Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 933 results
Sort by: relevance publication year

A graph-theoretical model of computer security

JOURNAL ARTICLE published November 2004 in International Journal of Information Security

Authors: Mark Burgess | Geoffrey Canright | Kenth Engø-Monsen

Formal analysis for robust anti-SPIT protection using model checking

JOURNAL ARTICLE published April 2012 in International Journal of Information Security

Authors: Dimitris Gritzalis | Panagiotis Katsaros | Stylianos Basagiannis | Yannis Soupionis

Dynamic reversed accumulator

JOURNAL ARTICLE published April 2018 in International Journal of Information Security

Research funded by Ministry of Science and Technology, Taiwan (TW) (103-2221-E-008-083)

Authors: Tsung-Min Kuo | Sung-Ming Yen | Meng-Che Han

A comprehensive study of queue management as a DoS counter-measure

JOURNAL ARTICLE published October 2013 in International Journal of Information Security

Authors: Daniel Boteanu | José M. Fernandez

IDSIC: an intrusion detection system with identification capability

JOURNAL ARTICLE published June 2008 in International Journal of Information Security

Authors: Pei-Te Chen | Chi-Sung Laih

Controlled query evaluation for enforcing confidentiality in complete information systems

JOURNAL ARTICLE published October 2004 in International Journal of Information Security

Authors: Joachim Biskup | Piero Bonatti

A systematic mapping study on security for systems of systems

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Research funded by Ministerio de Ciencia e Innovación,Spain (PID2019-105455GB-C31) | Ministero dell’Istruzione, dell’Università e della Ricerca (2015KWREMX) | Consejería de Economía, Innovación, Ciencia y Empleo, Junta de Andalucía,Spain (US-1251532)

Authors: Miguel Angel Olivero | Antonia Bertolino | Francisco José Dominguez-Mayo | María José Escalona | Ilaria Matteucci

Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Ahlem Hamdi | Lamia Fourati | Samiha Ayed

An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Jalaiah Saikam | Koteswararao Ch

Generating adversarial examples with collaborative generative models

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Research funded by The key R&D program of science and technology foundation of Hebei Province (19210310D) | The natural science foundation of Hebei Province (F2021201020)

Authors: Lei Xu | Junhai Zhai

A review on digital twins for power generation and distribution

JOURNAL ARTICLE published April 2024 in International Journal of Information Security

Authors: Jessica B. Heluany | Vasileios Gkioulos

Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Authors: Eranga Bandara | Xueping Liang | Sachin Shetty | Ravi Mukkamala | Peter Foytik | Nalin Ranasinghe | Kasun De Zoysa

Time-specific encryption from forward-secure encryption: generic and direct constructions

JOURNAL ARTICLE published October 2016 in International Journal of Information Security

Authors: Kohei Kasamatsu | Takahiro Matsuda | Keita Emura | Nuttapong Attrapadung | Goichiro Hanaoka | Hideki Imai

Achieving evenhandedness in certified email system for contract signing

JOURNAL ARTICLE published November 2008 in International Journal of Information Security

Authors: Kenji Imamoto | Jianying Zhou | Kouichi Sakurai

Group signature implies public-key encryption with non-interactive opening

JOURNAL ARTICLE published February 2014 in International Journal of Information Security

Authors: Keita Emura | Goichiro Hanaoka | Yusuke Sakai | Jacob C. N. Schuldt

Effective network intrusion detection using stacking-based ensemble approach

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Muhammad Ali | Mansoor-ul- Haque | Muhammad Hanif Durad | Anila Usman | Syed Muhammad Mohsin | Hana Mujlid | Carsten Maple

Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

JOURNAL ARTICLE published 12 January 2024 in International Journal of Information Security

Authors: Elham Ebrahimpour | Shahram Babaie

Improving the security of direct anonymous attestation under host corruptions

JOURNAL ARTICLE published August 2021 in International Journal of Information Security

Research funded by Institute for Information and Communications Technology Promotion (2016-6-00599)

Authors: Hyoseung Kim | Kwangsu Lee | Jong Hwan Park | Dong Hoon Lee

Security and privacy of electronic health information systems

JOURNAL ARTICLE published November 2015 in International Journal of Information Security

Authors: Elisa Bertino | Robert H. Deng | Xinyi Huang | Jianying Zhou

IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Research funded by Japan Society for the Promotion of Science (20K11818,19K11968) | Japan Society for the Promotion of Science (19H04108)

Authors: Kazuki Koike | Ryotaro Kobayashi | Masahiko Katoh