Sample issue


You can read all of these full-text articles free of charge - click Free access


International Journal of Information and Computer Security (IJICS)

Title Author(s) Vol. and Issue nos. Page nos. Full-text article
Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative wayAmit Kr. Gupta; Jyotsna Kr. Mandal; Indrajit BhattacharyaVol.9 No.1/2130-155Free access
Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services Jothi Rangasamy; Lakshmi Kuppusamy; Gopi Krishnan; VelmuruganVol.9 No.1/2114-129Free access
A secure mobile commerce framework based on community cloudHisham AlsaghierVol.9 No.1/2100-113Free access
Hierarchical detection of insider attacks in cloud computing systemsOmar M. Al-Jarrah; Moath Al-Ayoub; Yaser JararwehVol.9 No.1/285-99Free access
Virtual machine securityArif KhanVol.9 No.1/249-84Free access
Trust delegation-based secure mobile cloud computing frameworkLo'ai A. Tawalbeh; Fadi Ababneh; Yaser Jararweh; Fahd AlDosariVol.9 No.1/236-48Free access
Robust watermarking technique using back propagation neural network: a security protection mechanism for social applicationsAditi Zear; Amit Kumar Singh; Pardeep KumarVol.9 No.1/220-35Free access
Dynamic weighted VM load balancing for cloud-analystAhmad M. ManasrahVol.9 No.1/25-19Free access