Search dblp for Publications

export results for "toc:db/journals/ijics/ijics13.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Al-AhmadAI20,
  author       = {Ahmad Salah Al{-}Ahmad and
                  Syed Ahmad Aljunid and
                  Normaly Kamal Ismail},
  title        = {Mobile cloud computing applications penetration testing model design},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {210--226},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108849},
  doi          = {10.1504/IJICS.2020.108849},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-AhmadAI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BikshamV20,
  author       = {V. Biksham and
                  D. Vasumathi},
  title        = {A lightweight fully homomorphic encryption scheme for cloud security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {357--371},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109482},
  doi          = {10.1504/IJICS.2020.109482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BikshamV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BogawarB20,
  author       = {Pranjal S. Bogawar and
                  Kishor K. Bhoyar},
  title        = {Comparative study of classification approaches for e-mail analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {411--427},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109485},
  doi          = {10.1504/IJICS.2020.109485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BogawarB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElhosenyA20,
  author       = {Mohamed Elhoseny and
                  Hosny A. Abbas},
  title        = {Towards automated {SCADA} forensic investigation: challenges, opportunities
                  and promising paradigms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {268--288},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109477},
  doi          = {10.1504/IJICS.2020.109477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ElhosenyA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ElmasryAZ20,
  author       = {Wisam Elmasry and
                  Akhan Akbulut and
                  Abdul Halim Zaim},
  title        = {Comparative evaluation of different classification techniques for
                  masquerade attack detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {187--209},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108848},
  doi          = {10.1504/IJICS.2020.108848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ElmasryAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaS20,
  author       = {Alka Gupta and
                  Lalit Sen Sharma},
  title        = {A categorical survey of state-of-the-art intrusion detection system-\emph{Snort}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {337--356},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109481},
  doi          = {10.1504/IJICS.2020.109481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HafsaSMMM20,
  author       = {Amal Hafsa and
                  Anissa Sghaier and
                  Medien Zeghid and
                  Jihene Malek and
                  Mohsen Machhout},
  title        = {An improved co-designed {AES-ECC} cryptosystem for secure data transmission},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {118--140},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108145},
  doi          = {10.1504/IJICS.2020.108145},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HafsaSMMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Hamza20,
  author       = {Lamia Hamza},
  title        = {Intruder model for generating attack scenarios in computer systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {428--443},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109486},
  doi          = {10.1504/IJICS.2020.109486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Hamza20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JanQ20,
  author       = {Saeed Ullah Jan and
                  Fawad Qayum},
  title        = {An authentication scheme for distributed computing environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {227--248},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108858},
  doi          = {10.1504/IJICS.2020.108858},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JanQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JauroY20,
  author       = {Suleiman Salihu Jauro and
                  Raghav Yadav},
  title        = {An efficient interior and exterior boundary detection-based two level
                  iris segmentation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {97--117},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108129},
  doi          = {10.1504/IJICS.2020.108129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JauroY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KantharajuM20,
  author       = {Handenahalli Channareddy Kantharaju and
                  K. N. Narasimha Murthy},
  title        = {An energy efficient authentication scheme based on hierarchical {IBDS}
                  and {EIBDS} in grid-based wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {48--72},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108127},
  doi          = {10.1504/IJICS.2020.108127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KantharajuM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MaiPHC20,
  author       = {Guizhen Mai and
                  Shuiguo Peng and
                  Yinghan Hong and
                  Pinghua Chen},
  title        = {Fast causal division for supporting robust causal discovery},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {289--308},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109478},
  doi          = {10.1504/IJICS.2020.109478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MaiPHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MirchevM20,
  author       = {Mircho Mirchev and
                  Seferin Mirtchev},
  title        = {System for DDoS attack mitigation by discovering the attack vectors
                  through statistical traffic analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {309--321},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109479},
  doi          = {10.1504/IJICS.2020.109479},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MirchevM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MohanE20,
  author       = {Lija Mohan and
                  M. Sudheep Elayidom},
  title        = {Secure and privacy-preserving multi-keyword ranked information retrieval
                  from encrypted big data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {141--165},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108839},
  doi          = {10.1504/IJICS.2020.108839},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MohanE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajagopalKP20,
  author       = {A. Rajagopal and
                  K. Karibasappa and
                  K. S. Vasundara Patel},
  title        = {Study of {LDPC} decoders with quadratic residue sequence for communication
                  system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {18--31},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108122},
  doi          = {10.1504/IJICS.2020.108122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajagopalKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RameshPE20,
  author       = {Dharavath Ramesh and
                  Rashmi Priya Sharma and
                  Damodar Reddy Edla},
  title        = {{HHDSSC:} harnessing healthcare data security in cloud using ciphertext
                  policy attribute-based encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {322--336},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109480},
  doi          = {10.1504/IJICS.2020.109480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RameshPE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SainiPS20,
  author       = {Natasha Saini and
                  Nitin Pandey and
                  Ajeet Pal Singh},
  title        = {Developing malevolent node-based protection system against jamming
                  attack in agent assisted {CRN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {73--96},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108128},
  doi          = {10.1504/IJICS.2020.108128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SainiPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sekhavat20,
  author       = {Yoones A. Sekhavat},
  title        = {{CFM:} collusion-free model of privacy preserving frequent itemset
                  mining},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {249--267},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109476},
  doi          = {10.1504/IJICS.2020.109476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sekhavat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShrivastavaP20,
  author       = {Sonika Shrivastava and
                  Rajesh Kumar Pateriya},
  title        = {Data encoding and cost optimised distribution for efficient and secure
                  storage in cloud federation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {396--410},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109484},
  doi          = {10.1504/IJICS.2020.109484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShrivastavaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghAAS20,
  author       = {Indu Singh and
                  Nikhil Arora and
                  Shivam Arora and
                  Parteek Singhal},
  title        = {Fuzzy {ARM} and cluster analysis for database intrusion detection
                  and prevention},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {3/4},
  pages        = {372--395},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.109483},
  doi          = {10.1504/IJICS.2020.109483},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghAAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/UshaKMSV20,
  author       = {Usha Gopal and
                  Kannimuthu Subramanian and
                  P. D. Mahendiran and
                  Anusha Kadambari Shanker and
                  Deepti Venugopal},
  title        = {Static analysis method for detecting cross site scripting vulnerabilities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {32--47},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108123},
  doi          = {10.1504/IJICS.2020.108123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/UshaKMSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VinothkannaSP20,
  author       = {R. Vinothkanna and
                  S. Sivakannan and
                  N. Prabakaran},
  title        = {A novel {GAAC} optimisation algorithm for multimodal fusion score
                  decision making in secured biometric systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {3--17},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108113},
  doi          = {10.1504/IJICS.2020.108113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VinothkannaSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhaoWZL20,
  author       = {Jian{-}Feng Zhao and
                  Shu{-}Ying Wang and
                  Li{-}Tao Zhang and
                  Xian{-}Feng Li},
  title        = {Image encryption scheme based on a novel fractional order compound
                  chaotic attractor},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {166--186},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJICS.2020.108847},
  doi          = {10.1504/IJICS.2020.108847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhaoWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics