


default search action
International Journal of Information and Computer Security, Volume 27
Volume 27, Number 1, 2025
- M. Ravi Prasad, N. Thillaiarasu:

Improved deep learning-based multiple biometric authentication system for ATM transaction solving cost and ambiguity problems of multiple card usage. 1-35 - R. Anitha, Dinesh Rai:

Blockchain-based dynamic social spider optimisation network optimisation for supply chain in IoT. 36-67 - Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, Samir A. Elsagheer Mohamed:

NAIBI: a neighbour-vehicle approach for anomaly detection of basic safety message falsification in internet of vehicles using machine learning. 68-92 - Prajit Paul, Bappadittya Roy, Anup Kumar Bhattacharjee:

SR-GBN-ARQ protocol using error correction code in fading network. 93-126 - Upendra Verma, Kapil Kumar Nagawanshi:

A secure and anonymous authentication and key agreement protocol based on ECC for edge computing environment. 127-158
Volume 27, Number 2, 2025
- Md. Zahirul Islam, Syed Md. Galib, Md. Humaun Kabir:

A comprehensive analysis of security overview for network slicing of 5G networks. 159-211 - M. Menaka, P. Sujatha:

Mean black widow-based optimisation feature selection and enhanced kernel-based SVM classifier for cyberbullying twitter data. 212-239 - Gazi Mohammad Ismail, Xueping Zhang, Junxiang Yang, Bin Li:

StealthGuard: a new framework of privacy-preserving human action recognition. 240-260 - Shankar M. Patil, Sonali N. Mhatre, Bhawana Dakhare, Gurunath T. Chavan:

Prevention of cyber attacks and real-time social media spam detection and sentiment analysis using recurrent self-adaptive windowing approach. 261-284 - Mengfan Wang, Guifang Huang, Dong Fang, Lei Hu:

Proving multiplicative relations for different lattice commitments. 285-305
Volume 27, Number 3, 2025
- Pramil Kesarwani, Ketan Puyad, Bharathi Chidirala, Bibhudendra Acharya:

A novel secure key generation and SPN-based transformation algorithm for greyscale image encryption. 307-332 - Suvarna Chaure, Vanita Mane:

A blockchain-aided privacy preservation using lattice homomorphic encryption for digital forensic investigation. 333-363 - Shiyu Wang, Haiying Gao, Yang Song, Aoyang Zhou, Xiufeng Zhao:

An IBE scheme based on hybrid sampler over NTRU lattice. 364-378 - Sangita Baruah, Vaskar Deka:

Performance comparison of feature selection algorithms in context of P2P botnet detection. 379-404 - Sudhir Kumar Pandey, Ditipriya Sinha:

A novel hybrid approach for intrusion detection system using deep learning technique. 405-422
Volume 27, Number 4, 2025
- Lu Zhang, Chaonan Wang, Yan Sun, Hongfeng Zhu:

A novel mutual quantum identity authentication of two-party protocol with chaotic systems. 423-436 - Rohidas Balu Sangore, Manoj Eknath Patil:

DDoS attack detection in blockchain network layer using dual attention based dense convolutional gated recurrent unit. 437-464 - Adesina S. Sodiya, Akinkunmi A. Owolabi, Saidat Adebukola Onashoga, Enoch O. Oluwumi:

A context-based password change enforcement model. 465-487 - Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri:

Unveiling the digital fingerprints: analysis of internet attacks based on website fingerprints. 488-514 - Ngaira Mandela

, Nilay R. Mistry:
Integrating geolocation intelligence with ensemble machine learning models for enhanced darknet traffic classification. 515-535

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














