default search action
International Journal of Information and Computer Security, Volume 13
Volume 13, Number 1, 2020
- R. Vinothkanna, S. Sivakannan, N. Prabakaran:
A novel GAAC optimisation algorithm for multimodal fusion score decision making in secured biometric systems. 3-17 - A. Rajagopal, K. Karibasappa, K. S. Vasundara Patel:
Study of LDPC decoders with quadratic residue sequence for communication system. 18-31 - Usha Gopal, Kannimuthu Subramanian, P. D. Mahendiran, Anusha Kadambari Shanker, Deepti Venugopal:
Static analysis method for detecting cross site scripting vulnerabilities. 32-47 - Handenahalli Channareddy Kantharaju, K. N. Narasimha Murthy:
An energy efficient authentication scheme based on hierarchical IBDS and EIBDS in grid-based wireless sensor networks. 48-72 - Natasha Saini, Nitin Pandey, Ajeet Pal Singh:
Developing malevolent node-based protection system against jamming attack in agent assisted CRN. 73-96 - Suleiman Salihu Jauro, Raghav Yadav:
An efficient interior and exterior boundary detection-based two level iris segmentation. 97-117 - Amal Hafsa, Anissa Sghaier, Medien Zeghid, Jihene Malek, Mohsen Machhout:
An improved co-designed AES-ECC cryptosystem for secure data transmission. 118-140
Volume 13, Number 2, 2020
- Lija Mohan, M. Sudheep Elayidom:
Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data. 141-165 - Jian-Feng Zhao, Shu-Ying Wang, Li-Tao Zhang, Xian-Feng Li:
Image encryption scheme based on a novel fractional order compound chaotic attractor. 166-186 - Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Comparative evaluation of different classification techniques for masquerade attack detection. 187-209 - Ahmad Salah Al-Ahmad, Syed Ahmad Aljunid, Normaly Kamal Ismail:
Mobile cloud computing applications penetration testing model design. 210-226 - Saeed Ullah Jan, Fawad Qayum:
An authentication scheme for distributed computing environment. 227-248
Volume 13, Numbers 3/4, 2020
- Yoones A. Sekhavat:
CFM: collusion-free model of privacy preserving frequent itemset mining. 249-267 - Mohamed Elhoseny, Hosny A. Abbas:
Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms. 268-288 - Guizhen Mai, Shuiguo Peng, Yinghan Hong, Pinghua Chen:
Fast causal division for supporting robust causal discovery. 289-308 - Mircho Mirchev, Seferin Mirtchev:
System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis. 309-321 - Dharavath Ramesh, Rashmi Priya Sharma, Damodar Reddy Edla:
HHDSSC: harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption. 322-336 - Alka Gupta, Lalit Sen Sharma:
A categorical survey of state-of-the-art intrusion detection system-Snort. 337-356 - V. Biksham, D. Vasumathi:
A lightweight fully homomorphic encryption scheme for cloud security. 357-371 - Indu Singh, Nikhil Arora, Shivam Arora, Parteek Singhal:
Fuzzy ARM and cluster analysis for database intrusion detection and prevention. 372-395 - Sonika Shrivastava, Rajesh Kumar Pateriya:
Data encoding and cost optimised distribution for efficient and secure storage in cloud federation. 396-410 - Pranjal S. Bogawar, Kishor K. Bhoyar:
Comparative study of classification approaches for e-mail analysis. 411-427 - Lamia Hamza:
Intruder model for generating attack scenarios in computer systems. 428-443
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.