default search action
International Journal of Information and Computer Security, Volume 23
Volume 23, Number 1, 2024
- Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu:
Image tampering detection based on feature consistency attention. 1-15 - Tran Thi Luong, Linh Hoang Dinh:
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. 16-39 - Aparna Bhonde, Satish R. Devane:
Priority-based security-aware virtual machine allocation policy. 40-56 - Laxmi Bhagwat, Balaji Patil:
Behavioural analysis and results of malware and ransomware using optimal behavioural feature set. 57-78 - Thomas Nagunwa:
AI-driven approach for robust real-time detection of zero-day phishing websites. 79-118
Volume 23, Number 2, 2024
- Devender Kumar, Satish Chand, Bijendra Kumar:
A secure three-factor authentication protocol for mobile networks. 119-138 - Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. 139-162 - Chenghua Tang, Mengmeng Yang, Qingze Gao, Baohua Qiang:
PBDG: a malicious code detection method based on precise behaviour dependency graph. 163-189 - Payal Sharma, B. R. Purushothama:
User driven general framework to cap the joins in secure group communication. 190-199 - Oussama Nahnah, Sarra Cherbal:
SLAK: secure lightweight scheme for authentication and key-agreement in internet of things. 200-226
Volume 23, Number 3, 2024
- Rahul, Venkatesh, M. Karthik, K. R. Venugopal, Satish B. Basapur:
SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of things. 227-270 - Mandeep Kaur Sandhu, Surender Singh, Manjit Kaur:
A new hybrid chaotic system and its analysis. 271-293 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
Re-evaluation of PhishI game and its utilisation in eliciting security requirements. 294-321 - Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq, Hajed M. Alhatlani, Faisal A. Alobaid:
On the performance of AES algorithm variants. 322-337 - C. Ravichandran, T. J. Nagalakshmi, P. Shyamala Bharathi, C. Sivakumaran:
Technique for detecting hardware-based Trojans using a convolutional neural network. 338-347
Volume 23, Number 4, 2024
- Saâd Boukers, Abdelkader Belkhir:
A new architecture with a new protocol for m-payment. 349-374 - Sushant Chamoli, Varsha Mittal:
A taxonomy of DDoS attacks and its impact on Docker architecture. 375-395 - Rupesh Kumar Sinha, Sitanshu Sekhar Sahu:
Multi-level image security using modified Rubik's cube algorithm. 396-409 - Tran Thi Luong, Linh Hoang Dinh:
Generating key-dependent involutory MDS matrices through permutations, direct exponentiation, and scalar multiplication. 410-432 - Khadidja Bennaceur, Zakaria Sahraoui, Mohamed Ahmad Nacer:
Feature selection and deep learning approach for anomaly network intrusion detection. 433-453
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.