


default search action
International Journal of Information and Computer Security, Volume 13
Volume 13, Number 1, 2020
- R. Vinothkanna, S. Sivakannan, N. Prabakaran:

A novel GAAC optimisation algorithm for multimodal fusion score decision making in secured biometric systems. 3-17 - A. Rajagopal, K. Karibasappa, K. S. Vasundara Patel:

Study of LDPC decoders with quadratic residue sequence for communication system. 18-31 - Usha Gopal, Kannimuthu Subramanian

, P. D. Mahendiran, Anusha Kadambari Shanker, Deepti Venugopal:
Static analysis method for detecting cross site scripting vulnerabilities. 32-47 - Handenahalli Channareddy Kantharaju, K. N. Narasimha Murthy

:
An energy efficient authentication scheme based on hierarchical IBDS and EIBDS in grid-based wireless sensor networks. 48-72 - Natasha Saini, Nitin Pandey

, Ajeet Pal Singh:
Developing malevolent node-based protection system against jamming attack in agent assisted CRN. 73-96 - Suleiman Salihu Jauro, Raghav Yadav:

An efficient interior and exterior boundary detection-based two level iris segmentation. 97-117 - Amal Hafsa, Anissa Sghaier, Medien Zeghid, Jihene Malek

, Mohsen Machhout
:
An improved co-designed AES-ECC cryptosystem for secure data transmission. 118-140
Volume 13, Number 2, 2020
- Lija Mohan, M. Sudheep Elayidom

:
Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data. 141-165 - Jian-Feng Zhao, Shu-Ying Wang, Li-Tao Zhang, Xian-Feng Li:

Image encryption scheme based on a novel fractional order compound chaotic attractor. 166-186 - Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim

:
Comparative evaluation of different classification techniques for masquerade attack detection. 187-209 - Ahmad Salah Al-Ahmad

, Syed Ahmad Aljunid, Normaly Kamal Ismail:
Mobile cloud computing applications penetration testing model design. 210-226 - Saeed Ullah Jan

, Fawad Qayum:
An authentication scheme for distributed computing environment. 227-248
Volume 13, Numbers 3/4, 2020
- Yoones A. Sekhavat:

CFM: collusion-free model of privacy preserving frequent itemset mining. 249-267 - Mohamed Elhoseny

, Hosny A. Abbas:
Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms. 268-288 - Guizhen Mai, Shuiguo Peng, Yinghan Hong, Pinghua Chen:

Fast causal division for supporting robust causal discovery. 289-308 - Mircho Mirchev, Seferin Mirtchev

:
System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis. 309-321 - Dharavath Ramesh, Rashmi Priya Sharma

, Damodar Reddy Edla:
HHDSSC: harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption. 322-336 - Alka Gupta, Lalit Sen Sharma

:
A categorical survey of state-of-the-art intrusion detection system-Snort. 337-356 - V. Biksham, D. Vasumathi:

A lightweight fully homomorphic encryption scheme for cloud security. 357-371 - Indu Singh, Nikhil Arora, Shivam Arora, Parteek Singhal:

Fuzzy ARM and cluster analysis for database intrusion detection and prevention. 372-395 - Sonika Shrivastava, Rajesh Kumar Pateriya:

Data encoding and cost optimised distribution for efficient and secure storage in cloud federation. 396-410 - Pranjal S. Bogawar, Kishor K. Bhoyar:

Comparative study of classification approaches for e-mail analysis. 411-427 - Lamia Hamza

:
Intruder model for generating attack scenarios in computer systems. 428-443

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














