- 2024
- Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq, Hajed M. Alhatlani, Faisal A. Alobaid:
On the performance of AES algorithm variants. Int. J. Inf. Comput. Secur. 23(3): 322-337 (2024) - Khadidja Bennaceur, Zakaria Sahraoui, Mohamed Ahmad Nacer:
Feature selection and deep learning approach for anomaly network intrusion detection. Int. J. Inf. Comput. Secur. 23(4): 433-453 (2024) - Laxmi Bhagwat, Balaji Patil:
Behavioural analysis and results of malware and ransomware using optimal behavioural feature set. Int. J. Inf. Comput. Secur. 23(1): 57-78 (2024) - Aparna Bhonde, Satish R. Devane:
Priority-based security-aware virtual machine allocation policy. Int. J. Inf. Comput. Secur. 23(1): 40-56 (2024) - Saâd Boukers, Abdelkader Belkhir:
A new architecture with a new protocol for m-payment. Int. J. Inf. Comput. Secur. 23(4): 349-374 (2024) - Sushant Chamoli, Varsha Mittal:
A taxonomy of DDoS attacks and its impact on Docker architecture. Int. J. Inf. Comput. Secur. 23(4): 375-395 (2024) - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
Re-evaluation of PhishI game and its utilisation in eliciting security requirements. Int. J. Inf. Comput. Secur. 23(3): 294-321 (2024) - Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu:
Image tampering detection based on feature consistency attention. Int. J. Inf. Comput. Secur. 23(1): 1-15 (2024) - Devender Kumar, Satish Chand, Bijendra Kumar:
A secure three-factor authentication protocol for mobile networks. Int. J. Inf. Comput. Secur. 23(2): 119-138 (2024) - Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. Int. J. Inf. Comput. Secur. 23(2): 139-162 (2024) - Tran Thi Luong, Linh Hoang Dinh:
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. Int. J. Inf. Comput. Secur. 23(1): 16-39 (2024) - Tran Thi Luong, Linh Hoang Dinh:
Generating key-dependent involutory MDS matrices through permutations, direct exponentiation, and scalar multiplication. Int. J. Inf. Comput. Secur. 23(4): 410-432 (2024) - Thomas Nagunwa:
AI-driven approach for robust real-time detection of zero-day phishing websites. Int. J. Inf. Comput. Secur. 23(1): 79-118 (2024) - Oussama Nahnah, Sarra Cherbal:
SLAK: secure lightweight scheme for authentication and key-agreement in internet of things. Int. J. Inf. Comput. Secur. 23(2): 200-226 (2024) - Rahul, Venkatesh, M. Karthik, K. R. Venugopal, Satish B. Basapur:
SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of things. Int. J. Inf. Comput. Secur. 23(3): 227-270 (2024) - C. Ravichandran, T. J. Nagalakshmi, P. Shyamala Bharathi, C. Sivakumaran:
Technique for detecting hardware-based Trojans using a convolutional neural network. Int. J. Inf. Comput. Secur. 23(3): 338-347 (2024) - Mandeep Kaur Sandhu, Surender Singh, Manjit Kaur:
A new hybrid chaotic system and its analysis. Int. J. Inf. Comput. Secur. 23(3): 271-293 (2024) - Payal Sharma, B. R. Purushothama:
User driven general framework to cap the joins in secure group communication. Int. J. Inf. Comput. Secur. 23(2): 190-199 (2024) - Rupesh Kumar Sinha, Sitanshu Sekhar Sahu:
Multi-level image security using modified Rubik's cube algorithm. Int. J. Inf. Comput. Secur. 23(4): 396-409 (2024) - Chenghua Tang, Mengmeng Yang, Qingze Gao, Baohua Qiang:
PBDG: a malicious code detection method based on precise behaviour dependency graph. Int. J. Inf. Comput. Secur. 23(2): 163-189 (2024) - 2023
- Abiy Tadesse Abebe, Yalemzewd Negash Shiferaw, P. G. V. Suresh Kumar:
Lightweight integrated cryptosystem based on reconfigurable hardware for IoT security. Int. J. Inf. Comput. Secur. 22(3/4): 323-353 (2023) - M. H. Abhilash, B. B. Amberker:
Dynamic group signature scheme using ideal lattices. Int. J. Inf. Comput. Secur. 22(1): 60-90 (2023) - Ruchi Agarwal, Manoj Kumar:
A privacy preserving scheme for encrypted medical images using RDH. Int. J. Inf. Comput. Secur. 22(3/4): 436-452 (2023) - Mohammed Almehdhar, Mohammed M. Abdelsamea, Na Ruan:
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT. Int. J. Inf. Comput. Secur. 22(3/4): 453-474 (2023) - K. K. Amith, H. A. Sanjay, Ajay Mahadevan, K. Harshita, D. Eshwar, K. Aditya Shastry:
Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India. Int. J. Inf. Comput. Secur. 21(1/2): 109-134 (2023) - Sevgi Arca, Rattikorn Hewett:
Data privacy with heuristic anonymisation. Int. J. Inf. Comput. Secur. 20(1/2): 104-132 (2023) - Nureni Ayofe Azeez, Odejinmi Oluwatobi Samuel:
A cyberstalking-free global network with artificial intelligence approach. Int. J. Inf. Comput. Secur. 21(1/2): 82-108 (2023) - Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen:
Enriching blockchain with spatial keyword query processing. Int. J. Inf. Comput. Secur. 22(1): 91-116 (2023) - Bikash Baruah, Manash Pratim Dutta, Dhruba K. Bhattacharyya:
An effective ensemble method for missing data imputation. Int. J. Inf. Comput. Secur. 20(3/4): 295-314 (2023) - Djalila Belkebir:
DIP-QGA: a secure and robust watermarking technique based on direct image projection and quantum genetic algorithm. Int. J. Inf. Comput. Secur. 20(3/4): 221-247 (2023)