default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics10.bht:"
@article{DBLP:journals/ijics/AmitaKK18, author = {Amita and Amandeep Kaur and Marut Kumar}, title = {Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {261--275}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012572}, doi = {10.1504/IJICS.2018.10012572}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmitaKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AzeemCDRR18, author = {Muhammad Azeem and Yongquan Cai and Allah Ditta and Khurram Gulzar Rana and Faheem Akhtar Rajpoot}, title = {Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {437--453}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095357}, doi = {10.1504/IJICS.2018.095357}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AzeemCDRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW18, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang}, title = {An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid {RSA} for the future internet architectures}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {63--79}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10005506}, doi = {10.1504/IJICS.2018.10005506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhattacharjyaZW18a, author = {Aniruddha Bhattacharjya and Xiaofeng Zhong and Jing Wang and Xing Li}, title = {Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {418--436}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095341}, doi = {10.1504/IJICS.2018.095341}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GoreDPE18, author = {Ross Gore and Saikou Y. Diallo and Jose J. Padilla and Barry Ezell}, title = {Assessing cyber-incidents using machine learning}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {341--360}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095298}, doi = {10.1504/IJICS.2018.095298}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GoreDPE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GuptaG18, author = {Shashank Gupta and Brij Bhooshan Gupta}, title = {Robust injection point-based framework for modern applications against {XSS} vulnerabilities in online social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {170--200}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012568}, doi = {10.1504/IJICS.2018.10012568}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/GuptaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/HotaSS18, author = {H. S. Hota and Dinesh K. Sharma and Akhilesh Kumar Shrivas}, title = {Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {80--101}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010649}, doi = {10.1504/IJICS.2018.10010649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/HotaSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JainG18, author = {Ankit Kumar Jain and Brij B. Gupta}, title = {Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {398--417}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095303}, doi = {10.1504/IJICS.2018.095303}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JainG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KarNK18, author = {Dulal C. Kar and Anusha Madhuri Nakka and Ajay K. Katangur}, title = {A new statistical attack resilient steganography scheme for hiding messages in audio files}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {276--302}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012578}, doi = {10.1504/IJICS.2018.10012578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KarNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarSB18, author = {C. Pavan Kumar and R. Selvakumar and Raghunadh K. Bhattar}, title = {Reliable and secure communication using fundamental cut-sets and fundamental circuits}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {41--62}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010648}, doi = {10.1504/IJICS.2018.10010648}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiS18, author = {Shaojing Li and Wanli Su}, title = {The research of reputation incentive mechanism of {P2P} network file sharing system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {149--169}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012570}, doi = {10.1504/IJICS.2018.10012570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MohindruS18, author = {Vandana Mohindru and Yashwant Singh}, title = {Node authentication algorithm for securing static wireless sensor networks from node clone attack}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {129--148}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012571}, doi = {10.1504/IJICS.2018.10012571}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MohindruS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoonR18, author = {Sunil K. Moon and Rajeshree D. Raut}, title = {Innovative data security model using forensic audio video steganography for improving hidden data security and robustness}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {374--397}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095300}, doi = {10.1504/IJICS.2018.095300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoonR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoumniFT18, author = {Soufiane El Moumni and Mohamed Fettach and Abderrahim Tragha}, title = {High frequency implementation of cryptographic hash function Keccak-512 on {FPGA} devices}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {361--373}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095299}, doi = {10.1504/IJICS.2018.095299}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoumniFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PalR18, author = {Arup Kumar Pal and Soumitra Roy}, title = {A robust and blind image watermarking scheme in {DCT} domain}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {4}, pages = {321--340}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.095296}, doi = {10.1504/IJICS.2018.095296}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PathakRC18, author = {Sanchita Pathak and Ratnakirti Roy and Suvamoy Changder}, title = {Performance analysis of image steganalysis techniques and future research directives}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {1--24}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010646}, doi = {10.1504/IJICS.2018.10010646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PathakRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaSPT18, author = {Rohit Raja and Tilendra Shishir Sinha and Raj Kumar Patra and Shrikant Tiwari}, title = {Physiological trait-based biometrical authentication of human-face using {LGXP} and {ANN} techniques}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {303--320}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012575}, doi = {10.1504/IJICS.2018.10012575}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaSPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajendranD18, author = {Sujarani Rajendran and Manivannan Doraipandian}, title = {A nonlinear two dimensional logistic-tent map for secure image communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {201--215}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012577}, doi = {10.1504/IJICS.2018.10012577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajendranD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RoyP18, author = {Soumitra Roy and Arup Kumar Pal}, title = {A robust reversible image watermarking scheme in {DCT} domain using Arnold scrambling and histogram modification}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {216--236}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012576}, doi = {10.1504/IJICS.2018.10012576}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RoyP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShafiqYL18, author = {Muhammad Shafiq and Xiangzhan Yu and Asif Ali Laghari}, title = {WeChat traffic classification using machine learning algorithms and comparative analysis of datasets}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {109--128}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012574}, doi = {10.1504/IJICS.2018.10012574}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShafiqYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SongZ18, author = {Lihua Song and Xiaofeng Zhang}, title = {Improved pixel relevance based on Mahalanobis distance for image segmentation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {237--247}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012573}, doi = {10.1504/IJICS.2018.10012573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SongZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SumanaH18, author = {M. Sumana and K. S. Hareesha}, title = {Modelling a secure support vector machine classifier for private data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {1}, pages = {25--40}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10010647}, doi = {10.1504/IJICS.2018.10010647}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SumanaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SunZJ18, author = {Yujuan Sun and Xiaofeng Zhang and Muwei Jian}, title = {3D reconstruction of human face from an input image under random lighting condition}, journal = {Int. J. Inf. Comput. Secur.}, volume = {10}, number = {2/3}, pages = {248--260}, year = {2018}, url = {https://doi.org/10.1504/IJICS.2018.10012569}, doi = {10.1504/IJICS.2018.10012569}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SunZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.