International Journal of Information and Computer Security最新文献

筛选
英文 中文
Sentiment Analysis in Social network data using Multilayer Perceptron Neural Network with Hill-Climbing Meta-Heuristic Optimization 基于爬山元启发式优化的多层感知器神经网络在社交网络数据中的情感分析
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10049056
Domnic Sandanam, Samson Ebenezar Uthirapathy
{"title":"Sentiment Analysis in Social network data using Multilayer Perceptron Neural Network with Hill-Climbing Meta-Heuristic Optimization","authors":"Domnic Sandanam, Samson Ebenezar Uthirapathy","doi":"10.1504/ijics.2022.10049056","DOIUrl":"https://doi.org/10.1504/ijics.2022.10049056","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Fuzzy based Intelligent Intrusion Detection System for Internet of Things 基于模糊的物联网智能入侵检测系统综述
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046235
S. Svn, Nandhini U
{"title":"A Comprehensive Survey on Fuzzy based Intelligent Intrusion Detection System for Internet of Things","authors":"S. Svn, Nandhini U","doi":"10.1504/ijics.2022.10046235","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046235","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ciphertext-Policy Attribute-Based Delay Encryption cipher - policy基于属性的延迟加密
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046931
Lijiao Chen, Kewei Lv
{"title":"Ciphertext-Policy Attribute-Based Delay Encryption","authors":"Lijiao Chen, Kewei Lv","doi":"10.1504/ijics.2022.10046931","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046931","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JPBlock: Augmenting Security of Current Journal and Paper Publication Processes using Blockchain and Smart Contract JPBlock:利用区块链和智能合约增强当前期刊和论文出版过程的安全性
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047376
Hua Xiaofang, R. S. Soglo, J. Odoom
{"title":"JPBlock: Augmenting Security of Current Journal and Paper Publication Processes using Blockchain and Smart Contract","authors":"Hua Xiaofang, R. S. Soglo, J. Odoom","doi":"10.1504/ijics.2022.10047376","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047376","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Message Encryption Scheme inspired by Sudoku Puzzle (MESP) 一种受数独谜(MESP)启发的消息加密方案
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047993
Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh
{"title":"A Message Encryption Scheme inspired by Sudoku Puzzle (MESP)","authors":"Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh","doi":"10.1504/ijics.2022.10047993","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047993","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureAuthKey: Design and Evaluation of a Lightweight Key Agreement technique for Smart Home Applications SecureAuthKey:用于智能家居应用的轻量级密钥协议技术的设计和评估
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10042826
J. NaveenKumar, Sandip Thite
{"title":"SecureAuthKey: Design and Evaluation of a Lightweight Key Agreement technique for Smart Home Applications","authors":"J. NaveenKumar, Sandip Thite","doi":"10.1504/ijics.2022.10042826","DOIUrl":"https://doi.org/10.1504/ijics.2022.10042826","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher TRIVIUM流密码软件实现中的相关功率分析攻击
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046026
Chuah Chai Wen, Malitha Kumarasiri, Iranga Navaratna, Rangana De Silva, Janaka Alawatugoda
{"title":"Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher","authors":"Chuah Chai Wen, Malitha Kumarasiri, Iranga Navaratna, Rangana De Silva, Janaka Alawatugoda","doi":"10.1504/ijics.2022.10046026","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046026","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width 基于高斯核宽度的最小二乘支持向量机的网络流量预测
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047401
Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke
{"title":"Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width","authors":"Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke","doi":"10.1504/ijics.2022.10047401","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047401","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key 带约束密钥的RSA大解密指数的改进密码分析
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10026019
Luo Ping, Majid Mumtaz
{"title":"An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key","authors":"Luo Ping, Majid Mumtaz","doi":"10.1504/ijics.2021.10026019","DOIUrl":"https://doi.org/10.1504/ijics.2021.10026019","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A truncated mean lp-LDA approach for intrusion detection system 入侵检测系统的截断均值lp-LDA方法
International Journal of Information and Computer Security Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10032177
Zyad Elkhadir, M. Benattou
{"title":"A truncated mean lp-LDA approach for intrusion detection system","authors":"Zyad Elkhadir, M. Benattou","doi":"10.1504/ijics.2021.10032177","DOIUrl":"https://doi.org/10.1504/ijics.2021.10032177","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信