首页 > 最新文献

International Journal of Information and Computer Security最新文献

英文 中文
Sentiment Analysis in Social network data using Multilayer Perceptron Neural Network with Hill-Climbing Meta-Heuristic Optimization 基于爬山元启发式优化的多层感知器神经网络在社交网络数据中的情感分析
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10049056
Domnic Sandanam, Samson Ebenezar Uthirapathy
{"title":"Sentiment Analysis in Social network data using Multilayer Perceptron Neural Network with Hill-Climbing Meta-Heuristic Optimization","authors":"Domnic Sandanam, Samson Ebenezar Uthirapathy","doi":"10.1504/ijics.2022.10049056","DOIUrl":"https://doi.org/10.1504/ijics.2022.10049056","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Fuzzy based Intelligent Intrusion Detection System for Internet of Things 基于模糊的物联网智能入侵检测系统综述
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046235
S. Svn, Nandhini U
{"title":"A Comprehensive Survey on Fuzzy based Intelligent Intrusion Detection System for Internet of Things","authors":"S. Svn, Nandhini U","doi":"10.1504/ijics.2022.10046235","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046235","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ciphertext-Policy Attribute-Based Delay Encryption cipher - policy基于属性的延迟加密
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046931
Lijiao Chen, Kewei Lv
{"title":"Ciphertext-Policy Attribute-Based Delay Encryption","authors":"Lijiao Chen, Kewei Lv","doi":"10.1504/ijics.2022.10046931","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046931","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JPBlock: Augmenting Security of Current Journal and Paper Publication Processes using Blockchain and Smart Contract JPBlock:利用区块链和智能合约增强当前期刊和论文出版过程的安全性
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047376
Hua Xiaofang, R. S. Soglo, J. Odoom
{"title":"JPBlock: Augmenting Security of Current Journal and Paper Publication Processes using Blockchain and Smart Contract","authors":"Hua Xiaofang, R. S. Soglo, J. Odoom","doi":"10.1504/ijics.2022.10047376","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047376","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Message Encryption Scheme inspired by Sudoku Puzzle (MESP) 一种受数独谜(MESP)启发的消息加密方案
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047993
Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh
{"title":"A Message Encryption Scheme inspired by Sudoku Puzzle (MESP)","authors":"Mohammed Abbas Fadhil Al Husainy, Hamza Abbass Al Sewadi, S. Masadeh","doi":"10.1504/ijics.2022.10047993","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047993","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureAuthKey: Design and Evaluation of a Lightweight Key Agreement technique for Smart Home Applications SecureAuthKey:用于智能家居应用的轻量级密钥协议技术的设计和评估
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10042826
J. NaveenKumar, Sandip Thite
{"title":"SecureAuthKey: Design and Evaluation of a Lightweight Key Agreement technique for Smart Home Applications","authors":"J. NaveenKumar, Sandip Thite","doi":"10.1504/ijics.2022.10042826","DOIUrl":"https://doi.org/10.1504/ijics.2022.10042826","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher TRIVIUM流密码软件实现中的相关功率分析攻击
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10046026
Chuah Chai Wen, Malitha Kumarasiri, Iranga Navaratna, Rangana De Silva, Janaka Alawatugoda
{"title":"Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher","authors":"Chuah Chai Wen, Malitha Kumarasiri, Iranga Navaratna, Rangana De Silva, Janaka Alawatugoda","doi":"10.1504/ijics.2022.10046026","DOIUrl":"https://doi.org/10.1504/ijics.2022.10046026","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width 基于高斯核宽度的最小二乘支持向量机的网络流量预测
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047401
Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke
{"title":"Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width","authors":"Ruey-Shun Chen, Shanshan Ji, Jyh-haw Yeh, Gang Ke","doi":"10.1504/ijics.2022.10047401","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047401","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key 带约束密钥的RSA大解密指数的改进密码分析
Q3 Engineering Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10026019
Luo Ping, Majid Mumtaz
{"title":"An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key","authors":"Luo Ping, Majid Mumtaz","doi":"10.1504/ijics.2021.10026019","DOIUrl":"https://doi.org/10.1504/ijics.2021.10026019","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A truncated mean lp-LDA approach for intrusion detection system 入侵检测系统的截断均值lp-LDA方法
Q3 Engineering Pub Date : 2021-01-01 DOI: 10.1504/ijics.2021.10032177
Zyad Elkhadir, M. Benattou
{"title":"A truncated mean lp-LDA approach for intrusion detection system","authors":"Zyad Elkhadir, M. Benattou","doi":"10.1504/ijics.2021.10032177","DOIUrl":"https://doi.org/10.1504/ijics.2021.10032177","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information and Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1