Facet browsing currently unavailable
Page 5 of 934 results
Sort by: relevance publication year
A secure architecture for TCP/UDP-based cloud communications JOURNAL ARTICLE published April 2021 in International Journal of Information Security Research funded by Natural Sciences and Engineering Research Council of Canada (RGPIN-2019-04651) | Canada Research Chairs (231318) |
Cyber–physical risk assessment for false data injection attacks considering moving target defences JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by ESRC (S/T000112/1) | Engineering and Physical Sciences Research Council (EP/L015471/1) | Italian Ministry for Research (2017YKXYXJ) |
Efficient attribute-based signature and signcryption realizing expressive access structures JOURNAL ARTICLE published February 2016 in International Journal of Information Security |
BitCracker: BitLocker meets GPUs JOURNAL ARTICLE published October 2022 in International Journal of Information Security |
Obfuscated integration of software protections JOURNAL ARTICLE published February 2021 in International Journal of Information Security Research funded by Agentschap voor Innovatie door Wetenschap en Technologie (141758) | FP7 Information and Communication Technologies (609734) |
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
Applying NLP techniques to malware detection in a practical environment JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms JOURNAL ARTICLE published 13 May 2024 in International Journal of Information Security |
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
SFCGDroid: android malware detection based on sensitive function call graph JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Fast but approximate homomorphic k-means based on masking technique JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
cFEM: a cluster based feature extraction method for network intrusion detection JOURNAL ARTICLE published October 2023 in International Journal of Information Security Research funded by ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh (56.00.0000.028.33.005.20-120) |
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management JOURNAL ARTICLE published June 2018 in International Journal of Information Security |
Key pre-distribution approach using block LU decomposition in wireless sensor network JOURNAL ARTICLE published October 2020 in International Journal of Information Security |
Enhancing security in QCA-based circuits using optimal key gate placement JOURNAL ARTICLE published 17 April 2024 in International Journal of Information Security |
K maximum probability attack paths generation algorithm for target nodes in networked systems JOURNAL ARTICLE published August 2021 in International Journal of Information Security Research funded by National Natural Science Foundation of China (61672338,51779136,61873160,61373028) |
Modeling contextual security policies JOURNAL ARTICLE published August 2008 in International Journal of Information Security |
Dynamic searchable symmetric encryption for storing geospatial data in the cloud JOURNAL ARTICLE published June 2019 in International Journal of Information Security |