International Journal of Information and Computer Security
2024 Vol.23 No.1
Pages | Title and author(s) |
1-15 | Image tampering detection based on feature consistency attentionJunlin Gu; Yihan Xu; Juan Sun; Weiwei Liu DOI: 10.1504/IJICS.2024.136704 |
16-39 | On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphersTran Thi Luong; Hoang Dinh Linh DOI: 10.1504/IJICS.2024.136710 |
40-56 | Priority-based security-aware virtual machine allocation policyAparna Bhonde; Satish R. Devane DOI: 10.1504/IJICS.2024.136715 |
57-78 | Behavioural analysis and results of malware and ransomware using optimal behavioural feature setLaxmi B. Bhagwat; Balaji M. Patil DOI: 10.1504/IJICS.2024.136719 |
79-118 | AI-driven approach for robust real-time detection of zero-day phishing websitesThomas Nagunwa DOI: 10.1504/IJICS.2024.136735 |