International Journal of Information and Computer Security最新文献

筛选
英文 中文
A Comparative Study of Deep Transfer Learning Models for Malware Classification using Image Datasets 基于图像数据集的恶意软件分类深度迁移学习模型的比较研究
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047490
Amit Singh, R. Ranjan
{"title":"A Comparative Study of Deep Transfer Learning Models for Malware Classification using Image Datasets","authors":"Amit Singh, R. Ranjan","doi":"10.1504/ijics.2022.10047490","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047490","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment 动态车载云环境下的分布式完整性和不可抵赖性方案
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10042652
S. Manvi, Nayana Hegde
{"title":"Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment","authors":"S. Manvi, Nayana Hegde","doi":"10.1504/ijics.2022.10042652","DOIUrl":"https://doi.org/10.1504/ijics.2022.10042652","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Secure Data Transmission in Smart grids 智能电网中数据安全传输的一种方法
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10044642
Mala Kalra, J. Pandey
{"title":"An Approach for Secure Data Transmission in Smart grids","authors":"Mala Kalra, J. Pandey","doi":"10.1504/ijics.2022.10044642","DOIUrl":"https://doi.org/10.1504/ijics.2022.10044642","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outlier Detection in WSN with SVDD via Multi-Interpolation Auto-encoder 基于多插值自编码器的SVDD WSN离群点检测
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047379
Kumaravelan Gopalakrishnan, B. Chander
{"title":"Outlier Detection in WSN with SVDD via Multi-Interpolation Auto-encoder","authors":"Kumaravelan Gopalakrishnan, B. Chander","doi":"10.1504/ijics.2022.10047379","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047379","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Identity Authentication Scheme of System Wide Information Management Based on SAML-PKI-LDAP 基于SAML-PKI-LDAP的全系统信息管理统一身份认证方案
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046260
Zhijun Wu, Zhuoning Bai, Lizhe Zhang, Kenian Wang
{"title":"Unified Identity Authentication Scheme of System Wide Information Management Based on SAML-PKI-LDAP","authors":"Zhijun Wu, Zhuoning Bai, Lizhe Zhang, Kenian Wang","doi":"10.1504/ijics.2022.10046260","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046260","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing vulnerabilities during the development of a secure ETL processes 在开发安全ETL流程期间管理漏洞
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047405
F. Gargouri, Asma Sellami, Faïza Ghozzi, S. Dammak
{"title":"Managing vulnerabilities during the development of a secure ETL processes","authors":"F. Gargouri, Asma Sellami, Faïza Ghozzi, S. Dammak","doi":"10.1504/ijics.2022.10047405","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047405","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Review on Distributed Denial-of-Service (DDoS) Attacks in Wireless Sensor Networks 无线传感器网络中的分布式拒绝服务攻击研究综述
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10043105
Shalini Subrmani, Selvi M
{"title":"Comprehensive Review on Distributed Denial-of-Service (DDoS) Attacks in Wireless Sensor Networks","authors":"Shalini Subrmani, Selvi M","doi":"10.1504/ijics.2022.10043105","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043105","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CloudSec (3FA): A Multifactor with Dynamic Click Colour Based Dynamic Authentication for Securing Cloud Environment CloudSec (3FA):用于保护云环境的基于动态点击颜色的多因素动态认证
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10043102
S. S, A. Saravanan
{"title":"CloudSec (3FA): A Multifactor with Dynamic Click Colour Based Dynamic Authentication for Securing Cloud Environment","authors":"S. S, A. Saravanan","doi":"10.1504/ijics.2022.10043102","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043102","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection System using RBPSO and Fuzzy Neuro Genetic Classification Algorithms in Wireless Sensor Networks 基于RBPSO和模糊神经遗传分类算法的无线传感器网络入侵检测系统
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10048818
Shalini Subramani, Selvi M
{"title":"Intrusion Detection System using RBPSO and Fuzzy Neuro Genetic Classification Algorithms in Wireless Sensor Networks","authors":"Shalini Subramani, Selvi M","doi":"10.1504/ijics.2022.10048818","DOIUrl":"https://doi.org/10.1504/ijics.2022.10048818","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Group Signature Scheme Using Ideal Lattices 基于理想格的动态群签名方案
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047374
Amberker B. B, Abhilash M. H
{"title":"Dynamic Group Signature Scheme Using Ideal Lattices","authors":"Amberker B. B, Abhilash M. H","doi":"10.1504/ijics.2022.10047374","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047374","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信