International Journal of Information and Computer Security, Volume 9
Volume 9, Numbers 1/2, 2017
- Aditi Zear, Amit Kumar Singh, Pardeep Kumar:
Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. 20-35 - Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari:
Trust delegation-based secure mobile cloud computing framework. 36-48 - Omar M. Al-Jarrah, Moath Al-Ayoub, Yaser Jararweh:
Hierarchical detection of insider attacks in cloud computing systems. 85-99 - Jothi Rangasamy, Lakshmi Kuppusamy, Gopi Krishnan, Velmurugan:
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services. 114-129 - Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya:
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. 130-155
Volume 9, Number 3, 2017
- Sofia-Anna Menesidou, Vasilios Katos:
Opportunistic key management in delay tolerant networks. 212-228 - Reza Montasari:
A standardised data acquisition process model for digital forensic investigations. 229-249
Volume 9, Number 4, 2017
- Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia:
Data hiding using lifting scheme and genetic algorithm. 271-287 - Vasudha Arora, S. S. Tyagi:
Update enabled multi-keyword searchable encryption scheme for secure data outsourcing. 288-301 - Rima Djellab, Mohamed Benmohammed:
A novel quantum distributed key management protocol for ring-organised group. 302-323 - Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah:
A trust-based approach for securing data communication in delay tolerant networks. 324-336 - Abes Dabir, AbdelRahman Abdou, Ashraf Matrawy:
A survey on forensic event reconstruction systems. 337-360 - K. Anusha, E. Sathiyamoorthy:
MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network. 361-386