


default search action
International Journal of Information and Computer Security, Volume 2
Volume 2, Number 1, 2008
- Rupa Parameswaran, Douglas M. Blough:

Privacy preserving data obfuscation for inherently clustered data. 4-26 - Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay:

A fuzzy programming approach for data reduction and privacy in distance-based mining. 27-47 - Jie Wang, Jun Zhang, Shuting Xu, Weijun Zhong:

A novel data distortion approach via selective SSVD for privacy protection. 48-70 - Mohammad Saad Al-Ahmadi, Peter A. Rosen, Rick L. Wilson:

Data mining performance on perturbed databases: important influences on classification accuracy. 71-85 - Daniel Ting, Stephen E. Fienberg, Mario Trottini

:
Random orthogonal matrix masking methodology for microdata release. 86-105
Volume 2, Number 2, 2008
- Wei Lu

, Issa Traoré:
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm. 107-139 - Lyes Khelladi, Yacine Challal

, Abdelmadjid Bouabdallah, Nadjib Badache:
On security issues in embedded systems: challenges and solutions. 140-174 - Daniel O. Rice, Robert S. Garfinkel, Ram D. Gopal:

CVC-STAR: Protecting data confidentiality while increasing flexibility and quality of responses. 175-196 - Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural

:
Attack recovery from malicious transactions in distributed database systems. 197-217 - Chien-Chuan Lin, Ming-Shi Wang:

Genetic-clustering algorithm for intrusion detection system. 218-234
Volume 2, Number 3, 2008
- Pallapa Venkataram, Jeremy Pitt, B. Sathish Babu

, Ebrahim Mamdani:
An intelligent proactive security system for cyber centres using Cognitive Agents. 235-249 - Turki F. Al-Somani:

Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks. 250-267 - Amitabh Saxena, Ben Soh:

One-Way Signature Chaining: a new paradigm for group cryptosystems. 268-296 - Huaqiang Wei, Jim Alves-Foss, Terence Soule, Hugh Pforsich, Du Zhang, Deborah A. Frincke:

A Layered Decision Model for cost-effective system security. 297-324
Volume 2, Number 4, 2008
- Ioannis Mavridis, Andreas K. Mattas, Ioannis Pagkalos, Isabella Kotini

, Christos Ilioudis
:
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time. 328-352 - Murat Kantarcioglu, Onur Kardes

:
Privacy-preserving data mining in the malicious model. 353-375 - Aameek Singh, Ling Liu, Mustaque Ahamad:

Privacy analysis and enhancements for data sharing in *nix systems. 376-410 - Yanjun Zuo:

Prompt damage identification for system survivability. 411-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














