


default search action
International Journal of Information and Computer Security, Volume 21
Volume 21, Numbers 1/2, 2023
- Monika Mathur, Nidhi Goel:
FPGA implementation of AES encryptor based on rolled and masked approach. 1-18 - Jing Niu:
Design of automatic monitoring system for network information security in cloud computing environment. 19-34 - K. Abhimanyu Kumar Patro
, Bibhudendra Acharya
:
An efficient two-level image encryption system using chaotic maps. 35-69 - Sunil Gupta, Akansha Bansiya, Mansi Saini, Amuleek Sidhu:
Blockchain-based EHR storage and access control system. 70-81 - Nureni Ayofe Azeez, Odejinmi Oluwatobi Samuel:
A cyberstalking-free global network with artificial intelligence approach. 82-108 - K. K. Amith, H. A. Sanjay, Ajay Mahadevan, K. Harshita, D. Eshwar, Aditya Shastry
:
Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India. 109-134 - Thembekile O. Mayayise:
BYOD security issues and controls framework: an outcome of a systematic literature review. 135-161 - Akanksha S. Mahajan, Pradnya K. Navale, Vaishnavi V. Patil, Vijay M. Khadse, Parikshit N. Mahalle:
The hybrid framework of ensemble technique in machine learning for phishing detection. 162-184 - P. L. Chithra, R. Aparna
:
Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme. 185-204 - Jay Dave, Meghna Bhatt, Deep Pancholi:
Secure proof of ownership for deduplicated cloud storage system. 205-228
Volume 21, Numbers 3/4, 2023
- Yuvraj Singh Malhi, Virendra Singh Shekhawat:
Two-level machine learning driven intrusion detection model for IoT environments. 229-261 - Justice Odoom, Xiaofang Huang, Richlove Samuel Soglo:
JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract. 262-292 - Ranjeet Kumar Ranjan, Amit Singh:
A comparative study of deep transfer learning models for malware classification using image datasets. 293-319 - N. D. Patel, B. M. Mehtre, Rajeev Wankar:
Artificial neural network-based intrusion detection system using multi-objective genetic algorithm. 320-335 - Swapnil Sutar, Vikas Tiwari, Ajeet Singh
:
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT. 336-359 - S. P. Ramya, Eswari Rajagopal:
A shallow-based neural network model for fake news detection in social networks. 360-382 - U. Nandhini
, S. V. N. Santhosh Kumar:
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things. 383-398 - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy:
A message encryption scheme inspired by Sudoku puzzle. 399-413 - Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey:
Performance evaluation of various deep convolutional neural network models through classification of malware. 414-435 - Kheira Lakel, Fatima Bendella
:
A bio-inspired algorithm for enhancing DNA cryptography. 436-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.