default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics24.bht:"
@article{DBLP:journals/ijics/AbdulKareemA24, author = {Ali Akram Abdul{-}Kareem and Waleed Ameen Mahmoud Al{-}Jawher}, title = {An image encryption using hybrid grey wolf optimisation and chaotic map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {188--213}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141599}, doi = {10.1504/IJICS.2024.141599}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AbdulKareemA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Deng24, author = {Lijun Deng}, title = {Multi-agent secure payment model of e-commerce based on blockchain perspective}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {28--43}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140221}, doi = {10.1504/IJICS.2024.140221}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Deng24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JiangW24, author = {Jingfeng Jiang and Yongyi Wu}, title = {Analysis of competitive differences in the bilateral platforms of the digital economy using artificial intelligence and network data security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {98--116}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140213}, doi = {10.1504/IJICS.2024.140213}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JiangW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiKJ24, author = {Zhezhou Li and Xiangrong Kong and Xiaozhen Jiang}, title = {The relationship between digital information security of the supply chain and enterprise development}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {60--79}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140207}, doi = {10.1504/IJICS.2024.140207}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiKJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiangK24, author = {Xiangning Liang and Pushpendu Kar}, title = {Robust and secure file transmission through video streaming using steganography and blockchain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {258--283}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141610}, doi = {10.1504/IJICS.2024.141610}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiangK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiuM24, author = {Jianhua Liu and Huijie Ma}, title = {The optimisation of enterprise internet of things security management system under digital economy}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {44--59}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140214}, doi = {10.1504/IJICS.2024.140214}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiuM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NarengbamD24, author = {Lenin Narengbam and Shouvik Dey}, title = {Anomaly-based intrusion detection system using Harris Hawks optimisation with a sigmoid neuron network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {5--27}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140219}, doi = {10.1504/IJICS.2024.140219}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NarengbamD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatelCK24, author = {Sunil Kumar Patel and Saravanan Chandran and Purushottam Kumar}, title = {Secure digital academic certificate verification system using blockchain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {236--257}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141600}, doi = {10.1504/IJICS.2024.141600}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatelCK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RimaniAH24, author = {Rachid Rimani and Adda Ali{-}Pacha and Naima Hadj{-}Said}, title = {Encryption by block based on rekeying and inter-intra pixel permutation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {117--136}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140209}, doi = {10.1504/IJICS.2024.140209}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RimaniAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShethP24, author = {Ravi Sheth and Chandresh Parekha}, title = {An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {322--337}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141602}, doi = {10.1504/IJICS.2024.141602}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShethP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghS24, author = {Kumari Suniti Singh and Harsh Vikram Singh}, title = {Robust watermarking of medical images using {SVM} and hybrid {DWT-SVD}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {214--235}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141598}, doi = {10.1504/IJICS.2024.141598}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SonHPB24, author = {Joon Son and Essia Hamouda and Garo Pannosian and Vijay Bhuse}, title = {Data dissemination and policy enforcement in multi-level secure multi-domain environments}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {338--360}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141603}, doi = {10.1504/IJICS.2024.141603}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SonHPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TiruloCD24, author = {Aschalew Tirulo and Siddhartha Chauhan and Kamlesh Dutta}, title = {Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {284--321}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141601}, doi = {10.1504/IJICS.2024.141601}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TiruloCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XiongW24, author = {Jianxin Xiong and Xianping Wang}, title = {Library data protection and threat detection system based on network security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {137--153}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140212}, doi = {10.1504/IJICS.2024.140212}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XiongW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YanJG24, author = {Ruixia Yan and Yuan Jia and Lin Gao}, title = {A robust feature points-based screen-shooting resilient watermarking scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {3/4}, pages = {155--187}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.141594}, doi = {10.1504/IJICS.2024.141594}, timestamp = {Sat, 12 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YanJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangZS24, author = {Yongling Zhang and Xuandong Zhang and Jinlong Song}, title = {Enterprise intelligent financial sharing mechanism in the security environment of the internet of things}, journal = {Int. J. Inf. Comput. Secur.}, volume = {24}, number = {1/2}, pages = {80--97}, year = {2024}, url = {https://doi.org/10.1504/IJICS.2024.140210}, doi = {10.1504/IJICS.2024.140210}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.