default search action
International Journal of Information and Computer Security, Volume 24
Volume 24, Numbers 1/2, 2024
- Lenin Narengbam, Shouvik Dey:
Anomaly-based intrusion detection system using Harris Hawks optimisation with a sigmoid neuron network. 5-27 - Lijun Deng:
Multi-agent secure payment model of e-commerce based on blockchain perspective. 28-43 - Jianhua Liu, Huijie Ma:
The optimisation of enterprise internet of things security management system under digital economy. 44-59 - Zhezhou Li, Xiangrong Kong, Xiaozhen Jiang:
The relationship between digital information security of the supply chain and enterprise development. 60-79 - Yongling Zhang, Xuandong Zhang, Jinlong Song:
Enterprise intelligent financial sharing mechanism in the security environment of the internet of things. 80-97 - Jingfeng Jiang, Yongyi Wu:
Analysis of competitive differences in the bilateral platforms of the digital economy using artificial intelligence and network data security. 98-116 - Rachid Rimani, Adda Ali-Pacha, Naima Hadj-Said:
Encryption by block based on rekeying and inter-intra pixel permutation. 117-136 - Jianxin Xiong, Xianping Wang:
Library data protection and threat detection system based on network security. 137-153
Volume 24, Numbers 3/4, 2024
- Ruixia Yan, Yuan Jia, Lin Gao:
A robust feature points-based screen-shooting resilient watermarking scheme. 155-187 - Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher:
An image encryption using hybrid grey wolf optimisation and chaotic map. 188-213 - Kumari Suniti Singh, Harsh Vikram Singh:
Robust watermarking of medical images using SVM and hybrid DWT-SVD. 214-235 - Sunil Kumar Patel, Saravanan Chandran, Purushottam Kumar:
Secure digital academic certificate verification system using blockchain. 236-257 - Xiangning Liang, Pushpendu Kar:
Robust and secure file transmission through video streaming using steganography and blockchain. 258-283 - Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta:
Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review. 284-321 - Ravi Sheth, Chandresh Parekha:
An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning. 322-337 - Joon Son, Essia Hamouda, Garo Pannosian, Vijay Bhuse:
Data dissemination and policy enforcement in multi-level secure multi-domain environments. 338-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.