Search dblp for Publications

export results for "toc:db/journals/ijics/ijics24.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AbdulKareemA24,
  author       = {Ali Akram Abdul{-}Kareem and
                  Waleed Ameen Mahmoud Al{-}Jawher},
  title        = {An image encryption using hybrid grey wolf optimisation and chaotic
                  map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {188--213},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141599},
  doi          = {10.1504/IJICS.2024.141599},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AbdulKareemA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Deng24,
  author       = {Lijun Deng},
  title        = {Multi-agent secure payment model of e-commerce based on blockchain
                  perspective},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {28--43},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140221},
  doi          = {10.1504/IJICS.2024.140221},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Deng24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JiangW24,
  author       = {Jingfeng Jiang and
                  Yongyi Wu},
  title        = {Analysis of competitive differences in the bilateral platforms of
                  the digital economy using artificial intelligence and network data
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {98--116},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140213},
  doi          = {10.1504/IJICS.2024.140213},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JiangW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiKJ24,
  author       = {Zhezhou Li and
                  Xiangrong Kong and
                  Xiaozhen Jiang},
  title        = {The relationship between digital information security of the supply
                  chain and enterprise development},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {60--79},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140207},
  doi          = {10.1504/IJICS.2024.140207},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiKJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiangK24,
  author       = {Xiangning Liang and
                  Pushpendu Kar},
  title        = {Robust and secure file transmission through video streaming using
                  steganography and blockchain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {258--283},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141610},
  doi          = {10.1504/IJICS.2024.141610},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiangK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiuM24,
  author       = {Jianhua Liu and
                  Huijie Ma},
  title        = {The optimisation of enterprise internet of things security management
                  system under digital economy},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {44--59},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140214},
  doi          = {10.1504/IJICS.2024.140214},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiuM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NarengbamD24,
  author       = {Lenin Narengbam and
                  Shouvik Dey},
  title        = {Anomaly-based intrusion detection system using Harris Hawks optimisation
                  with a sigmoid neuron network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {5--27},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140219},
  doi          = {10.1504/IJICS.2024.140219},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NarengbamD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatelCK24,
  author       = {Sunil Kumar Patel and
                  Saravanan Chandran and
                  Purushottam Kumar},
  title        = {Secure digital academic certificate verification system using blockchain},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {236--257},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141600},
  doi          = {10.1504/IJICS.2024.141600},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatelCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RimaniAH24,
  author       = {Rachid Rimani and
                  Adda Ali{-}Pacha and
                  Naima Hadj{-}Said},
  title        = {Encryption by block based on rekeying and inter-intra pixel permutation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {117--136},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140209},
  doi          = {10.1504/IJICS.2024.140209},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RimaniAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShethP24,
  author       = {Ravi Sheth and
                  Chandresh Parekha},
  title        = {An intelligent approach to classify and detection of image forgery
                  attack (scaling and cropping) using transfer learning},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {322--337},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141602},
  doi          = {10.1504/IJICS.2024.141602},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShethP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghS24,
  author       = {Kumari Suniti Singh and
                  Harsh Vikram Singh},
  title        = {Robust watermarking of medical images using {SVM} and hybrid {DWT-SVD}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {214--235},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141598},
  doi          = {10.1504/IJICS.2024.141598},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SonHPB24,
  author       = {Joon Son and
                  Essia Hamouda and
                  Garo Pannosian and
                  Vijay Bhuse},
  title        = {Data dissemination and policy enforcement in multi-level secure multi-domain
                  environments},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {338--360},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141603},
  doi          = {10.1504/IJICS.2024.141603},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SonHPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TiruloCD24,
  author       = {Aschalew Tirulo and
                  Siddhartha Chauhan and
                  Kamlesh Dutta},
  title        = {Machine learning and deep learning techniques for detecting and mitigating
                  cyber threats in IoT-enabled smart grids: a comprehensive review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {284--321},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141601},
  doi          = {10.1504/IJICS.2024.141601},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TiruloCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XiongW24,
  author       = {Jianxin Xiong and
                  Xianping Wang},
  title        = {Library data protection and threat detection system based on network
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {137--153},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140212},
  doi          = {10.1504/IJICS.2024.140212},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XiongW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YanJG24,
  author       = {Ruixia Yan and
                  Yuan Jia and
                  Lin Gao},
  title        = {A robust feature points-based screen-shooting resilient watermarking
                  scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {3/4},
  pages        = {155--187},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.141594},
  doi          = {10.1504/IJICS.2024.141594},
  timestamp    = {Sat, 12 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YanJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangZS24,
  author       = {Yongling Zhang and
                  Xuandong Zhang and
                  Jinlong Song},
  title        = {Enterprise intelligent financial sharing mechanism in the security
                  environment of the internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {24},
  number       = {1/2},
  pages        = {80--97},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJICS.2024.140210},
  doi          = {10.1504/IJICS.2024.140210},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}