


default search action
International Journal of Information and Computer Security, Volume 9
Volume 9, Numbers 1/2, 2017
- Ahmad M. Manasrah:

Dynamic weighted VM load balancing for cloud-analyst. 5-19 - Aditi Zear, Amit Kumar Singh, Pardeep Kumar:

Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. 20-35 - Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari:

Trust delegation-based secure mobile cloud computing framework. 36-48 - Arif Khan:

Virtual machine security. 49-84 - Omar M. Al-Jarrah, Moath Al-Ayoub, Yaser Jararweh:

Hierarchical detection of insider attacks in cloud computing systems. 85-99 - Hisham M. Alsaghier:

A secure mobile commerce framework based on community cloud. 100-113 - Jothi Rangasamy, Lakshmi Kuppusamy, Gopi Krishnan, Velmurugan:

Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services. 114-129 - Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya:

Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way. 130-155
Volume 9, Number 3, 2017
- Lei Zeng, Hui Chen, Yang Xiao

:
Accountable administration in operating systems. 157-179 - Shruti Jaiswal, Daya Gupta:

Security engineering methods - in-depth analysis. 180-211 - Sofia-Anna Menesidou, Vasilios Katos:

Opportunistic key management in delay tolerant networks. 212-228 - Reza Montasari:

A standardised data acquisition process model for digital forensic investigations. 229-249 - Prathuri Jhansi Rani, S. Durga Bhavani

:
Keyed hash function using Bernoulli shift map. 250-270
Volume 9, Number 4, 2017
- Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia:

Data hiding using lifting scheme and genetic algorithm. 271-287 - Vasudha Arora, Shyam Sunder Tyagi:

Update enabled multi-keyword searchable encryption scheme for secure data outsourcing. 288-301 - Rima Djellab, Mohamed Benmohammed:

A novel quantum distributed key management protocol for ring-organised group. 302-323 - Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah:

A trust-based approach for securing data communication in delay tolerant networks. 324-336 - Abes Dabir, AbdelRahman Abdou, Ashraf Matrawy:

A survey on forensic event reconstruction systems. 337-360 - K. Anusha, E. Sathiyamoorthy:

MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network. 361-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














