default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics9.bht:"
@article{DBLP:journals/ijics/Al-JarrahAJ17, author = {Omar M. Al{-}Jarrah and Moath Al{-}Ayoub and Yaser Jararweh}, title = {Hierarchical detection of insider attacks in cloud computing systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {85--99}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003601}, doi = {10.1504/IJICS.2017.10003601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-JarrahAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Alsaghier17, author = {Hisham M. Alsaghier}, title = {A secure mobile commerce framework based on community cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {100--113}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003604}, doi = {10.1504/IJICS.2017.10003604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Alsaghier17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnushaS17, author = {K. Anusha and E. Sathiyamoorthy}, title = {{MAM-ISSIDS:} multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {361--386}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008448}, doi = {10.1504/IJICS.2017.10008448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnushaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AroraT17, author = {Vasudha Arora and Shyam Sunder Tyagi}, title = {Update enabled multi-keyword searchable encryption scheme for secure data outsourcing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {288--301}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008445}, doi = {10.1504/IJICS.2017.10008445}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AroraT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DabirAM17, author = {Abes Dabir and AbdelRahman Abdou and Ashraf Matrawy}, title = {A survey on forensic event reconstruction systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {337--360}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008447}, doi = {10.1504/IJICS.2017.10008447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DabirAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DjellabB17, author = {Rima Djellab and Mohamed Benmohammed}, title = {A novel quantum distributed key management protocol for ring-organised group}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {302--323}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10004329}, doi = {10.1504/IJICS.2017.10004329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DjellabB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaMB17, author = {Amit Kr. Gupta and Jyotsna Kumar Mandal and Indrajit Bhattacharya}, title = {Mitigating selfish, blackhole and wormhole attacks in {DTN} in a secure, cooperative way}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {130--155}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003609}, doi = {10.1504/IJICS.2017.10003609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JaiswalG17, author = {Shruti Jaiswal and Daya Gupta}, title = {Security engineering methods - in-depth analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {180--211}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005903}, doi = {10.1504/IJICS.2017.10005903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JaiswalG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KasanaSB17, author = {Geeta Kasana and Kulbir Singh and Satvinder Singh Bhatia}, title = {Data hiding using lifting scheme and genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {271--287}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008444}, doi = {10.1504/IJICS.2017.10008444}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KasanaSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Khan17, author = {Arif Khan}, title = {Virtual machine security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {49--84}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003599}, doi = {10.1504/IJICS.2017.10003599}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Khan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Manasrah17, author = {Ahmad M. Manasrah}, title = {Dynamic weighted {VM} load balancing for cloud-analyst}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {5--19}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003596}, doi = {10.1504/IJICS.2017.10003596}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Manasrah17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MenesidouK17, author = {Sofia{-}Anna Menesidou and Vasilios Katos}, title = {Opportunistic key management in delay tolerant networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {212--228}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005904}, doi = {10.1504/IJICS.2017.10005904}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MenesidouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Montasari17, author = {Reza Montasari}, title = {A standardised data acquisition process model for digital forensic investigations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {229--249}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005908}, doi = {10.1504/IJICS.2017.10005908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Montasari17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RangasamyKKV17, author = {Jothi Rangasamy and Lakshmi Kuppusamy and Gopi Krishnan and Velmurugan}, title = {Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {114--129}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003606}, doi = {10.1504/IJICS.2017.10003606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RangasamyKKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaniB17, author = {Prathuri Jhansi Rani and S. Durga Bhavani}, title = {Keyed hash function using Bernoulli shift map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {250--270}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005909}, doi = {10.1504/IJICS.2017.10005909}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaniB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TawalbehAJA17, author = {Lo'ai Ali Tawalbeh and Fadi Ababneh and Yaser Jararweh and Fahd M. Al{-}Dosari}, title = {Trust delegation-based secure mobile cloud computing framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {36--48}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003598}, doi = {10.1504/IJICS.2017.10003598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TouaziOBB17, author = {Djoudi Touazi and Mawloud Omar and Abdelhakim Bendib and Abdelmadjid Bouabdallah}, title = {A trust-based approach for securing data communication in delay tolerant networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {4}, pages = {324--336}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10008446}, doi = {10.1504/IJICS.2017.10008446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TouaziOBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZearSK17, author = {Aditi Zear and Amit Kumar Singh and Pardeep Kumar}, title = {Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {20--35}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003597}, doi = {10.1504/IJICS.2017.10003597}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZearSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZengCX17, author = {Lei Zeng and Hui Chen and Yang Xiao}, title = {Accountable administration in operating systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {3}, pages = {157--179}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10005900}, doi = {10.1504/IJICS.2017.10005900}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZengCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.