
International Journal of Information and Computer Security
2025 Vol.26 No.4
| Pages | Title and author(s) |
| 291-315 | An effective approach for fingerprint template protection based on CiKX transform and Tanimoto similarity measureK. Kanagalakshmi; Joycy K. Antony DOI: 10.1504/IJICS.2025.146544 |
| 316-331 | Optimising the detection of metamorphic malwares using ensemble learning techniqueVinay Kumar; Abhishek Vaish DOI: 10.1504/IJICS.2025.146527 |
| 332-371 | A survey: on detection and prevention techniques of SQL injection attacksAnwesha Kashyap; Angshuman Jana DOI: 10.1504/IJICS.2025.146528 |
| 372-393 | HP-CP-ABE scheme against collusion attacks under an attribute-key security modelKeshuo Sun; Haiying Gao; Chao Ma; Bin Hu; Xiufeng Zhao DOI: 10.1504/IJICS.2025.146529 |
| 394-421 | Entropy dragonfly optimisation-based cluster head selection and deep learning clone node detection for wireless sensor networkK. Jane Nithya; K. Shyamala DOI: 10.1504/IJICS.2025.146526 |