default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics18.bht:"
@article{DBLP:journals/ijics/Amraoui22, author = {Asma Amraoui}, title = {On a secured channel selection in cognitive radio networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {262--277}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050307}, doi = {10.1504/IJICS.2022.10050307}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Amraoui22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BadhaniM22, author = {Shikha Badhani and Sunil Kumar Muttoo}, title = {GENDroid - a graph-based ensemble classifier for detecting Android malware}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {327--347}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10046938}, doi = {10.1504/IJICS.2022.10046938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BadhaniM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BhandeB22, author = {Premala Bhande and Mohammed Bakhar}, title = {Enhanced ant colony-based {AODV} for analysis of black and gray hole attacks in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {133--147}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122916}, doi = {10.1504/IJICS.2022.122916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BhandeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ByamukamaN22, author = {Duncan{-}Allan Byamukama and John Ngubiri}, title = {DDoS amplification attacks and impacts on enterprise service-oriented network infrastructures: {DNS} servers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {105--132}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122915}, doi = {10.1504/IJICS.2022.122915}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ByamukamaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChanderG22, author = {Bhanu Chander and Kumaravelan Gopalakrishnan}, title = {{RFID} tag-based mutual authentication protocol with improved security for {TMIS}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {383--405}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10042827}, doi = {10.1504/IJICS.2022.10042827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChanderG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DammakGSG22, author = {Salma Dammak and Faiza Ghozzi and Asma Sellami and Fa{\"{\i}}ez Gargouri}, title = {Managing vulnerabilities during the development of a secure {ETL} processes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {75--104}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122914}, doi = {10.1504/IJICS.2022.122914}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DammakGSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GaoZZW22, author = {Jianqing Gao and Haiyang Zou and Fuquan Zhang and Tsu{-}Yang Wu}, title = {An intelligent stage light-based actor identification and positioning system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {204--218}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122920}, doi = {10.1504/IJICS.2022.122920}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GaoZZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeCC22, author = {Gang Ke and Ruey{-}Shun Chen and Yeh{-}Cheng Chen}, title = {Research on intrusion detection method based on {SMOTE} and {DBN-LSSVM}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {300--312}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050309}, doi = {10.1504/IJICS.2022.10050309}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KeCJY22, author = {Gang Ke and Ruey{-}Shun Chen and Shanshan Ji and Jyh{-}haw Yeh}, title = {Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122910}, doi = {10.1504/IJICS.2022.122910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KeCJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KisoreK22, author = {N. Raghu Kisore and K. Shiva Kumar}, title = {{FFRR:} a software diversity technique for defending against buffer overflow attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {40--74}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122913}, doi = {10.1504/IJICS.2022.122913}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KisoreK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MistryGJ22, author = {Nilay R. Mistry and Krupa Gajjar and S. O. Junare}, title = {Volatile memory forensics of privacy aware browsers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {313--326}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2020.10047607}, doi = {10.1504/IJICS.2020.10047607}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MistryGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NabouLO22, author = {Abdellah Nabou and My Driss Laanaoui and Mohammed Ouzzif}, title = {Effect of black hole attack in different mobility models of {MANET} using {OLSR} protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {219--235}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122921}, doi = {10.1504/IJICS.2022.122921}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/NabouLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatilP22, author = {Shravani Mahesh Patil and B. R. Purushothama}, title = {{QC-PRE:} quorum controlled proxy re-encryption scheme for access control enforcement delegation of outsourced data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {165--192}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122918}, doi = {10.1504/IJICS.2022.122918}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatilP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaniV22, author = {S. Jamuna Rani and S. Vagdevi}, title = {Auto-encoder-based technique for effective detection of frauds in social networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {348--364}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10045346}, doi = {10.1504/IJICS.2022.10045346}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaniV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ReddyBG22, author = {Punugu Vasudeva Reddy and A. Ramesh Babu and N. B. Gayathri}, title = {Pairing-based strong key-insulated signature scheme}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {148--164}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122917}, doi = {10.1504/IJICS.2022.122917}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/ReddyBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RenWZ22, author = {Min Ren and Zhihao Wang and Peiying Zhao}, title = {A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {278--299}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050308}, doi = {10.1504/IJICS.2022.10050308}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RenWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShanmugamR22, author = {Dillibabu Shanmugam and Jothi Rangasamy}, title = {Robust message authentication in the context of quantum key distribution}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {365--382}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10044643}, doi = {10.1504/IJICS.2022.10044643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShanmugamR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShenZ22, author = {Jaryn Shen and Qingkai Zeng}, title = {The count-min sketch is vulnerable to offline password-guessing attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {27--39}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122912}, doi = {10.1504/IJICS.2022.122912}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShenZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThiteN22, author = {Sandip Thite and J. NaveenKumar}, title = {SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {406--424}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10042826}, doi = {10.1504/IJICS.2022.10042826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThiteN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TiCW22, author = {Yen{-}Wu Ti and Shang{-}Kuan Chen and Wen{-}Cheng Wang}, title = {A hierarchical particle swarm optimisation algorithm for cloud computing environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {12--26}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122911}, doi = {10.1504/IJICS.2022.122911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TiCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TingGL22, author = {Grace C.{-}W. Ting and Bok{-}Min Goi and Sze Wei Lee}, title = {Robustness attack on copyright protection scheme for {H.264/AVC} and {SVC}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {1/2}, pages = {193--203}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.122919}, doi = {10.1504/IJICS.2022.122919}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TingGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangYWJ22, author = {Mingyue Wang and Shen Yan and Wei Wang and Jiwu Jing}, title = {Secure zero-effort two-factor authentication based on time-frequency audio analysis}, journal = {Int. J. Inf. Comput. Secur.}, volume = {18}, number = {3/4}, pages = {237--261}, year = {2022}, url = {https://doi.org/10.1504/IJICS.2022.10050306}, doi = {10.1504/IJICS.2022.10050306}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.