Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Information and Computer Security, Volume 23
Volume 23, Number 1, 2024
- Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu:
Image tampering detection based on feature consistency attention. 1-15 - Tran Thi Luong, Linh Hoang Dinh:
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. 16-39 - Aparna Bhonde, Satish R. Devane:
Priority-based security-aware virtual machine allocation policy. 40-56 - Laxmi Bhagwat, Balaji Patil:
Behavioural analysis and results of malware and ransomware using optimal behavioural feature set. 57-78 - Thomas Nagunwa:
AI-driven approach for robust real-time detection of zero-day phishing websites. 79-118
Volume 23, Number 2, 2024
- Devender Kumar, Satish Chand, Bijendra Kumar:
A secure three-factor authentication protocol for mobile networks. 119-138 - Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. 139-162 - Chenghua Tang, Mengmeng Yang, Qingze Gao, Baohua Qiang:
PBDG: a malicious code detection method based on precise behaviour dependency graph. 163-189 - Payal Sharma, B. R. Purushothama:
User driven general framework to cap the joins in secure group communication. 190-199 - Oussama Nahnah, Sarra Cherbal:
SLAK: secure lightweight scheme for authentication and key-agreement in internet of things. 200-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.