Facet browsing currently unavailable
Page 6 of 934 results
Sort by: relevance publication year
Obfuscated integration of software protections JOURNAL ARTICLE published February 2021 in International Journal of Information Security Research funded by Agentschap voor Innovatie door Wetenschap en Technologie (141758) | FP7 Information and Communication Technologies (609734) |
BitCracker: BitLocker meets GPUs JOURNAL ARTICLE published October 2022 in International Journal of Information Security |
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
Modeling contextual security policies JOURNAL ARTICLE published August 2008 in International Journal of Information Security |
Neighbor discovery protocol anomaly-based detection system using neural network algorithm JOURNAL ARTICLE published 11 February 2024 in International Journal of Information Security |
Applying NLP techniques to malware detection in a practical environment JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
SFCGDroid: android malware detection based on sensitive function call graph JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Fast but approximate homomorphic k-means based on masking technique JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
cFEM: a cluster based feature extraction method for network intrusion detection JOURNAL ARTICLE published October 2023 in International Journal of Information Security Research funded by ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh (56.00.0000.028.33.005.20-120) |
Protection of centralized SDN control plane from high-rate Packet-In messages JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
RAMA: a risk assessment solution for healthcare organizations JOURNAL ARTICLE published 1 March 2024 in International Journal of Information Security Research funded by Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) |
Efficient attribute-based signature and signcryption realizing expressive access structures JOURNAL ARTICLE published February 2016 in International Journal of Information Security |
Listega: list-based steganography methodology JOURNAL ARTICLE published August 2009 in International Journal of Information Security |
Breaking four mix-related schemes based on Universal Re-encryption JOURNAL ARTICLE published 9 October 2007 in International Journal of Information Security |
Practical homomorphic encryption over the integers for secure computation in the cloud JOURNAL ARTICLE published October 2019 in International Journal of Information Security Research funded by Engineering and Physical Sciences Research Council (EP/I028099/1,EP/M004953/1) | National Key Research and Development Program (2016YFB1000103) |
Related-key rectangle attack on 36 rounds of the XTEA block cipher JOURNAL ARTICLE published February 2009 in International Journal of Information Security |
Network-based detection of Android malicious apps JOURNAL ARTICLE published August 2017 in International Journal of Information Security Research funded by RailTel Telecom Center of Excellence (RCI-763(3)-ECD) | IBM (IBM-741- ECD) |