default search action
Journal of Information Security and Applications, Volume 54
Volume 54, October 2020
- Roopak Surendran, Tony Thomas, Sabu Emmanuel:
A TAN based hybrid model for android malware detection. 102483 - Pengfei Wang, Xu Zhou, Kai Lu:
Sabotaging the system boundary: A study of the inter-boundary vulnerability. 102496 - Tiantian Ji, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. 102497 - Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. 102504 - Gulnawaz Gani, Fasel Qadir:
A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata. 102510 - Souhila Aoufi, Abdelouahid Derhab, Mohamed Guerroumi:
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. 102518 - Nafiseh Masaeli, Hamid Haj Seyyed Javadi, Seyed Hossein Erfani:
Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds. 102519 - Hao Hu, Jing Liu, Yuchen Zhang, Yuling Liu, Xiaoyu Xu, Jinglei Tan:
Attack scenario reconstruction approach using attack graph and alert data mining. 102522 - Jinwei Wang, Qiye Ni, Guangjie Liu, Xiangyang Luo, Sunil Kr. Jha:
Image splicing detection based on convolutional neural network with weight combination strategy. 102523 - Vandana Guleria, Shazia Sabir, Deep Chandra Mishra:
Security of multiple RGB images by RSA cryptosystem combined with FrDCT and Arnold transform. 102524 - Philipp Kreimel, Oliver Eigner, Francesco Mercaldo, Antonella Santone, Paul Tavolato:
Anomaly detection in substation networks. 102527 - Petr Matousek, Ondrej Rysavý, Matej Grégr, Vojtech Havlena:
Flow based monitoring of ICS communication in the smart grid. 102535 - Yilan Wang, Xiaobing Kang, Yajun Chen:
Robust and accurate detection of image copy-move forgery using PCET-SVD and histogram of block similarity measures. 102536 - SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. 102540 - Gustavo Gonzalez Granadillo, Elena Doynikova, Joaquín García, Igor V. Kotenko, Andrey Fedorchenko:
Stateful RORI-based countermeasure selection using hypergraphs. 102541 - Kevin I. Jones, Helge Janicke, Leandros Maglaras, Christos Xenakis:
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems". 102542 - Gaurav Pareek, B. R. Purushothama:
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance. 102543 - Florian Skopik, Max Landauer, Markus Wurzenberger, Gernot Vormayr, Jelena Milosevic, Joachim Fabini, Wolfgang Prüggler, Oskar Kruschitz, Benjamin Widmann, Kevin Truckenthanner, Stefan Rass, Michael Simmer, Christoph Zauner:
synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems. 102544 - Li Li, Jiayong Liu:
SecACS: Enabling lightweight secure auditable cloud storage with data dynamics. 102545 - Ali Broumandnia:
Image encryption algorithm based on the finite fields in chaotic maps. 102553 - Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism. 102554 - Nikolaos Dalezios, Stavros Shiaeles, Nicholas Kolokotronis, Bogdan Ghita:
Digital forensics cloud log unification: Implementing CADF in Apache CloudStack. 102555 - Christos Tselikis, Christos Douligeris, Leandros Maglaras, Sarandis Mitropoulos:
On the conference key distribution system with user anonymity. 102556 - Brian A. Powell:
Detecting malicious logins as graph anomalies. 102557 - Lee Peng Lim, Manmeet Mahinderjit Singh:
Resolving the imbalance issue in short messaging service spam dataset using cost-sensitive techniques. 102558 - K. Sowjanya, Mou Dasgupta:
A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. 102559 - Farhan Musanna, Sanjeev Kumar:
A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function. 102560 - Vahhab Samadi Bokharaie, A. Jahanian:
Side-channel leakage assessment metrics and methodologies at design cycle: A case study for a cryptosystem. 102561 - Gustavo Gonzalez Granadillo, Elena Doynikova, Joaquín García, Igor V. Kotenko, Andrey Fedorchenko:
Stateful RORI-based countermeasure selection using hypergraphs. 102562 - Matthias Caesar, Jan Steffan:
A location privacy analysis of Bluetooth mesh. 102563 - Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
Inter-dataset generalization strength of supervised machine learning methods for intrusion detection. 102564 - Yunling Ma, Chengqing Li, Bo Ou:
Cryptanalysis of an image block encryption algorithm based on chaotic maps. 102566 - Yongshuang Liu, Haiping Huang, Fu Xiao, Reza Malekian, Wenming Wang:
Classification and recognition of encrypted EEG data based on neural network. 102567 - Xiaojun Zhang, Yao Tang, Sheng Cao, Chao Huang, Shuang Zheng:
Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems. 102568 - Kunwar Singh, C. Pandu Rangan, Richa Agrawal, Samir Sheshank:
Provably secure lattice based identity based unidirectional PRE and PRE+ schemes. 102569 - Kazi Wasif Ahmed, Md Momin Al Aziz, Md. Nazmus Sadat, Dima Alhadidi, Noman Mohammed:
Nearest neighbour search over encrypted data using intel SGX. 102579 - Jayaprakash Kar:
Provably secure certificateless deniable authenticated encryption scheme. 102581 - Yong-qing Chen, Wei-jiao Sun, Liyao Li, Chin-Chen Chang, Xu Wang:
An efficient general data hiding scheme based on image interpolation. 102584 - Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A DDoS attack detection and defense scheme using time-series analysis for SDN. 102587 - Mahdi Nikooghadam, Haleh Amintoosi, Saru Kumari:
A provably secure ECC-based roaming authentication scheme for global mobility networks. 102588 - Tanveer ul Haq, Tariq Shah:
Algebra-chaos amalgam and DNA transform based multiple digital image encryption. 102592 - Alireza Shameli-Sendi:
An efficient security data-driven approach for implementing risk assessment. 102593 - Umar Mukhtar Ismail, Shareeful Islam:
A unified framework for cloud security transparency and audit. 102594 - Mamoru Mimura:
Using fake text vectors to improve the sensitivity of minority class for macro malware detection. 102600
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.