International Journal of Information and Computer Security
2024 Vol.23 No.3
Pages | Title and author(s) |
227-270 | SEGC-PP: structure entropy-based graph clustering algorithm for privacy preservation in social internet of thingsRahul; Venkatesh; M. Karthik; K.R. Venugopal; Satish B. Basapur DOI: 10.1504/IJICS.2024.138513 |
271-293 | A new hybrid chaotic system and its analysisMandeep Kaur Sandhu; Surender Singh; Manjit Kaur DOI: 10.1504/IJICS.2024.138493 |
294-321 | Re-evaluation of PhishI game and its utilisation in eliciting security requirementsRubia Fatima; Affan Yasin; Lin Liu; Jianmin Wang DOI: 10.1504/IJICS.2024.138492 |
322-337 | On the performance of AES algorithm variantsMohammed N. Alenezi; Haneen Alabdulrazzaq; Hajed M. Alhatlani; Faisal A. Alobaid DOI: 10.1504/IJICS.2024.138494 |
338-347 | Technique for detecting hardware-based Trojans using a convolutional neural networkC. Ravichandran; T.J. Nagalakshmi; P. Shyamala Bharathi; C. Sivakumaran DOI: 10.1504/IJICS.2024.138495 |