


default search action
International Journal of Information and Computer Security, Volume 23
Volume 23, Number 1, 2024
- Junlin Gu, Yihan Xu, Juan Sun, Weiwei Liu:

Image tampering detection based on feature consistency attention. 1-15 - Tran Thi Luong, Linh Hoang Dinh:

On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. 16-39 - Aparna Bhonde, Satish R. Devane:

Priority-based security-aware virtual machine allocation policy. 40-56 - Laxmi Bhagwat

, Balaji Patil:
Behavioural analysis and results of malware and ransomware using optimal behavioural feature set. 57-78 - Thomas Nagunwa:

AI-driven approach for robust real-time detection of zero-day phishing websites. 79-118 
Volume 23, Number 2, 2024
- Devender Kumar, Satish Chand, Bijendra Kumar:

A secure three-factor authentication protocol for mobile networks. 119-138 - Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito

, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. 139-162 - Chenghua Tang, Mengmeng Yang, Qingze Gao, Baohua Qiang:

PBDG: a malicious code detection method based on precise behaviour dependency graph. 163-189 - Payal Sharma, B. R. Purushothama:

User driven general framework to cap the joins in secure group communication. 190-199 - Oussama Nahnah, Sarra Cherbal:

SLAK: secure lightweight scheme for authentication and key-agreement in internet of things. 200-226 
Volume 23, Number 3, 2024
- Rahul, Venkatesh, M. Karthik, K. R. Venugopal, Satish B. Basapur:

SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of things. 227-270 - Mandeep Kaur Sandhu

, Surender Singh, Manjit Kaur:
A new hybrid chaotic system and its analysis. 271-293 - Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:

Re-evaluation of PhishI game and its utilisation in eliciting security requirements. 294-321 - Mohammad Nasser Alenezi, Haneen Khalid Alabdulrazzaq

, Hajed M. Alhatlani, Faisal A. Alobaid:
On the performance of AES algorithm variants. 322-337 - C. Ravichandran, T. J. Nagalakshmi, P. Shyamala Bharathi, C. Sivakumaran:

Technique for detecting hardware-based Trojans using a convolutional neural network. 338-347 
Volume 23, Number 4, 2024
- Saâd Boukers, Abdelkader Belkhir:

A new architecture with a new protocol for m-payment. 349-374 - Sushant Chamoli, Varsha Mittal:

A taxonomy of DDoS attacks and its impact on Docker architecture. 375-395 - Rupesh Kumar Sinha, Sitanshu Sekhar Sahu:

Multi-level image security using modified Rubik's cube algorithm. 396-409 - Tran Thi Luong, Linh Hoang Dinh:

Generating key-dependent involutory MDS matrices through permutations, direct exponentiation, and scalar multiplication. 410-432 - Khadidja Bennaceur, Zakaria Sahraoui, Mohamed Ahmad Nacer:

Feature selection and deep learning approach for anomaly network intrusion detection. 433-453 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














