Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics13.bht:"
@article{DBLP:journals/ijics/Al-AhmadAI20, author = {Ahmad Salah Al{-}Ahmad and Syed Ahmad Aljunid and Normaly Kamal Ismail}, title = {Mobile cloud computing applications penetration testing model design}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {210--226}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108849}, doi = {10.1504/IJICS.2020.108849}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Al-AhmadAI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BikshamV20, author = {V. Biksham and D. Vasumathi}, title = {A lightweight fully homomorphic encryption scheme for cloud security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {357--371}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109482}, doi = {10.1504/IJICS.2020.109482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BikshamV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BogawarB20, author = {Pranjal S. Bogawar and Kishor K. Bhoyar}, title = {Comparative study of classification approaches for e-mail analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {411--427}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109485}, doi = {10.1504/IJICS.2020.109485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BogawarB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElhosenyA20, author = {Mohamed Elhoseny and Hosny A. Abbas}, title = {Towards automated {SCADA} forensic investigation: challenges, opportunities and promising paradigms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {268--288}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109477}, doi = {10.1504/IJICS.2020.109477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ElhosenyA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ElmasryAZ20, author = {Wisam Elmasry and Akhan Akbulut and Abdul Halim Zaim}, title = {Comparative evaluation of different classification techniques for masquerade attack detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {187--209}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108848}, doi = {10.1504/IJICS.2020.108848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ElmasryAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaS20, author = {Alka Gupta and Lalit Sen Sharma}, title = {A categorical survey of state-of-the-art intrusion detection system-\emph{Snort}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {337--356}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109481}, doi = {10.1504/IJICS.2020.109481}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GuptaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HafsaSMMM20, author = {Amal Hafsa and Anissa Sghaier and Medien Zeghid and Jihene Malek and Mohsen Machhout}, title = {An improved co-designed {AES-ECC} cryptosystem for secure data transmission}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {118--140}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108145}, doi = {10.1504/IJICS.2020.108145}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HafsaSMMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Hamza20, author = {Lamia Hamza}, title = {Intruder model for generating attack scenarios in computer systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {428--443}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109486}, doi = {10.1504/IJICS.2020.109486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Hamza20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JanQ20, author = {Saeed Ullah Jan and Fawad Qayum}, title = {An authentication scheme for distributed computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {227--248}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108858}, doi = {10.1504/IJICS.2020.108858}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JanQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JauroY20, author = {Suleiman Salihu Jauro and Raghav Yadav}, title = {An efficient interior and exterior boundary detection-based two level iris segmentation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {97--117}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108129}, doi = {10.1504/IJICS.2020.108129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JauroY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KantharajuM20, author = {Handenahalli Channareddy Kantharaju and K. N. Narasimha Murthy}, title = {An energy efficient authentication scheme based on hierarchical {IBDS} and {EIBDS} in grid-based wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {48--72}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108127}, doi = {10.1504/IJICS.2020.108127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KantharajuM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MaiPHC20, author = {Guizhen Mai and Shuiguo Peng and Yinghan Hong and Pinghua Chen}, title = {Fast causal division for supporting robust causal discovery}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {289--308}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109478}, doi = {10.1504/IJICS.2020.109478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MaiPHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MirchevM20, author = {Mircho Mirchev and Seferin Mirtchev}, title = {System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {309--321}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109479}, doi = {10.1504/IJICS.2020.109479}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MirchevM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohanE20, author = {Lija Mohan and M. Sudheep Elayidom}, title = {Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {141--165}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108839}, doi = {10.1504/IJICS.2020.108839}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohanE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajagopalKP20, author = {A. Rajagopal and K. Karibasappa and K. S. Vasundara Patel}, title = {Study of {LDPC} decoders with quadratic residue sequence for communication system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {18--31}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108122}, doi = {10.1504/IJICS.2020.108122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajagopalKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RameshPE20, author = {Dharavath Ramesh and Rashmi Priya Sharma and Damodar Reddy Edla}, title = {{HHDSSC:} harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {322--336}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109480}, doi = {10.1504/IJICS.2020.109480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RameshPE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SainiPS20, author = {Natasha Saini and Nitin Pandey and Ajeet Pal Singh}, title = {Developing malevolent node-based protection system against jamming attack in agent assisted {CRN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {73--96}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108128}, doi = {10.1504/IJICS.2020.108128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SainiPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sekhavat20, author = {Yoones A. Sekhavat}, title = {{CFM:} collusion-free model of privacy preserving frequent itemset mining}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {249--267}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109476}, doi = {10.1504/IJICS.2020.109476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sekhavat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShrivastavaP20, author = {Sonika Shrivastava and Rajesh Kumar Pateriya}, title = {Data encoding and cost optimised distribution for efficient and secure storage in cloud federation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {396--410}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109484}, doi = {10.1504/IJICS.2020.109484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShrivastavaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghAAS20, author = {Indu Singh and Nikhil Arora and Shivam Arora and Parteek Singhal}, title = {Fuzzy {ARM} and cluster analysis for database intrusion detection and prevention}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {3/4}, pages = {372--395}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.109483}, doi = {10.1504/IJICS.2020.109483}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghAAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/UshaKMSV20, author = {Usha Gopal and Kannimuthu Subramanian and P. D. Mahendiran and Anusha Kadambari Shanker and Deepti Venugopal}, title = {Static analysis method for detecting cross site scripting vulnerabilities}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {32--47}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108123}, doi = {10.1504/IJICS.2020.108123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/UshaKMSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VinothkannaSP20, author = {R. Vinothkanna and S. Sivakannan and N. Prabakaran}, title = {A novel {GAAC} optimisation algorithm for multimodal fusion score decision making in secured biometric systems}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {1}, pages = {3--17}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108113}, doi = {10.1504/IJICS.2020.108113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VinothkannaSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhaoWZL20, author = {Jian{-}Feng Zhao and Shu{-}Ying Wang and Li{-}Tao Zhang and Xian{-}Feng Li}, title = {Image encryption scheme based on a novel fractional order compound chaotic attractor}, journal = {Int. J. Inf. Comput. Secur.}, volume = {13}, number = {2}, pages = {166--186}, year = {2020}, url = {https://doi.org/10.1504/IJICS.2020.108847}, doi = {10.1504/IJICS.2020.108847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhaoWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.