default search action
International Journal of Information and Computer Security, Volume 19
Volume 19, Numbers 1/2, 2022
- Mukti Padhya, Devesh C. Jinwala:
Revocable key aggregate searchable encryption with user privacy and anonymity. 1-33 - Venkata Vara Prasad, Polipalli Trinatha Rao:
Reinforcement learning-based cooperative sensing in cognitive radio networks for primary user detection. 34-47 - Hitendra Garg:
A comprehensive study of watermarking schemes for 3D polygon mesh objects. 48-72 - Rahul Kumar, Mridul Kumar Gupta, Saru Kumari:
Cryptanalysis and improvement of an authentication scheme for IoT. 73-87 - Gulab Sah, Subhasish Banerjee, Manash Pratim Dutta:
Ensemble learning algorithms with feature reduction mechanism for intrusion detection system. 88-117 - Xian Guo, Wei Bai:
ML-SDNIDS: an attack detection mechanism for SDN based on machine learning. 118-141 - Saba Malekpour Bejandi, Mohammad Reza Taghva, Payam Hanafizadeh:
Applying swarm intelligence and data mining approach in detecting online and digital theft. 142-167 - Mantripragada Yaswanth Bhanu Murthy, Thonduri Vineela, Godavarthi Amar Tej, Movva Vasantha Lakshmi:
Development of adaptive AdaBoost classifier with optimal feature selection for enhanced intrusion detection in IoT. 168-198 - Suhong Bi:
Multiple backup method of financial encrypted data on internet of things platform. 199-209 - Junjie Xiong, Biyi Lin:
You are safe when you tell the truth: a blockchain-based privacy-preserving evidence collection and distribution system for digital forensics. 210-236
Volume 19, Numbers 3/4, 2022
- Hongfeng Zhu, Zhiqin Du, Liwei Wang, Yuanle Zhang:
A N-party authenticated group key distribution protocol using quantum-reflection architecture. 237-253 - Junaid Akram, Danish Vasan, Ping Luo:
Obfuscated code is identifiable by a token-based code clone detection technique. 254-273 - Xingtong Zhu, Jianbin Xiong, Yeh-Cheng Chen, Yongda Cai:
Safety monitoring of machinery equipment and fault diagnosis method based on support vector machine and improved evidence theory. 274-287 - Junfeng Tian, Zilong Wang, Zhen Li:
Hierarchical data partition defence against co-resident attacks. 288-304 - Khedoudja Bouafia, Lamia Hamza:
Game theory approach for analysing attack graphs. 305-320 - Jincy J. Fernandez, Nithyanandam Pandian, Raghuvamsh Chavali, Ashwanth Kumar Appalaghe:
Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking. 321-345 - Bintu Kadhiwala, Sankita J. Patel:
Privacy-preserving collaborative social network data publishing against colluding data providers. 346-378 - Rangana De Silva, Iranga Navaratna, Malitha Kumarasiri, Chuah Chai Wen, Janaka Alawatugoda:
Correlation power analysis attack on software implementation of TRIVIUM stream cipher. 379-401 - Xichen Zhang, Mohammad Mehdi Yadollahi, Sajjad Dadkhah, Haruna Isah, Duc-Phong Le, Ali A. Ghorbani:
Data breach: analysis, countermeasures and challenges. 402-442 - Jessica Judith D'souza, R. Padmavathy, Abhinav Dayal, Harika Gnanaveni, Sreenu Ponnada:
Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain. 443-462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.