


default search action
International Journal of Information and Computer Security, Volume 19
Volume 19, Numbers 1/2, 2022
- Mukti Padhya, Devesh C. Jinwala:

Revocable key aggregate searchable encryption with user privacy and anonymity. 1-33 - Venkata Vara Prasad, Polipalli Trinatha Rao:

Reinforcement learning-based cooperative sensing in cognitive radio networks for primary user detection. 34-47 - Hitendra Garg:

A comprehensive study of watermarking schemes for 3D polygon mesh objects. 48-72 - Rahul Kumar, Mridul Kumar Gupta, Saru Kumari:

Cryptanalysis and improvement of an authentication scheme for IoT. 73-87 - Gulab Sah

, Subhasish Banerjee, Manash Pratim Dutta:
Ensemble learning algorithms with feature reduction mechanism for intrusion detection system. 88-117 - Xian Guo, Wei Bai:

ML-SDNIDS: an attack detection mechanism for SDN based on machine learning. 118-141 - Saba Malekpour Bejandi, Mohammad Reza Taghva, Payam Hanafizadeh:

Applying swarm intelligence and data mining approach in detecting online and digital theft. 142-167 - Mantripragada Yaswanth Bhanu Murthy

, Thonduri Vineela, Godavarthi Amar Tej, Movva Vasantha Lakshmi:
Development of adaptive AdaBoost classifier with optimal feature selection for enhanced intrusion detection in IoT. 168-198 - Suhong Bi:

Multiple backup method of financial encrypted data on internet of things platform. 199-209 - Junjie Xiong, Biyi Lin:

You are safe when you tell the truth: a blockchain-based privacy-preserving evidence collection and distribution system for digital forensics. 210-236
Volume 19, Numbers 3/4, 2022
- Hongfeng Zhu, Zhiqin Du, Liwei Wang, Yuanle Zhang:

A N-party authenticated group key distribution protocol using quantum-reflection architecture. 237-253 - Junaid Akram, Danish Vasan, Ping Luo:

Obfuscated code is identifiable by a token-based code clone detection technique. 254-273 - Xingtong Zhu, Jianbin Xiong, Yeh-Cheng Chen, Yongda Cai:

Safety monitoring of machinery equipment and fault diagnosis method based on support vector machine and improved evidence theory. 274-287 - Junfeng Tian, Zilong Wang, Zhen Li:

Hierarchical data partition defence against co-resident attacks. 288-304 - Khedoudja Bouafia, Lamia Hamza:

Game theory approach for analysing attack graphs. 305-320 - Jincy J. Fernandez, Nithyanandam Pandian, Raghuvamsh Chavali, Ashwanth Kumar Appalaghe:

Augmenting the detection of online image theft using diagonal transformation and iris biometric watermarking. 321-345 - Bintu Kadhiwala, Sankita J. Patel:

Privacy-preserving collaborative social network data publishing against colluding data providers. 346-378 - Rangana De Silva, Iranga Navaratna, Malitha Kumarasiri, Chuah Chai Wen

, Janaka Alawatugoda:
Correlation power analysis attack on software implementation of TRIVIUM stream cipher. 379-401 - Xichen Zhang, Mohammad Mehdi Yadollahi, Sajjad Dadkhah, Haruna Isah, Duc-Phong Le, Ali A. Ghorbani:

Data breach: analysis, countermeasures and challenges. 402-442 - Jessica Judith D'souza, R. Padmavathy, Abhinav Dayal, Harika Gnanaveni, Sreenu Ponnada:

Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain. 443-462

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














