![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 72
Volume 72, February 2023
- Venkata Bhikshapathi Chenam
, Syed Taqi Ali
:
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment. 103377 - Harmanjeet Kaur, Nishtha Hooda
, Harpreet Singh:
k-anonymization of social network data using Neural Network and SVM: K-NeuroSVM. 103382 - Haotian Yin
:
Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model. 103385 - Junwei Zhou, Botian Lei, Huile Lang, Emmanouil Panaousis
, Kaitai Liang, Jianwen Xiang:
Secure genotype imputation using homomorphic encryption. 103386 - Zeyu Yang
, Ziqing Wang, Fei Qiu, Fagen Li
:
A group key agreement protocol based on ECDH and short signature. 103388 - Mahreen Saleem
, M. R. Warsi, Saiful Islam
:
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. 103389 - Gayathri R. Nayar
, Tony Thomas
:
Partial palm vein based biometric authentication. 103390 - Sandeep Bhowmik, Sriyankar Acharyya:
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm. 103391 - Andrew McCarthy
, Essam Ghadafi, Panagiotis Andriotis
, Phil Legg
:
Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. 103398 - Yajing Liu, Zhengya Sun, Wensheng Zhang:
Improving fraud detection via hierarchical attention-based Graph Neural Network. 103399 - Rajasekhar Chaganti, Vinayakumar Ravi
, Tuan D. Pham:
A multi-view feature fusion approach for effective malware classification using Deep Learning. 103402 - Kassem Bagher
, Shangqi Lai
:
SGX-Stream: A Secure Stream Analytics Framework In SGX-enabled Edge Cloud. 103403 - Saeed Javanmardi
, Mohammad Shojafar
, Reza Mohammadi
, Valerio Persico
, Antonio Pescapè:
S-FoS: A secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks. 103404 - Md. Alamin Talukder, Khondokar Fida Hasan
, Md. Manowarul Islam
, Ashraf Uddin
, Arnisha Akhter
, Mohammand Abu Yousuf
, Fares Alharbi
, Mohammad Ali Moni
:
A dependable hybrid machine learning model for network intrusion detection. 103405 - Zhenzhen Guo, Gaoli Wang
, Orr Dunkelman, Yinxue Pan, Shengyuan Liu
:
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? 103406 - R. Anushiadevi
, Rengarajan Amirtharajan
:
Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. 103407 - V. Sangavi, Palanivel Thangavel
:
An exquisite multiple image encryption harnessing multi-scroll Lu-Chen and Chua chaotic systems employing domino strategy. 103408 - Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang
, Quanxin Zhang
, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. 103410
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.