Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 934 results
Sort by: relevance publication year

A secure architecture for TCP/UDP-based cloud communications

JOURNAL ARTICLE published April 2021 in International Journal of Information Security

Research funded by Natural Sciences and Engineering Research Council of Canada (RGPIN-2019-04651) | Canada Research Chairs (231318)

Authors: Abu Faisal | Mohammad Zulkernine

Cyber–physical risk assessment for false data injection attacks considering moving target defences

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by ESRC (S/T000112/1) | Engineering and Physical Sciences Research Council (EP/L015471/1) | Italian Ministry for Research (2017YKXYXJ)

Authors: Martin Higgins | Wangkun Xu | Fei Teng | Thomas Parisini

Efficient attribute-based signature and signcryption realizing expressive access structures

JOURNAL ARTICLE published February 2016 in International Journal of Information Security

Authors: Y. Sreenivasa Rao | Ratna Dutta

BitCracker: BitLocker meets GPUs

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: E. Agostini | M. Bernaschi

Obfuscated integration of software protections

JOURNAL ARTICLE published February 2021 in International Journal of Information Security

Research funded by Agentschap voor Innovatie door Wetenschap en Technologie (141758) | FP7 Information and Communication Technologies (609734)

Authors: Jens Van den Broeck | Bart Coppens | Bjorn De Sutter

Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Ahmed Amro | Vasileios Gkioulos

Applying NLP techniques to malware detection in a practical environment

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Mamoru Mimura | Ryo Ito

Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms

JOURNAL ARTICLE published 13 May 2024 in International Journal of Information Security

Authors: Ashish Bajaj | Dinesh Kumar Vishwakarma

Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study

JOURNAL ARTICLE published April 2023 in International Journal of Information Security

Authors: Efstratios Chatzoglou | Vasileios Kouliaridis | Georgios Karopoulos | Georgios Kambourakis

SFCGDroid: android malware detection based on sensitive function call graph

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Sibo Shi | Shengwei Tian | Bo Wang | Tiejun Zhou | Guanxin Chen

Fast but approximate homomorphic k-means based on masking technique

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Lorenzo Rovida

Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Rabie Barhoun | Maryam Ed-daibouni

Analysis of OSPU security effect and data assembly verification under semi-network OS architecture

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Yin Sheng Zhang

cFEM: a cluster based feature extraction method for network intrusion detection

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Research funded by ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh (56.00.0000.028.33.005.20-120)

Authors: Md. Mumtahin Habib Ullah Mazumder | Md. Eusha Kadir | Sadia Sharmin | Md. Shariful Islam | Muhammad Mahbub Alam

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

JOURNAL ARTICLE published June 2018 in International Journal of Information Security

Authors: Yujue Wang | HweeHwa Pang | Robert H. Deng

Key pre-distribution approach using block LU decomposition in wireless sensor network

JOURNAL ARTICLE published October 2020 in International Journal of Information Security

Authors: Ahmed M. Manasrah | Areej R. AL-Rabadi | Najib A. Kofahi

Enhancing security in QCA-based circuits using optimal key gate placement

JOURNAL ARTICLE published 17 April 2024 in International Journal of Information Security

Authors: M. Amutha | K. R. Kavitha

K maximum probability attack paths generation algorithm for target nodes in networked systems

JOURNAL ARTICLE published August 2021 in International Journal of Information Security

Research funded by National Natural Science Foundation of China (61672338,51779136,61873160,61373028)

Authors: Kun Bi | Dezhi Han | Guichen Zhang | Kuan-Ching Li | Aniello Castiglione

Modeling contextual security policies

JOURNAL ARTICLE published August 2008 in International Journal of Information Security

Authors: Frédéric Cuppens | Nora Cuppens-Boulahia

Dynamic searchable symmetric encryption for storing geospatial data in the cloud

JOURNAL ARTICLE published June 2019 in International Journal of Information Security

Authors: Benedikt Hiemenz | Michel Krämer