Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10049056
Domnic Sandanam, Samson Ebenezar Uthirapathy
{"title":"Sentiment Analysis in Social network data using Multilayer Perceptron Neural Network with Hill-Climbing Meta-Heuristic Optimization","authors":"Domnic Sandanam, Samson Ebenezar Uthirapathy","doi":"10.1504/ijics.2022.10049056","DOIUrl":"https://doi.org/10.1504/ijics.2022.10049056","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10046235
S. Svn, Nandhini U
{"title":"A Comprehensive Survey on Fuzzy based Intelligent Intrusion Detection System for Internet of Things","authors":"S. Svn, Nandhini U","doi":"10.1504/ijics.2022.10046235","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046235","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10046931
Lijiao Chen, Kewei Lv
{"title":"Ciphertext-Policy Attribute-Based Delay Encryption","authors":"Lijiao Chen, Kewei Lv","doi":"10.1504/ijics.2022.10046931","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046931","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047376
Hua Xiaofang, R. S. Soglo, J. Odoom
{"title":"JPBlock: Augmenting Security of Current Journal and Paper Publication Processes using Blockchain and Smart Contract","authors":"Hua Xiaofang, R. S. Soglo, J. Odoom","doi":"10.1504/ijics.2022.10047376","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047376","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047993
Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh
{"title":"A Message Encryption Scheme inspired by Sudoku Puzzle (MESP)","authors":"Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh","doi":"10.1504/ijics.2022.10047993","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047993","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10042826
J. NaveenKumar, Sandip Thite
{"title":"SecureAuthKey: Design and Evaluation of a Lightweight Key Agreement technique for Smart Home Applications","authors":"J. NaveenKumar, Sandip Thite","doi":"10.1504/ijics.2022.10042826","DOIUrl":"https://doi.org/10.1504/ijics.2022.10042826","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher","authors":"Chuah Chai Wen, Malitha Kumarasiri, Iranga Navaratna, Rangana De Silva, Janaka Alawatugoda","doi":"10.1504/ijics.2022.10046026","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046026","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047401
Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke
{"title":"Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width","authors":"Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke","doi":"10.1504/ijics.2022.10047401","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047401","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10026019
Luo Ping, Majid Mumtaz
{"title":"An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key","authors":"Luo Ping, Majid Mumtaz","doi":"10.1504/ijics.2021.10026019","DOIUrl":"https://doi.org/10.1504/ijics.2021.10026019","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijics.2021.10032177
Zyad Elkhadir, M. Benattou
{"title":"A truncated mean lp-LDA approach for intrusion detection system","authors":"Zyad Elkhadir, M. Benattou","doi":"10.1504/ijics.2021.10032177","DOIUrl":"https://doi.org/10.1504/ijics.2021.10032177","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}