default search action
Journal of Information Security and Applications, Volume 35
Volume 35, August 2017
- Unnikrishnan K, Pramod K. V:
Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm. 1-12 - Jingyu Ye, Yun-Qing Shi:
An effective method to detect seam carving. 13-22 - Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello:
Slowcomm: Design, development and performance evaluation of a new slow DoS attack. 23-31 - Neminath Hubballi, Nikhil Tripathi:
An event based technique for detecting spoofed IP packets. 32-43 - Samta Gajbhiye, Sanjeev Karmakar, Monisha Sharma, Sanjay Sharma:
Design and analysis of pairing protocol for bluetooth enabled devices using R-LWE Lattice-based cryptography. 44-50 - Minhong Sun, Lebin Zhang, Jianrong Bao, Yunzhen Yan:
RF fingerprint extraction for GNSS anti-spoofing using axial integrated Wigner bispectrum. 51-54 - Chu Huang, Sencun Zhu, Quanlong Guan, Yongzhong He:
A software assignment algorithm for minimizing worm damage in networked systems. 55-67 - Rong Wang, Yan Zhu, Jiefan Tan, Binbin Zhou:
Detection of malicious web pages based on hybrid analysis. 68-74 - Gowtham Ramesh, Jithendranath Gupta, P. G. Gamya:
Identification of phishing webpages and its target domains by analyzing the feign relationship. 75-84 - Kholoud Alsmearat, Mahmoud Al-Ayyoub, Riyad Al-Shalabi, Ghassan Kanaan:
Author gender identification from Arabic text. 85-95 - Vasileios Gkioulos, Erko Risthein, Stephen D. Wolthusen:
TACTICS: Validation of the security framework developed for tactical SOA. 96-105 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. 106-118 - Rafik Hamza:
A novel pseudo random sequence generator for image-cryptographic applications. 119-127 - Chanchala Joshi, Umesh Kumar Singh:
Information security risks management framework - A step towards mitigating security risks in university network. 128-137 - Diogo A. B. Fernandes, Mário M. Freire, Paulo A. P. Fazendeiro, Pedro R. M. Inácio:
Applications of artificial immune systems to computer security: A survey. 138-159 - Prosanta Gope:
Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks. 160-167 - Peter Ullrich:
The risk to breach vote privacy by unanimous voting. 168-174
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.