Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047490
Amit Singh, R. Ranjan
{"title":"A Comparative Study of Deep Transfer Learning Models for Malware Classification using Image Datasets","authors":"Amit Singh, R. Ranjan","doi":"10.1504/ijics.2022.10047490","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047490","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10042652
S. Manvi, Nayana Hegde
{"title":"Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment","authors":"S. Manvi, Nayana Hegde","doi":"10.1504/ijics.2022.10042652","DOIUrl":"https://doi.org/10.1504/ijics.2022.10042652","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10044642
Mala Kalra, J. Pandey
{"title":"An Approach for Secure Data Transmission in Smart grids","authors":"Mala Kalra, J. Pandey","doi":"10.1504/ijics.2022.10044642","DOIUrl":"https://doi.org/10.1504/ijics.2022.10044642","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047379
Kumaravelan Gopalakrishnan, B. Chander
{"title":"Outlier Detection in WSN with SVDD via Multi-Interpolation Auto-encoder","authors":"Kumaravelan Gopalakrishnan, B. Chander","doi":"10.1504/ijics.2022.10047379","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047379","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10046260
Zhijun Wu, Zhuoning Bai, Lizhe Zhang, Kenian Wang
{"title":"Unified Identity Authentication Scheme of System Wide Information Management Based on SAML-PKI-LDAP","authors":"Zhijun Wu, Zhuoning Bai, Lizhe Zhang, Kenian Wang","doi":"10.1504/ijics.2022.10046260","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046260","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047405
F. Gargouri, Asma Sellami, Faïza Ghozzi, S. Dammak
{"title":"Managing vulnerabilities during the development of a secure ETL processes","authors":"F. Gargouri, Asma Sellami, Faïza Ghozzi, S. Dammak","doi":"10.1504/ijics.2022.10047405","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047405","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10043105
Shalini Subrmani, Selvi M
{"title":"Comprehensive Review on Distributed Denial-of-Service (DDoS) Attacks in Wireless Sensor Networks","authors":"Shalini Subrmani, Selvi M","doi":"10.1504/ijics.2022.10043105","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043105","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10043102
S. S, A. Saravanan
{"title":"CloudSec (3FA): A Multifactor with Dynamic Click Colour Based Dynamic Authentication for Securing Cloud Environment","authors":"S. S, A. Saravanan","doi":"10.1504/ijics.2022.10043102","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043102","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047374
Amberker B. B, Abhilash M. H
{"title":"Dynamic Group Signature Scheme Using Ideal Lattices","authors":"Amberker B. B, Abhilash M. H","doi":"10.1504/ijics.2022.10047374","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047374","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10048818
Shalini Subramani, Selvi M
{"title":"Intrusion Detection System using RBPSO and Fuzzy Neuro Genetic Classification Algorithms in Wireless Sensor Networks","authors":"Shalini Subramani, Selvi M","doi":"10.1504/ijics.2022.10048818","DOIUrl":"https://doi.org/10.1504/ijics.2022.10048818","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}