default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 284 matches
- 2024
- Meharaj Begum A, Michael Arock:
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. ISC Int. J. Inf. Secur. 16(1): 1-16 (2024) - Morteza Amirmohseni, Sadegh Dorri Nogoorani:
Safety Guards for Ethereum Smart Contracts. ISC Int. J. Inf. Secur. 16(1): 37-53 (2024) - Maryam Rajabzadeh Asaar, Mustafa Isam Ahmed Al-Baghdadi:
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs. ISC Int. J. Inf. Secur. 16(2): 149-163 (2024) - Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. ISC Int. J. Inf. Secur. 16(1): 93-114 (2024) - Nilakshi Gogoi, Dhruba K. Bhattacharyya, Debojit Boro:
Shrew DDoS Attack Detection Based on Statistical Analysis. ISC Int. J. Inf. Secur. 16(2): 205-220 (2024) - Mehmet Emin Gönen, Muhammed Said Gündogan, Kamil Otal:
Boomerang Attacks on Reduced-Round Midori64. ISC Int. J. Inf. Secur. 16(2): 191-203 (2024) - Mohammad Ali Jamshidi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref:
Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator. ISC Int. J. Inf. Secur. 16(2): 137-147 (2024) - Shadab Kalhoro, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy:
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios. ISC Int. J. Inf. Secur. 16(1): 17-35 (2024) - Kostyantyn Anatolievich Malyshenko, Majid Mohammad Shafiee, Vadim Anatolievich Malyshenko:
Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis. ISC Int. J. Inf. Secur. 16(2): 165-190 (2024) - Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani:
ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS. ISC Int. J. Inf. Secur. 16(2): 115-136 (2024) - Kangkan Talukdar, Debojit Boro:
Slowloris Attack Detection Using Adaptive Timeout-Based Approach. ISC Int. J. Inf. Secur. 16(1): 79-92 (2024) - Mehmet Ali Yalçinkaya, Ecir Ugur Küçüksille:
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner. ISC Int. J. Inf. Secur. 16(1): 55-77 (2024) - 2023
- Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh:
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. ISC Int. J. Inf. Secur. 15(1): 97-110 (2023) - Hadi Aghaee, Bahareh Akhbari:
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. ISC Int. J. Inf. Secur. 15(3) (2023) - Farhad Taheri Ardakani, Siavash Bayat Sarmadi:
MISC: Multi-Input Secure Two-Party Computation. ISC Int. J. Inf. Secur. 15(2) (2023) - Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki:
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network. ISC Int. J. Inf. Secur. 15(2) (2023) - Parichehr Dadkhah, Mohammad Dakhilalian, Parvin Rastegari:
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks. ISC Int. J. Inf. Secur. 15(3) (2023) - Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. ISC Int. J. Inf. Secur. 15(1): 59-71 (2023) - Maryam Rezaei Kashi, Mojtaba Bahramian:
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves. ISC Int. J. Inf. Secur. 15(2) (2023) - Ali Khosravi, Taraneh Eghlidos:
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm. ISC Int. J. Inf. Secur. 15(1): 83-95 (2023) - Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari:
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem. ISC Int. J. Inf. Secur. 15(1): 125-135 (2023) - Mansoureh Labbafniya, Hamed Yusefi, Akram Khalesi:
Reverse Engineering of Authentication Protocol in DesFire. ISC Int. J. Inf. Secur. 15(2) (2023) - Hamid Mala, Mohammad Reza Saeidi:
Secure Outsourcing of Two Standard Identity-Based Cryptosystems. ISC Int. J. Inf. Secur. 15(2) (2023) - Suryateja S. Pericherla:
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. ISC Int. J. Inf. Secur. 15(1): 1-58 (2023) - Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks. ISC Int. J. Inf. Secur. 15(2) (2023) - Bahram Rashidi:
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers. ISC Int. J. Inf. Secur. 15(1): 137-151 (2023) - Faeze Rasouli, Mohammad Taheri, Reza Rohani Sarvestani:
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers. ISC Int. J. Inf. Secur. 15(2) (2023) - Mahdi Sajadieh, Arash Mirzaei:
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices. ISC Int. J. Inf. Secur. 15(1): 111-124 (2023) - Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref:
A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach. ISC Int. J. Inf. Secur. 15(3) (2023) - Danial Shiraly, Nasrollah Pakniat, Ziba Eslami:
Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. ISC Int. J. Inf. Secur. 15(3): 1-16 (2023)
skipping 254 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-26 09:23 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint