Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10046934
A. R., Chithra Pl
{"title":"Blockchain Based Image Encryption with Spiral Mapping and Hashing Techniques in Dual Level Security Scheme","authors":"A. R., Chithra Pl","doi":"10.1504/ijics.2022.10046934","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046934","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047377
Bikash Baruah, M. P. Dutta, D. K. Bhattacharyya
{"title":"An Effective Ensemble Method for Missing Data Imputation","authors":"Bikash Baruah, M. P. Dutta, D. K. Bhattacharyya","doi":"10.1504/ijics.2022.10047377","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047377","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047488
M. Taghva, Saba Malakpoor Bejandi, P. Hanafizadeh
{"title":"Applying swarm intelligence and data mining approach in detecting online and digital theft","authors":"M. Taghva, Saba Malakpoor Bejandi, P. Hanafizadeh","doi":"10.1504/ijics.2022.10047488","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047488","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10048819
Nabila Haddad, Oualid Demigha
{"title":"Formal Verification of Software-only Mechanisms for Live Migration of SGX Enclaves","authors":"Nabila Haddad, Oualid Demigha","doi":"10.1504/ijics.2022.10048819","DOIUrl":"https://doi.org/10.1504/ijics.2022.10048819","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10043103
Jing Niu
{"title":"Design of automatic monitoring system for network information security in cloud computing environment","authors":"Jing Niu","doi":"10.1504/ijics.2022.10043103","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043103","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79429242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10044086
Biyi Lin, Junjie Xiong
{"title":"You Are Safe When You Tell the Truth: A Blockchain-based Privacy-preserving Evidence Collection and Distribution System for Digital Forensics","authors":"Biyi Lin, Junjie Xiong","doi":"10.1504/ijics.2022.10044086","DOIUrl":"https://doi.org/10.1504/ijics.2022.10044086","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10044087
Ashutosh Pasricha, V. Avasthi, Pritam S. Salankar
{"title":"Lightweight Authentication Scheme based on Modified EAP Security for CoAP Protocol based IoMT Applications","authors":"Ashutosh Pasricha, V. Avasthi, Pritam S. Salankar","doi":"10.1504/ijics.2022.10044087","DOIUrl":"https://doi.org/10.1504/ijics.2022.10044087","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10046347
Tsu-Yang Wu, Yu-Xi Hu, Ruey-Shun Chen, Yeh-Cheng Chen, Gang Ke
{"title":"Simple multi-scale human abnormal behaviour detection based on video","authors":"Tsu-Yang Wu, Yu-Xi Hu, Ruey-Shun Chen, Yeh-Cheng Chen, Gang Ke","doi":"10.1504/ijics.2022.10046347","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046347","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047378
V. Paul, A. Jose, L. Nair
{"title":"Tree Derived Feature Importance and Bayesian Optimization For Improved Multi-class classification of DDoS Attacks in Software Defined Networks","authors":"V. Paul, A. Jose, L. Nair","doi":"10.1504/ijics.2022.10047378","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047378","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}