- N. D. Patel, B. M. Mehtre, Rajeev Wankar:
Artificial neural network-based intrusion detection system using multi-objective genetic algorithm. Int. J. Inf. Comput. Secur. 21(3/4): 320-335 (2023) - K. Abhimanyu Kumar Patro
, Bibhudendra Acharya
:
An efficient two-level image encryption system using chaotic maps. Int. J. Inf. Comput. Secur. 21(1/2): 35-69 (2023) - Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand:
Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud. Int. J. Inf. Comput. Secur. 22(3/4): 298-322 (2023) - S. P. Ramya, Rajagopal Eswari:
A shallow-based neural network model for fake news detection in social networks. Int. J. Inf. Comput. Secur. 21(3/4): 360-382 (2023) - Ranjeet Kumar Ranjan, Amit Singh:
A comparative study of deep transfer learning models for malware classification using image datasets. Int. J. Inf. Comput. Secur. 21(3/4): 293-319 (2023) - Santosh Kumar Ravva, Sureddi R. M. Krishna:
Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach. Int. J. Inf. Comput. Secur. 22(3/4): 377-389 (2023) - Pritam S. Salankar, Vinay Avasthi, Ashutosh Pasricha:
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications. Int. J. Inf. Comput. Secur. 20(1/2): 176-198 (2023) - Saravanan Arumugam
, Sathya Bama S.:
CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment. Int. J. Inf. Comput. Secur. 20(3/4): 269-294 (2023) - Synim Selimi, Blerim Rexha, Kamer Vishi:
CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML. Int. J. Inf. Comput. Secur. 22(1): 117-138 (2023) - Shalini Subramani
, Munuswamy Selvi
:
Comprehensive review on distributed denial of service attacks in wireless sensor networks. Int. J. Inf. Comput. Secur. 20(3/4): 414-438 (2023) - Shalini Subramani
, Munuswamy Selvi
:
Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks. Int. J. Inf. Comput. Secur. 20(3/4): 439-461 (2023) - K. Suresh, Rajarshi Pal, S. R. Balasundaram:
A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage. Int. J. Inf. Comput. Secur. 20(3/4): 366-398 (2023) - Swapnil Sutar, Vikas Tiwari, Ajeet Singh
:
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT. Int. J. Inf. Comput. Secur. 21(3/4): 336-359 (2023) - Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey:
Performance evaluation of various deep convolutional neural network models through classification of malware. Int. J. Inf. Comput. Secur. 21(3/4): 414-435 (2023) - Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu, Ashutosh Saxena:
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes. Int. J. Inf. Comput. Secur. 20(3/4): 399-413 (2023) - Samson Ebenezar Uthirapathy
, Domnic Sandanam:
Sentiment analysis in social network data using multilayer perceptron neural network with hill-climbing meta-heuristic optimisation. Int. J. Inf. Comput. Secur. 22(3/4): 277-297 (2023) - Anjani Kumar Verma, Veer Sain Dixit:
Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering. Int. J. Inf. Comput. Secur. 20(1/2): 133-144 (2023) - Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta:
Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4. Int. J. Inf. Comput. Secur. 20(1/2): 1-26 (2023) - Zhijun Wu, Chenlei Zhang, Junjun Guo:
A method of speech information hiding in inactive frame based on pitch modulation. Int. J. Inf. Comput. Secur. 22(1): 1-27 (2023) - Lizhe Zhang, Zhuoning Bai, Zhijun Wu, Kenian Wang:
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP. Int. J. Inf. Comput. Secur. 22(2): 186-209 (2023) - 2022
- Mohammed Riyadh Abdmeziem:
Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode. Int. J. Inf. Comput. Secur. 17(1/2): 36-56 (2022) - Junaid Akram, Danish Vasan, Ping Luo:
Obfuscated code is identifiable by a token-based code clone detection technique. Int. J. Inf. Comput. Secur. 19(3/4): 254-273 (2022) - Taghreed AlKhodaidi
, Adnan Gutub
:
Scalable shares generation to increase participants of counting-based secret sharing technique. Int. J. Inf. Comput. Secur. 17(1/2): 119-146 (2022) - Omar Al-Ibrahim
, Majid Malaika:
Botract: abusing smart contracts and blockchain for botnet command and control. Int. J. Inf. Comput. Secur. 17(1/2): 147-163 (2022) - Asma Amraoui:
On a secured channel selection in cognitive radio networks. Int. J. Inf. Comput. Secur. 18(3/4): 262-277 (2022) - Ahmad Azab:
The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows. Int. J. Inf. Comput. Secur. 17(3/4): 332-350 (2022) - Shikha Badhani, Sunil Kumar Muttoo:
GENDroid - a graph-based ensemble classifier for detecting Android malware. Int. J. Inf. Comput. Secur. 18(3/4): 327-347 (2022) - Saba Malekpour Bejandi, Mohammad Reza Taghva, Payam Hanafizadeh:
Applying swarm intelligence and data mining approach in detecting online and digital theft. Int. J. Inf. Comput. Secur. 19(1/2): 142-167 (2022) - Premala Bhande, Mohammed Bakhar:
Enhanced ant colony-based AODV for analysis of black and gray hole attacks in MANET. Int. J. Inf. Comput. Secur. 18(1/2): 133-147 (2022) - Suhong Bi:
Multiple backup method of financial encrypted data on internet of things platform. Int. J. Inf. Comput. Secur. 19(1/2): 199-209 (2022)