International Journal of Information and Computer Security
2016 Vol.8 No.3
Pages | Title and author(s) |
205-220 | Design of a tweakable image encryption algorithm using chaos-based schemaAssia Beloucif; Oussama Noui; Lemnouar Noui DOI: 10.1504/IJICS.2016.079183 |
221-240 | Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networksFuad A. Ghaleb; Anazida Zainal; Murad A. Rassam DOI: 10.1504/IJICS.2016.079184 |
241-257 | Anomaly-based network intrusion detection through assessing feature association impact scaleJyothsna Veeramreddy; Rama Prasad V. Vaddella DOI: 10.1504/IJICS.2016.079185 |
258-271 | Investigation on defected ground-plane structures to improve isolation and correlation in multi-band MIMO antennaM. Swagath Babu; G. Idayachandran; A. Rajesh; T. Shankar; R. Nakkeeran DOI: 10.1504/IJICS.2016.079186 |
272-307 | A qualitative framework for evaluating buffer overflow protection mechanismsN. Raghu Kisore DOI: 10.1504/IJICS.2016.079187 |