


default search action
International Journal of Information and Computer Security, Volume 18
Volume 18, Numbers 1/2, 2022
- Gang Ke, Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh:
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width. 1-11 - Yen-Wu Ti, Shang-Kuan Chen, Wen-Cheng Wang:
A hierarchical particle swarm optimisation algorithm for cloud computing environment. 12-26 - Jaryn Shen, Qingkai Zeng:
The count-min sketch is vulnerable to offline password-guessing attacks. 27-39 - N. Raghu Kisore, K. Shiva Kumar:
FFRR: a software diversity technique for defending against buffer overflow attacks. 40-74 - Salma Dammak, Faiza Ghozzi
, Asma Sellami, Faïez Gargouri
:
Managing vulnerabilities during the development of a secure ETL processes. 75-104 - Duncan-Allan Byamukama, John Ngubiri:
DDoS amplification attacks and impacts on enterprise service-oriented network infrastructures: DNS servers. 105-132 - Premala Bhande, Mohammed Bakhar:
Enhanced ant colony-based AODV for analysis of black and gray hole attacks in MANET. 133-147 - Punugu Vasudeva Reddy, A. Ramesh Babu, N. B. Gayathri:
Pairing-based strong key-insulated signature scheme. 148-164 - Shravani Mahesh Patil, B. R. Purushothama:
QC-PRE: quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data. 165-192 - Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:
Robustness attack on copyright protection scheme for H.264/AVC and SVC. 193-203 - Jianqing Gao, Haiyang Zou, Fuquan Zhang, Tsu-Yang Wu:
An intelligent stage light-based actor identification and positioning system. 204-218 - Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
Effect of black hole attack in different mobility models of MANET using OLSR protocol. 219-235
Volume 18, Numbers 3/4, 2022
- Mingyue Wang, Shen Yan, Wei Wang, Jiwu Jing:
Secure zero-effort two-factor authentication based on time-frequency audio analysis. 237-261 - Asma Amraoui:
On a secured channel selection in cognitive radio networks. 262-277 - Min Ren, Zhihao Wang, Peiying Zhao:
A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection. 278-299 - Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen:
Research on intrusion detection method based on SMOTE and DBN-LSSVM. 300-312 - Nilay R. Mistry, Krupa Gajjar, S. O. Junare:
Volatile memory forensics of privacy aware browsers. 313-326 - Shikha Badhani, Sunil Kumar Muttoo:
GENDroid - a graph-based ensemble classifier for detecting Android malware. 327-347 - S. Jamuna Rani, S. Vagdevi:
Auto-encoder-based technique for effective detection of frauds in social networks. 348-364 - Dillibabu Shanmugam, Jothi Rangasamy:
Robust message authentication in the context of quantum key distribution. 365-382 - Bhanu Chander, Kumaravelan Gopalakrishnan:
RFID tag-based mutual authentication protocol with improved security for TMIS. 383-405 - Sandip Thite
, J. NaveenKumar:
SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications. 406-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.