Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 6 of 934 results
Sort by: relevance publication year

Obfuscated integration of software protections

JOURNAL ARTICLE published February 2021 in International Journal of Information Security

Research funded by Agentschap voor Innovatie door Wetenschap en Technologie (141758) | FP7 Information and Communication Technologies (609734)

Authors: Jens Van den Broeck | Bart Coppens | Bjorn De Sutter

BitCracker: BitLocker meets GPUs

JOURNAL ARTICLE published October 2022 in International Journal of Information Security

Authors: E. Agostini | M. Bernaschi

Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

JOURNAL ARTICLE published February 2023 in International Journal of Information Security

Authors: Ahmed Amro | Vasileios Gkioulos

Modeling contextual security policies

JOURNAL ARTICLE published August 2008 in International Journal of Information Security

Authors: Frédéric Cuppens | Nora Cuppens-Boulahia

Neighbor discovery protocol anomaly-based detection system using neural network algorithm

JOURNAL ARTICLE published 11 February 2024 in International Journal of Information Security

Authors: Redhwan M. A. Saad | Mohammed Anbar | Selvakumar Manickam | Samir I. Shaheen | Iznan H. Hasbullah

Applying NLP techniques to malware detection in a practical environment

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Mamoru Mimura | Ryo Ito

A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets

JOURNAL ARTICLE published February 2017 in International Journal of Information Security

Authors: Riaz Ahmed Shaikh | Kamel Adi | Luigi Logrippo

SFCGDroid: android malware detection based on sensitive function call graph

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Sibo Shi | Shengwei Tian | Bo Wang | Tiejun Zhou | Guanxin Chen

Fast but approximate homomorphic k-means based on masking technique

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Lorenzo Rovida

Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Rabie Barhoun | Maryam Ed-daibouni

Analysis of OSPU security effect and data assembly verification under semi-network OS architecture

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Yin Sheng Zhang

cFEM: a cluster based feature extraction method for network intrusion detection

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Research funded by ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh (56.00.0000.028.33.005.20-120)

Authors: Md. Mumtahin Habib Ullah Mazumder | Md. Eusha Kadir | Sadia Sharmin | Md. Shariful Islam | Muhammad Mahbub Alam

Protection of centralized SDN control plane from high-rate Packet-In messages

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Suhail Ahmad | Ajaz Hussain Mir

RAMA: a risk assessment solution for healthcare organizations

JOURNAL ARTICLE published 1 March 2024 in International Journal of Information Security

Research funded by Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275) | Horizon 2020 Framework Programme (883275,883275)

Authors: Michail Smyrlis | Evangelos Floros | Ioannis Basdekis | Dumitru-Bogdan Prelipcean | Aristeidis Sotiropoulos | Herve Debar | Apostolis Zarras | George Spanoudakis

Efficient attribute-based signature and signcryption realizing expressive access structures

JOURNAL ARTICLE published February 2016 in International Journal of Information Security

Authors: Y. Sreenivasa Rao | Ratna Dutta

Listega: list-based steganography methodology

JOURNAL ARTICLE published August 2009 in International Journal of Information Security

Authors: Abdelrahman Desoky

Breaking four mix-related schemes based on Universal Re-encryption

JOURNAL ARTICLE published 9 October 2007 in International Journal of Information Security

Authors: George Danezis

Practical homomorphic encryption over the integers for secure computation in the cloud

JOURNAL ARTICLE published October 2019 in International Journal of Information Security

Research funded by Engineering and Physical Sciences Research Council (EP/I028099/1,EP/M004953/1) | National Key Research and Development Program (2016YFB1000103)

Authors: James Dyer | Martin Dyer | Jie Xu

Related-key rectangle attack on 36 rounds of the XTEA block cipher

JOURNAL ARTICLE published February 2009 in International Journal of Information Security

Authors: Jiqiang Lu

Network-based detection of Android malicious apps

JOURNAL ARTICLE published August 2017 in International Journal of Information Security

Research funded by RailTel Telecom Center of Excellence (RCI-763(3)-ECD) | IBM (IBM-741- ECD)

Authors: Shree Garg | Sateesh K. Peddoju | Anil K. Sarje