International Journal of Information and Computer Security最新文献

筛选
英文 中文
Image Tampering Detection based on Feature Consistency Attention 基于特征一致性关注的图像篡改检测
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10053595
Liu Weiwei, Sun Juan, Xu Yihan, Gu Junlin
{"title":"Image Tampering Detection based on Feature Consistency Attention","authors":"Liu Weiwei, Sun Juan, Xu Yihan, Gu Junlin","doi":"10.1504/ijics.2023.10053595","DOIUrl":"https://doi.org/10.1504/ijics.2023.10053595","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New hybrid chaotic System and its analysis 一种新的混合混沌系统及其分析
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10053890
Manjit Kaur, M. Sandhu, Surender Singh
{"title":"A New hybrid chaotic System and its analysis","authors":"Manjit Kaur, M. Sandhu, Surender Singh","doi":"10.1504/ijics.2023.10053890","DOIUrl":"https://doi.org/10.1504/ijics.2023.10053890","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial neural network-based intrusion detection system using multi-objective genetic algorithm 基于人工神经网络的多目标遗传算法入侵检测系统
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132726
N. Patel, B. Mehtre, R. Wankar
{"title":"Artificial neural network-based intrusion detection system using multi-objective genetic algorithm","authors":"N. Patel, B. Mehtre, R. Wankar","doi":"10.1504/ijics.2023.132726","DOIUrl":"https://doi.org/10.1504/ijics.2023.132726","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"320-335"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Multi-party Quantum Key Agreement Protocol Based on New Bell State Encoding Mode 基于新贝尔状态编码模式的高效多方量子密钥协议
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057985
Y. Sun, Kefan Cheng, Zexi Li, Hongfeng Zhu
{"title":"Efficient Multi-party Quantum Key Agreement Protocol Based on New Bell State Encoding Mode","authors":"Y. Sun, Kefan Cheng, Zexi Li, Hongfeng Zhu","doi":"10.1504/ijics.2023.10057985","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057985","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67040029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Generating New Key-Dependent XOR Tables to Improve AES Security and Evaluating the Randomness of the Output of Block ciphers 生成新的依赖密钥的异或表以提高AES安全性及评估分组密码输出的随机性
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10055730
L. Dinh, Luong Tran Thi
{"title":"On Generating New Key-Dependent XOR Tables to Improve AES Security and Evaluating the Randomness of the Output of Block ciphers","authors":"L. Dinh, Luong Tran Thi","doi":"10.1504/ijics.2023.10055730","DOIUrl":"https://doi.org/10.1504/ijics.2023.10055730","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level Image Security using Modified Rubik’s Cube Algorithm 基于改进魔方算法的多级图像安全
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057698
S. Sahu, Rupesh Sinha
{"title":"Multi-level Image Security using Modified Rubik’s Cube Algorithm","authors":"S. Sahu, Rupesh Sinha","doi":"10.1504/ijics.2023.10057698","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057698","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A shallow-based neural network model for fake news detection in social networks 基于浅层神经网络的社交网络假新闻检测模型
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132727
S. Ramya, R. Eswari
{"title":"A shallow-based neural network model for fake news detection in social networks","authors":"S. Ramya, R. Eswari","doi":"10.1504/ijics.2023.132727","DOIUrl":"https://doi.org/10.1504/ijics.2023.132727","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"360-382"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outlier detection in WSN with SVDD via multi-interpolation auto-encoder 基于多插值自编码器的SVDD WSN离群点检测
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133368
Bhanu Chander, Kumaravelan Gopalakrishnan
{"title":"Outlier detection in WSN with SVDD via multi-interpolation auto-encoder","authors":"Bhanu Chander, Kumaravelan Gopalakrishnan","doi":"10.1504/ijics.2023.133368","DOIUrl":"https://doi.org/10.1504/ijics.2023.133368","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of various deep convolutional neural network models through classification of malware 基于恶意软件分类的各种深度卷积神经网络模型的性能评估
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132767
Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey
{"title":"Performance evaluation of various deep convolutional neural network models through classification of malware","authors":"Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey","doi":"10.1504/ijics.2023.132767","DOIUrl":"https://doi.org/10.1504/ijics.2023.132767","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136029755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature-driven intrusion detection method based on improved CNN and LSTM 基于改进CNN和LSTM的特征驱动入侵检测方法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10059327
Lin Guo, Jiawei Zhang, Yufei Zhao, Jing Zhang, Xiaoqin Zhang
{"title":"Feature-driven intrusion detection method based on improved CNN and LSTM","authors":"Lin Guo, Jiawei Zhang, Yufei Zhao, Jing Zhang, Xiaoqin Zhang","doi":"10.1504/ijics.2023.10059327","DOIUrl":"https://doi.org/10.1504/ijics.2023.10059327","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信