Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 928 results
Sort by: relevance publication year

Malware classification approaches utilizing binary and text encoding of permissions

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Mo’ath Zyout | Raed Shatnawi | Hassan Najadat

A method for insider threat assessment by modeling the internal employee interactions

JOURNAL ARTICLE published October 2023 in International Journal of Information Security

Authors: Hamed Sepehrzadeh

Token-based graphical password authentication

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: John Charles Gyorffy | Andrew F. Tappenden | James Miller

Solving identity delegation problem in the e-government environment

JOURNAL ARTICLE published November 2011 in International Journal of Information Security

Authors: Sergio Sánchez García | Ana Gómez Oliva | Emilia Pérez Belleboni | Iván Pau de la Cruz

Evading malware classifiers using RL agent with action-mask

JOURNAL ARTICLE published December 2023 in International Journal of Information Security

Authors: Saurabh Pandey | Nitesh Kumar | Anand Handa | Sandeep Kumar Shukla

Uncertain inference control in privacy protection

JOURNAL ARTICLE published December 2009 in International Journal of Information Security

Authors: Xiangdong An | Dawn Jutla | Nick Cercone | Charnyote Pluempitiwiriyawej | Hai Wang

Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment

JOURNAL ARTICLE published June 2023 in International Journal of Information Security

Research funded by The National Natural Science Foundation of China (U1936213)

Authors: Yingchun Chen | Jinguo Li | Naiwang Guo

A new efficient optimistic fair exchange protocol without random oracles

JOURNAL ARTICLE published February 2012 in International Journal of Information Security

Authors: Qiong Huang | Guomin Yang | Duncan S. Wong | Willy Susilo

Message from the Guest Editors

JOURNAL ARTICLE published October 2011 in International Journal of Information Security

Authors: Sushil Jajodia | Jianying Zhou

The functionality-based application confinement model

JOURNAL ARTICLE published October 2013 in International Journal of Information Security

Authors: Z. Cliffe Schreuders | Christian Payne | Tanya McGill

Optimization of parallel firewalls filtering rules

JOURNAL ARTICLE published April 2022 in International Journal of Information Security

Authors: Taha Elamine Hadjadj | Adel Bouhoula | Rim Tebourbi | Riadh Ksantini

Efficient generation of secure elliptic curves

JOURNAL ARTICLE published 18 December 2006 in International Journal of Information Security

Authors: Elisavet Konstantinou | Yannis C. Stamatiou | Christos Zaroliagis

TrUStAPIS: a trust requirements elicitation method for IoT

JOURNAL ARTICLE published February 2020 in International Journal of Information Security

Research funded by H2020 Marie Skłodowska-Curie Actions (675320) | Horizon 2020 (830929) | Agencia Estatal de Investigación (TIN2016-79095-C2-1-R)

Authors: Davide Ferraris | Carmen Fernandez-Gago

An analysis of accuracy experiments carried out over of a multi-faceted model of trust

JOURNAL ARTICLE published April 2009 in International Journal of Information Security

Authors: Karl Quinn | David Lewis | Declan O’Sullivan | Vincent P. Wade

Toward a secure Kerberos key exchange with smart cards

JOURNAL ARTICLE published June 2014 in International Journal of Information Security

Authors: Nikos Mavrogiannopoulos | Andreas Pashalidis | Bart Preneel

Management of access control policies for XML document sources

JOURNAL ARTICLE published July 2003 in International Journal of Information Security

Authors: Barbara Carminati | Elena Ferrari

Developing non-interactive MPC with trusted hardware for enhanced security

JOURNAL ARTICLE published August 2022 in International Journal of Information Security

Authors: Ryan Karl | Hannah Burchfield | Jonathan Takeshita | Taeho Jung

Preventing sensitive relationships disclosure for better social media preservation

JOURNAL ARTICLE published April 2016 in International Journal of Information Security

Authors: Elie Raad | Bechara Al Bouna | Richard Chbeir

Generic constructions for role-based encryption

JOURNAL ARTICLE published October 2015 in International Journal of Information Security

Authors: Lan Zhou | Vijay Varadharajan | Michael Hitchens

Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity

JOURNAL ARTICLE published August 2015 in International Journal of Information Security

Authors: Abdeljebar Ameziane El Hassani | Anas Abou El Kalam | Adel Bouhoula | Ryma Abassi | Abdellah Ait Ouahman