


default search action
International Journal of Information and Computer Security, Volume 16
Volume 16, Numbers 1/2, 2021
- Lakshmi H. R.
, Surekha Borra:
Digital video watermarking tools: an overview. 1-19 - Akram Boukhamla, Javier Coronel Gaviro:
CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed. 20-32 - Urvashi Garg
, Geeta Sikka, Lalit Kumar Awasthi
:
Empirical risk assessment of attack graphs using time to compromise framework. 33-50 - Izzat Alsmadi, Ahmed Aleroud, Ahmad A. Saifan:
Fault-based testing for discovering SQL injection vulnerabilities in web applications. 51-62 - Xueping Liang, Sachin Shetty, Deepak K. Tosh
, Peter Foytik, Lingchen Zhang:
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers. 63-83 - Yuchen Cao, Yongbin Zhou, Hailong Zhang:
Multi-channel time-frequency fusion attacks. 84-102 - Geng Wang:
Time-based key management in attribute-based encryption using piecewise key generation. 103-119 - Chetna Singhal, A. Rajesh:
Heuristic trust-based neighbour centric routing for CPS-enabled wireless sensor and ad hoc network. 120-136 - Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, Shade O. Kuyoro:
Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study. 137-149 - Zhanwei Cui, Jianping Zeng, Chengrong Wu:
A layer-crossing multi-factor and dynamic security model over a moving target defence. 150-169 - Xiao Luo, Chengchao Yao, Nur Zincir-Heywood:
Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. 170-191 - Adarsh Anand, Navneet Bhatt
, Omar Hussain Alhazmi:
Vulnerability discovery modelling: a general framework. 192-206
Volume 16, Numbers 3/4, 2021
- Syed Amma Sheik, M. Amutha Prabakar:
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card. 207-225 - Rahul Saha
, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim:
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks. 226-238 - P. Saravanan, Shanthi Rekha Shanmugham:
Time-shared AES-128 implementation with extremely low-cost for smart card applications. 239-254 - Xiaoqian Liu, Qianmu Li, Tao Li, Ming Wu:
Privacy preserving techniques for decision trees. 255-271 - Geeta Sharma, Sheetal Kalra
:
A robust multi-factor remote user authentication scheme for cloud-IoT services. 272-291 - Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:
Enhanced bitcoin with two-factor authentication. 292-306 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin:
Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE. 307-323 - Gaurav Pareek, B. R. Purushothama:
Blockchain-based decentralised access control scheme for dynamic hierarchies. 324-354 - Zyad Elkhadir, Mohammed Benattou
:
A truncated mean ℓp-LDA approach for intrusion detection system. 355-374 - Zhengjun Cao, Xiqi Wang, Lihua Liu:
One privacy-preserving multi-keyword ranked search scheme revisited. 375-384 - Suliman A. Alsuhibany, Fatimah N. Almohaimeed, Naseem A. Alrobah:
Synthetic Arabic handwritten CAPTCHA. 385-398 - Chien-Ming Wang, Chih-Hung Wang:
A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model. 399-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.