International Journal of Information and Computer Security (IJICS)

International Journal of Information and Computer Security

2022 Vol.17 No.3/4


Pages Title and author(s)
219-230SoC-based abnormal ethernet packet detector with automatic rule-set generator
Jiwoong Kang; Jaehyun Park
DOI: 10.1504/IJICS.2022.10046345
231-260Adaptive steganographic scheme using a variable matrix embedding
Youssef Taouil; El Bachir Ameur; Amine Benhfid; Rachid Harba; Hassan Douzi
DOI: 10.1504/IJICS.2019.10025032
261-284A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment
Youcef Ould-Yahia; Samia Bouzefrane; Hanifa Boucheneb; Soumya Banerjee
DOI: 10.1504/IJICS.2022.10046346
285-309Design and implementation of an ASIP for SHA-3 hash algorithm
Yavar Safaei Mehrabani; Roghayeh Ataie; Mohammad Hossein Shafiabadi; Abolghasem Ghasempour
DOI: 10.1504/IJICS.2019.10033341
310-320Simple multi-scale human abnormal behaviour detection based on video
Gang Ke; Ruey-Shun Chen; Yeh-Cheng Chen; Yu-Xi Hu; Tsu-Yang Wu
DOI: 10.1504/IJICS.2022.10046347
321-331A new image encryption algorithm based on cascaded chaos and Arnold transform
Yujie Wan; Baoxiang Du
DOI: 10.1504/IJICS.2022.10046348
332-350The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows
Ahmad Azab
DOI: 10.1504/IJICS.2020.10026851
351-364A fault tolerance data aggregation scheme for fog computing
Zhixin Zeng; Liang Chang; Yining Liu
DOI: 10.1504/IJICS.2022.10046349
365-404Extracting malicious behaviours
Khanh Huu The Dam; Tayssir Touili
DOI: 10.1504/IJICS.2022.10046350
405-423Efficient post-quantum private set-intersection protocol
Sumit Kumar Debnath; Nibedita Kundu; Tanmay Choudhury
DOI: 10.1504/IJICS.2022.10046351
424-437A node screening algorithm for wireless sensor network based on threshold measurement
Bin Wu; Xiao Yi; Dongning Zhao
DOI: 10.1504/IJICS.2022.10046352