


default search action
International Journal of Information and Computer Security, Volume 16
Volume 16, Numbers 1/2, 2021
- Lakshmi H. R.

, Surekha Borra:
Digital video watermarking tools: an overview. 1-19 - Akram Boukhamla, Javier Coronel Gaviro:

CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed. 20-32 - Urvashi Garg

, Geeta Sikka, Lalit Kumar Awasthi
:
Empirical risk assessment of attack graphs using time to compromise framework. 33-50 - Izzat Alsmadi, Ahmed Aleroud, Ahmad A. Saifan:

Fault-based testing for discovering SQL injection vulnerabilities in web applications. 51-62 - Xueping Liang, Sachin Shetty, Deepak K. Tosh

, Peter Foytik, Lingchen Zhang:
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers. 63-83 - Yuchen Cao, Yongbin Zhou, Hailong Zhang:

Multi-channel time-frequency fusion attacks. 84-102 - Geng Wang:

Time-based key management in attribute-based encryption using piecewise key generation. 103-119 - Chetna Singhal, A. Rajesh

:
Heuristic trust-based neighbour centric routing for CPS-enabled wireless sensor and ad hoc network. 120-136 - Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, Shade O. Kuyoro:

Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study. 137-149 - Zhanwei Cui, Jianping Zeng, Chengrong Wu:

A layer-crossing multi-factor and dynamic security model over a moving target defence. 150-169 - Xiao Luo, Chengchao Yao, Nur Zincir-Heywood:

Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. 170-191 - Adarsh Anand, Navneet Bhatt

, Omar Hussain Alhazmi:
Vulnerability discovery modelling: a general framework. 192-206
Volume 16, Numbers 3/4, 2021
- Syed Amma Sheik

, M. Amutha Prabakar:
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card. 207-225 - Rahul Saha

, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim:
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks. 226-238 - P. Saravanan, Shanthi Rekha Shanmugham:

Time-shared AES-128 implementation with extremely low-cost for smart card applications. 239-254 - Xiaoqian Liu, Qianmu Li, Tao Li, Ming Wu:

Privacy preserving techniques for decision trees. 255-271 - Geeta Sharma, Sheetal Kalra

:
A robust multi-factor remote user authentication scheme for cloud-IoT services. 272-291 - Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:

Enhanced bitcoin with two-factor authentication. 292-306 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin:

Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE. 307-323 - Gaurav Pareek, B. R. Purushothama:

Blockchain-based decentralised access control scheme for dynamic hierarchies. 324-354 - Zyad Elkhadir, Mohammed Benattou

:
A truncated mean ℓp-LDA approach for intrusion detection system. 355-374 - Zhengjun Cao, Xiqi Wang, Lihua Liu:

One privacy-preserving multi-keyword ranked search scheme revisited. 375-384 - Suliman A. Alsuhibany, Fatimah N. Almohaimeed, Naseem A. Alrobah:

Synthetic Arabic handwritten CAPTCHA. 385-398 - Chien-Ming Wang, Chih-Hung Wang:

A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model. 399-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














