Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics11.bht:"
@article{DBLP:journals/ijics/AgarkarA19, author = {Aarti Amod Agarkar and Himanshu Agrawal}, title = {Lightweight R-LWE-based privacy preservation scheme for smart grid network}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {233--254}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099433}, doi = {10.1504/IJICS.2019.099433}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AgarkarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AhujaB19, author = {Rakesh Ahuja and Sarabjeet Singh Bedi}, title = {Video watermarking scheme based on {IDR} frames using {MPEG-2} structure}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {585--603}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103065}, doi = {10.1504/IJICS.2019.103065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AhujaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Al-Saraireh19, author = {Ja'afer Al{-}Saraireh}, title = {A novel approach for query over encrypted data in database}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {621--636}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103083}, doi = {10.1504/IJICS.2019.103083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-Saraireh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW19, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang and Xing Li}, title = {On mapping of address and port using translation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {214--232}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099419}, doi = {10.1504/IJICS.2019.099419}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BrownA19, author = {Adam J. Brown and Todd R. Andel}, title = {What's in your honeypot: a privacy compliance perspective}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {289--309}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099443}, doi = {10.1504/IJICS.2019.099443}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BrownA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CarterT19, author = {Henry Carter and Patrick Traynor}, title = {Outsourcing computation for private function evaluation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {525--561}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103052}, doi = {10.1504/IJICS.2019.103052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CarterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DeviS19, author = {B. S. Kiruthika Devi and T. Subbulakshmi}, title = {Cloud-based DDoS attack detection and defence system using statistical approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {447--475}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101935}, doi = {10.1504/IJICS.2019.101935}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DeviS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Elngar19, author = {Ahmed A. Elngar}, title = {An efficient user authentication model for IOT-based healthcare environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {431--446}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101932}, doi = {10.1504/IJICS.2019.101932}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Elngar19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Faraoun19, author = {Kamel Mohamed Faraoun}, title = {A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {61--82}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096849}, doi = {10.1504/IJICS.2019.096849}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Faraoun19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Fredj19, author = {Ouissem Ben Fredj}, title = {{SPHERES:} an efficient server-side web application protection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {33--60}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096848}, doi = {10.1504/IJICS.2019.096848}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Fredj19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HuXWTY19, author = {Xiaoming Hu and Huajie Xu and Jian Wang and WenAn Tan and Yinchun Yang}, title = {A generic construction of identity-based proxy signature scheme in the standard model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {83--100}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096850}, doi = {10.1504/IJICS.2019.096850}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HuXWTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeerthikaM19, author = {V. Keerthika and Nandagopal Malarvizhi}, title = {Mitigate black hole attack using bee optimised weighted trust with {AODV} in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {275--288}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099437}, doi = {10.1504/IJICS.2019.099437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeerthikaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhanOAMN19, author = {Burhan Ul Islam Khan and Rashidah Funke Olanrewaju and Farhat Anwar and Roohie Naaz Mir and Athaur Rahman Najeeb}, title = {A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {332--354}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101908}, doi = {10.1504/IJICS.2019.101908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhanOAMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhemissaTB19, author = {Hamza Khemissa and Djamel Tandjaoui and Samia Bouzefrane}, title = {An efficient authentication and key agreement scheme for e-health applications in the context of internet of things}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {355--390}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101926}, doi = {10.1504/IJICS.2019.101926}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhemissaTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiZ19, author = {Jiaying Li and Baowen Zhang}, title = {An ontology-based approach to improve access policy administration of attribute-based access control}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {391--412}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101928}, doi = {10.1504/IJICS.2019.101928}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ManikandasaranA19, author = {S. S. Manikandasaran and Lawrence Arockiam and P. D. Sheba Kezia Malarchelvi}, title = {MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {1--16}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096846}, doi = {10.1504/IJICS.2019.096846}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ManikandasaranA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MuTL19, author = {Sheng{-}dong Mu and Yixiang Tian and Yiwei Luo}, title = {A study of the internet financial interest rate risk evaluation index system in cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {103--119}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098198}, doi = {10.1504/IJICS.2019.098198}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MuTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NishaP19, author = {T. N. Nisha and Dhanya Pramod}, title = {Sequential pattern analysis for event-based intrusion detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {476--492}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101936}, doi = {10.1504/IJICS.2019.101936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NishaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RasheedNGF19, author = {Mohammad M. Rasheed and Norita Md Norwawi and Osman Ghazali and Munadil K. Faaeq}, title = {Detection algorithm for internet worms scanning that used user datagram protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {1}, pages = {17--32}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.096847}, doi = {10.1504/IJICS.2019.096847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RasheedNGF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RevaneshSA19, author = {M. Revanesh and V. Sridhar and John M. Acken}, title = {{CB-ALCA:} a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {637--662}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103108}, doi = {10.1504/IJICS.2019.103108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RevaneshSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sajedi19, author = {Hedieh Sajedi}, title = {An ensemble algorithm for discovery of malicious web pages}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {203--213}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099408}, doi = {10.1504/IJICS.2019.099408}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sajedi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaB19, author = {Kirti Sharma and Shobha Bhatt}, title = {{SQL} injection attacks - a systematic review}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {493--509}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101937}, doi = {10.1504/IJICS.2019.101937}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZ19, author = {Jaryn Shen and Qingkai Zeng}, title = {{CSPS:} catchy short passwords making offline and online attacks impossible}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {3}, pages = {255--274}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.099434}, doi = {10.1504/IJICS.2019.099434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VenkateswarluK19, author = {Isunuri Bala Venkateswarlu and Jagadeesh Kakarla}, title = {Password security by encryption using an extended {ADFGVX} cipher}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {510--523}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101938}, doi = {10.1504/IJICS.2019.101938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VenkateswarluK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangXWH19, author = {Haixing Wang and Guiping Xiao and Zhen Wei and Tao Hai}, title = {Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {160--177}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098204}, doi = {10.1504/IJICS.2019.098204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangXWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangY19, author = {Xiaolei Wang and Yuexiang Yang}, title = {PrivacyContext: identifying malicious mobile privacy leak using program context}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {562--584}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103054}, doi = {10.1504/IJICS.2019.103054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XuSLMWLY19, author = {He Xu and Weiwei Shen and Peng Li and Keith Mayes and Ruchuan Wang and Dashen Li and Shengxiang Yang}, title = {Novel implementation of defence strategy of relay attack based on cloud in {RFID} systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {120--144}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098199}, doi = {10.1504/IJICS.2019.098199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XuSLMWLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YagoubKB19, author = {Mohammed Amine Yagoub and Okba Kazar and Mounir Beggas}, title = {A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {413--430}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101931}, doi = {10.1504/IJICS.2019.101931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YagoubKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YangJW19, author = {Su Yang and Shen Junwei and Wang Wei}, title = {Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {145--159}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098201}, doi = {10.1504/IJICS.2019.098201}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YangJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YingyingH19, author = {Mao Yingying and Yuan Hao}, title = {Study on data fuzzy breakpoint detection in massive dynamic data flow}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {6}, pages = {604--620}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.103074}, doi = {10.1504/IJICS.2019.103074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YingyingH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/YoussefNR19, author = {Ben Charhi Youssef and Mannane Nada and Boubker Regragui}, title = {Behavioural analysis approach for {IDS} based on attack pattern and risk assessment in cloud computing}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {4/5}, pages = {315--331}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.101907}, doi = {10.1504/IJICS.2019.101907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/YoussefNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangLH19, author = {Xiao Zhang and Shengli Liu and Shuai Han}, title = {Proofs of retrievability from linearly homomorphic structure-preserving signatures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {11}, number = {2}, pages = {178--202}, year = {2019}, url = {https://doi.org/10.1504/IJICS.2019.098205}, doi = {10.1504/IJICS.2019.098205}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.