International Journal of Information and Computer Security
2014 Vol.6 No.2
Pages | Title and author(s) |
109-132 | Attribute-based group signature without random oracles with attribute anonymitySyed Taqi Ali; B.B. Amberker DOI: 10.1504/IJICS.2014.065162 |
133-142 | Secure transmission of morphed stego keys over internet using IP steganographyAnant M. Bagade; Sanjay N. Talbar DOI: 10.1504/IJICS.2014.065164 |
143-178 | Towards ontological approach to eliciting risk-based security requirementsOluwasefunmi 'Tale Arogundade; Zhi Jin; Xiaoguang Yang DOI: 10.1504/IJICS.2014.065168 |
179-197 | Malware detection using augmented naive Bayes with domain knowledge and under presence of class noiseIsmahani Ismail; Muhammad Nadzir Marsono; Sulaiman Mohd Nor DOI: 10.1504/IJICS.2014.065173 |