- Bhanu Chander, Kumaravelan Gopalakrishnan:
Outlier detection in WSN with SVDD via multi-interpolation auto-encoder. Int. J. Inf. Comput. Secur. 22(1): 28-59 (2023) - Debanjan Chatterjee, Barnali Gupta Banik, Abhinandan Banik
:
Attack resistant chaos-based cryptosystem by modified baker map and logistic map. Int. J. Inf. Comput. Secur. 20(1/2): 48-83 (2023) - Lijiao Chen, Kewei Lv:
Ciphertext-policy attribute-based delay encryption. Int. J. Inf. Comput. Secur. 22(2): 167-185 (2023) - P. L. Chithra, R. Aparna
:
Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme. Int. J. Inf. Comput. Secur. 21(1/2): 185-204 (2023) - Jay Dave, Meghna Bhatt, Deep Pancholi:
Secure proof of ownership for deduplicated cloud storage system. Int. J. Inf. Comput. Secur. 21(1/2): 205-228 (2023) - Oualid Demigha, Nabil Haddad:
Formal verification of software-only mechanisms for live migration of SGX enclaves. Int. J. Inf. Comput. Secur. 22(2): 230-261 (2023) - Zhenquan Ding, Hui Xu, Lei Cui, Haiqiang Fei, Yongji Liu, Zhiyu Hao:
HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation. Int. J. Inf. Comput. Secur. 22(3/4): 390-410 (2023) - Veer Sain Dixit, Akanksha Bansal Chopra:
Push and nuke attacks detection using DNN-HHO algorithm. Int. J. Inf. Comput. Secur. 20(3/4): 248-268 (2023) - Sherif F. Emara, Sayed Abdelhady, M. Zaki:
A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm. Int. J. Inf. Comput. Secur. 20(1/2): 84-103 (2023) - Sunil Gupta, Pradeep Kumar Arya, Hitesh Kumar Sharma:
User anonymity-based secure authentication protocol for telemedical server systems. Int. J. Inf. Comput. Secur. 20(1/2): 199-219 (2023) - Sunil Gupta, Akansha Bansiya, Mansi Saini, Amuleek Sidhu:
Blockchain-based EHR storage and access control system. Int. J. Inf. Comput. Secur. 21(1/2): 70-81 (2023) - Sahil Gupta, Naresh Kumar Garg:
Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility. Int. J. Inf. Comput. Secur. 20(1/2): 158-175 (2023) - Nayana Hegde, Sunilkumar S. Manvi:
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. Int. J. Inf. Comput. Secur. 20(3/4): 315-348 (2023) - S. Jayashree, S. V. N. Santhosh Kumar:
A comprehensive survey on effective key management schemes for secured authentication in vehicular ad hoc network. Int. J. Inf. Comput. Secur. 22(3/4): 354-376 (2023) - Ancy Sherin Jose, Latha R. Nair, Varghese Paul:
Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks. Int. J. Inf. Comput. Secur. 22(2): 139-166 (2023) - Dilip Kumar, Manoj Kumar:
Outsourcing decryption of KP-ABE using elliptic curve cryptography. Int. J. Inf. Comput. Secur. 22(2): 210-229 (2023) - Umesh Kumar, Vadlamudi Ch. Venkaiah:
A novel stream cipher based on quasigroups and QG-PRNG. Int. J. Inf. Comput. Secur. 22(3/4): 411-435 (2023) - Shipra Kumari, Hrishikesh Mahato:
Construction of weighted orthogonal matrices over finite field and its application in cryptography. Int. J. Inf. Comput. Secur. 22(3/4): 263-276 (2023) - Kheira Lakel, Fatima Bendella
:
A bio-inspired algorithm for enhancing DNA cryptography. Int. J. Inf. Comput. Secur. 21(3/4): 436-456 (2023) - Akanksha S. Mahajan, Pradnya K. Navale, Vaishnavi V. Patil, Vijay M. Khadse, Parikshit N. Mahalle:
The hybrid framework of ensemble technique in machine learning for phishing detection. Int. J. Inf. Comput. Secur. 21(1/2): 162-184 (2023) - Yuvraj Singh Malhi, Virendra Singh Shekhawat:
Two-level machine learning driven intrusion detection model for IoT environments. Int. J. Inf. Comput. Secur. 21(3/4): 229-261 (2023) - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy:
A message encryption scheme inspired by Sudoku puzzle. Int. J. Inf. Comput. Secur. 21(3/4): 399-413 (2023) - Monika Mathur, Nidhi Goel:
FPGA implementation of AES encryptor based on rolled and masked approach. Int. J. Inf. Comput. Secur. 21(1/2): 1-18 (2023) - Thembekile O. Mayayise:
BYOD security issues and controls framework: an outcome of a systematic literature review. Int. J. Inf. Comput. Secur. 21(1/2): 135-161 (2023) - Hoda El Merabet, Abderrahmane Hajraoui:
Malware detection approach based on deep convolutional neural networks. Int. J. Inf. Comput. Secur. 20(1/2): 145-157 (2023) - Pratyusa Mukherjee, Chittaranjan Pradhan, Rabindra Kumar Barik, Harishchandra Dubey:
Emerging DNA cryptography-based encryption schemes: a review. Int. J. Inf. Comput. Secur. 20(1/2): 27-47 (2023) - U. Nandhini, S. V. N. Santhosh Kumar:
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things. Int. J. Inf. Comput. Secur. 21(3/4): 383-398 (2023) - Jing Niu:
Design of automatic monitoring system for network information security in cloud computing environment. Int. J. Inf. Comput. Secur. 21(1/2): 19-34 (2023) - Justice Odoom, Xiaofang Huang, Richlove Samuel Soglo:
JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract. Int. J. Inf. Comput. Secur. 21(3/4): 262-292 (2023) - Jagdish Chandra Pandey, Mala Kalra:
An approach for secure data transmission in smart grids. Int. J. Inf. Comput. Secur. 20(3/4): 348-365 (2023)