


default search action
Journal of Information Security and Applications, Volume 64
Volume 64, February 2022
- Antonia M. Reina Quintero

, Salvador Martínez Perez
, Ángel Jesús Varela-Vaca
, María Teresa Gómez-López, Jordi Cabot
:
A domain-specific language for the specification of UCON policies. 103006 - Walid El Shafai, Ahmed K. Mesrega, Hossam Eldin H. Ahmed, Nirmeen A. El-Bahnasawy, Fathi E. Abd El-Samie:

An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks. 103039 - M. R. Gauthama Raman

, Aditya P. Mathur:
AICrit: A unified framework for real-time anomaly detection in water treatment plants. 103046 - Liqun Chen

, Siaw-Lynn Ng
:
Securing emergent behaviour in swarm robotics. 103047 - Per Håkon Meland

, Dag Atle Nesheim
, Karin Bernsmed
, Guttorm Sindre
:
Assessing cyber threats for storyless systems. 103050 - Sedat Akleylek

, Meryem Soysaldi
:
A new lattice-based authentication scheme for IoT. 103053 - Ahmed Bensaoud

, Jugal Kalita:
Deep multi-task learning for malware image classification. 103057 - Efstratios Chatzoglou

, Georgios Kambourakis, Constantinos Kolias:
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. 103058 - Long Chen, Jianguo Chen

, Chunhe Xia:
Social network behavior and public opinion manipulation. 103060 - Manli Yuan

, Yi Mu
, Fatemeh Rezaeibagha
, Li Xu
, Xinyi Huang
:
Controllable software licensing system for sub-licensing. 103061 - Sanjeev Kumar

, B. Janet:
DTMIC: Deep transfer learning for malware image classification. 103063 - Ahmad Y. Al-Dweik

, Iqtadar Hussain, Moutaz Saleh Mustafa
, M. T. Mustafa:
A novel method to generate key-dependent s-boxes with identical algebraic properties. 103065 - Xu Wang, Liyao Li, Ching-Chun Chang, Yongfeng Huang

:
Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher. 103067 - Phan The Duy

, Hien Do Hoang, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham
:
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain. 103080 - Ugur Coruh

, Oguz Bayat:
ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks. 103081 - Anju Devi, Geetanjali Rathee, Hemraj Saini

:
Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms. 103094

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














