Facet browsing currently unavailable
Page 9 of 934 results
Sort by: relevance publication year
Privacy-preserving continuous authentication using behavioral biometrics JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches JOURNAL ARTICLE published February 2023 in International Journal of Information Security |
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Security attacks on smart grid scheduling and their defences: a game-theoretic approach JOURNAL ARTICLE published August 2020 in International Journal of Information Security |
Anomalous behavior detection-based approach for authenticating smart home system users JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Password-authenticated searchable encryption JOURNAL ARTICLE published October 2021 in International Journal of Information Security |
Challenges of post-quantum digital signing in real-world applications: a survey JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Ministry of Education (MOE2018-T2-1-111) |
Systematic review of SIEM technology: SIEM-SC birth JOURNAL ARTICLE published June 2023 in International Journal of Information Security |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by Armasuisse (CYD-C-2020003,R-3210/047-31) |
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability JOURNAL ARTICLE published June 2020 in International Journal of Information Security |
On detecting co-resident cloud instances using network flow watermarking techniques JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Malware classification approaches utilizing binary and text encoding of permissions JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
A method for insider threat assessment by modeling the internal employee interactions JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Token-based graphical password authentication JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Solving identity delegation problem in the e-government environment JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Evading malware classifiers using RL agent with action-mask JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Uncertain inference control in privacy protection JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by The National Natural Science Foundation of China (U1936213) |
A new efficient optimistic fair exchange protocol without random oracles JOURNAL ARTICLE published February 2012 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published October 2011 in International Journal of Information Security |