default search action
International Journal of Information and Computer Security, Volume 9
Volume 9, Numbers 1/2, 2017
- Ahmad M. Manasrah:
Dynamic weighted VM load balancing for cloud-analyst. 5-19 - Aditi Zear, Amit Kumar Singh, Pardeep Kumar:
Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. 20-35 - Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari:
Trust delegation-based secure mobile cloud computing framework. 36-48 - Arif Khan:
Virtual machine security. 49-84 - Omar M. Al-Jarrah, Moath Al-Ayoub, Yaser Jararweh:
Hierarchical detection of insider attacks in cloud computing systems. 85-99 - Hisham M. Alsaghier:
A secure mobile commerce framework based on community cloud. 100-113 - Jothi Rangasamy, Lakshmi Kuppusamy, Gopi Krishnan, Velmurugan:
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services. 114-129 - Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya:
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. 130-155
Volume 9, Number 3, 2017
- Lei Zeng, Hui Chen, Yang Xiao:
Accountable administration in operating systems. 157-179 - Shruti Jaiswal, Daya Gupta:
Security engineering methods - in-depth analysis. 180-211 - Sofia-Anna Menesidou, Vasilios Katos:
Opportunistic key management in delay tolerant networks. 212-228 - Reza Montasari:
A standardised data acquisition process model for digital forensic investigations. 229-249 - Prathuri Jhansi Rani, S. Durga Bhavani:
Keyed hash function using Bernoulli shift map. 250-270
Volume 9, Number 4, 2017
- Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia:
Data hiding using lifting scheme and genetic algorithm. 271-287 - Vasudha Arora, Shyam Sunder Tyagi:
Update enabled multi-keyword searchable encryption scheme for secure data outsourcing. 288-301 - Rima Djellab, Mohamed Benmohammed:
A novel quantum distributed key management protocol for ring-organised group. 302-323 - Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah:
A trust-based approach for securing data communication in delay tolerant networks. 324-336 - Abes Dabir, AbdelRahman Abdou, Ashraf Matrawy:
A survey on forensic event reconstruction systems. 337-360 - K. Anusha, E. Sathiyamoorthy:
MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network. 361-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.