International Journal of Information and Computer Security
2014 Vol.6 No.3
Pages | Title and author(s) |
199-240 | Detecting malicious files using non-signature-based methodsP. Vinod; Vijay Laxmi; Manoj Singh Gaur; Grijesh Chauhan DOI: 10.1504/IJICS.2014.066646 |
241-269 | SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social networkMohamed Amine Ferrag; Mehdi Nafa; Salim Ghanemi DOI: 10.1504/IJICS.2014.066650 |
270-285 | Vulnerability distribution scoring for software product security assessmentHassan Rasheed DOI: 10.1504/IJICS.2014.066653 |
286-305 | Identity-based broadcast encryption for multi-privileged groups using Chinese remainder theoremA. Muthulakshmi; R. Anitha DOI: 10.1504/IJICS.2014.066661 |