          = {10.1504/IJICS.2023.131096},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AzeezS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChithraA23,
  author       = {P. L. Chithra and
                  R. Aparna},
  title        = {Blockchain-based image encryption with spiral mapping and hashing
                  techniques in dual level security scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {185--204},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131100},
  doi          = {10.1504/IJICS.2023.131100},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChithraA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DaveBP23,
  author       = {Jay Dave and
                  Meghna Bhatt and
                  Deep Pancholi},
  title        = {Secure proof of ownership for deduplicated cloud storage system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {205--228},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131097},
  doi          = {10.1504/IJICS.2023.131097},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DaveBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaBSS23,
  author       = {Sunil Gupta and
                  Akansha Bansiya and
                  Mansi Saini and
                  Amuleek Sidhu},
  title        = {Blockchain-based {EHR} storage and access control system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {70--81},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131098},
  doi          = {10.1504/IJICS.2023.131098},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaBSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LakelB23,
  author       = {Kheira Lakel and
                  Fatima Bendella},
  title        = {A bio-inspired algorithm for enhancing {DNA} cryptography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {436--456},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132779},
  doi          = {10.1504/IJICS.2023.132779},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LakelB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MahajanNPKM23,
  author       = {Akanksha S. Mahajan and
                  Pradnya K. Navale and
                  Vaishnavi V. Patil and
                  Vijay M. Khadse and
                  Parikshit N. Mahalle},
  title        = {The hybrid framework of ensemble technique in machine learning for
                  phishing detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {162--184},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131099},
  doi          = {10.1504/IJICS.2023.131099},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MahajanNPKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MalhiS23,
  author       = {Yuvraj Singh Malhi and
                  Virendra Singh Shekhawat},
  title        = {Two-level machine learning driven intrusion detection model for IoT
                  environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {229--261},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132708},
  doi          = {10.1504/IJICS.2023.132708},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MalhiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MasadehAA23,
  author       = {Shadi Rasheed Masadeh and
                  Hamza Abbass Al{-}Sewadi and
                  Mohammed Abbas Fadhil Al{-}Husainy},
  title        = {A message encryption scheme inspired by Sudoku puzzle},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {399--413},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132739},
  doi          = {10.1504/IJICS.2023.132739},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MasadehAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MathurG23,
  author       = {Monika Mathur and
                  Nidhi Goel},
  title        = {{FPGA} implementation of {AES} encryptor based on rolled and masked
                  approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131090},
  doi          = {10.1504/IJICS.2023.131090},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MathurG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Mayayise23,
  author       = {Thembekile O. Mayayise},
  title        = {{BYOD} security issues and controls framework: an outcome of a systematic
                  literature review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {135--161},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131095},
  doi          = {10.1504/IJICS.2023.131095},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Mayayise23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NandhiniK23,
  author       = {U. Nandhini and
                  S. V. N. Santhosh Kumar},
  title        = {A comprehensive survey on fuzzy-based intelligent intrusion detection
                  system for internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {383--398},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132724},
  doi          = {10.1504/IJICS.2023.132724},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NandhiniK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Niu23,
  author       = {Jing Niu},
  title        = {Design of automatic monitoring system for network information security
                  in cloud computing environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {19--34},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131091},
  doi          = {10.1504/IJICS.2023.131091},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Niu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OdoomHS23,
  author       = {Justice Odoom and
                  Xiaofang Huang and
                  Richlove Samuel Soglo},
  title        = {JPBlock: augmenting security of current journal and paper publication
                  processes using blockchain and smart contract},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {262--292},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132733},
  doi          = {10.1504/IJICS.2023.132733},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OdoomHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatelMW23,
  author       = {N. D. Patel and
                  B. M. Mehtre and
                  Rajeev Wankar},
  title        = {Artificial neural network-based intrusion detection system using multi-objective
                  genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {320--335},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132726},
  doi          = {10.1504/IJICS.2023.132726},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatelMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatroA23,
  author       = {K. Abhimanyu Kumar Patro and
                  Bibhudendra Acharya},
  title        = {An efficient two-level image encryption system using chaotic maps},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {1/2},
  pages        = {35--69},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.131092},
  doi          = {10.1504/IJICS.2023.131092},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatroA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RamyaE23,
  author       = {S. P. Ramya and
                  Eswari Rajagopal},
  title        = {A shallow-based neural network model for fake news detection in social
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {360--382},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132727},
  doi          = {10.1504/IJICS.2023.132727},
  timestamp    = {Sat, 24 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RamyaE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RanjanS23,
  author       = {Ranjeet Kumar Ranjan and
                  Amit Singh},
  title        = {A comparative study of deep transfer learning models for malware classification
                  using image datasets},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {293--319},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132735},
  doi          = {10.1504/IJICS.2023.132735},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RanjanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SutarTS23,
  author       = {Swapnil Sutar and
                  Vikas Tiwari and
                  Ajeet Singh},
  title        = {Implementation of a secret sharing-based masking scheme against side-channel
                  attack for ultra-lightweight ciphers in IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {336--359},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132725},
  doi          = {10.1504/IJICS.2023.132725},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SutarTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TasneemAHRD23,
  author       = {Zareen Tasneem and
                  Maria Afnan and
                  Md. Arman Hossain and
                  Md. Mahbubur Rahman and
                  Samrat Kumar Dey},
  title        = {Performance evaluation of various deep convolutional neural network
                  models through classification of malware},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {414--435},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132767},
  doi          = {10.1504/IJICS.2023.132767},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TasneemAHRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics