Facet browsing currently unavailable
Page 1 of 928 results
Sort by: relevance publication year
Malware classification approaches utilizing binary and text encoding of permissions JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
A method for insider threat assessment by modeling the internal employee interactions JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Token-based graphical password authentication JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Solving identity delegation problem in the e-government environment JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Evading malware classifiers using RL agent with action-mask JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Uncertain inference control in privacy protection JOURNAL ARTICLE published December 2009 in International Journal of Information Security |
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by The National Natural Science Foundation of China (U1936213) |
A new efficient optimistic fair exchange protocol without random oracles JOURNAL ARTICLE published February 2012 in International Journal of Information Security |
Message from the Guest Editors JOURNAL ARTICLE published October 2011 in International Journal of Information Security |
The functionality-based application confinement model JOURNAL ARTICLE published October 2013 in International Journal of Information Security |
Optimization of parallel firewalls filtering rules JOURNAL ARTICLE published April 2022 in International Journal of Information Security |
Efficient generation of secure elliptic curves JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security |
TrUStAPIS: a trust requirements elicitation method for IoT JOURNAL ARTICLE published February 2020 in International Journal of Information Security Research funded by H2020 Marie Skłodowska-Curie Actions (675320) | Horizon 2020 (830929) | Agencia Estatal de Investigación (TIN2016-79095-C2-1-R) |
An analysis of accuracy experiments carried out over of a multi-faceted model of trust JOURNAL ARTICLE published April 2009 in International Journal of Information Security |
Toward a secure Kerberos key exchange with smart cards JOURNAL ARTICLE published June 2014 in International Journal of Information Security |
Management of access control policies for XML document sources JOURNAL ARTICLE published July 2003 in International Journal of Information Security |
Developing non-interactive MPC with trusted hardware for enhanced security JOURNAL ARTICLE published August 2022 in International Journal of Information Security |
Preventing sensitive relationships disclosure for better social media preservation JOURNAL ARTICLE published April 2016 in International Journal of Information Security |
Generic constructions for role-based encryption JOURNAL ARTICLE published October 2015 in International Journal of Information Security |
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity JOURNAL ARTICLE published August 2015 in International Journal of Information Security |