
International Journal of Information and Computer Security
2025 Vol.27 No.2
| Pages | Title and author(s) |
| 159-211 | A comprehensive analysis of security overview for network slicing of 5G networksMd. Zahirul Islam; Syed Md. Galib; Md. Humaun Kabir DOI: 10.1504/IJICS.2025.146886 |
| 212-239 | Mean black widow-based optimisation feature selection and enhanced kernel-based SVM classifier for cyberbullying twitter dataM. Menaka; P. Sujatha DOI: 10.1504/IJICS.2025.146880 |
| 240-260 | StealthGuard: a new framework of privacy-preserving human action recognitionGazi Mohammad Ismail; Xueping Zhang; Junxiang Yang; Bin Li DOI: 10.1504/IJICS.2025.146882 |
| 261-284 | Prevention of cyber attacks and real-time social media spam detection and sentiment analysis using recurrent self-adaptive windowing approachShankar M. Patil; Sonali Mhatre; Bhawana Dakhare; Gurunath T. Chavan DOI: 10.1504/IJICS.2025.146881 |
| 285-305 | Proving multiplicative relations for different lattice commitmentsMengfan Wang; Guifang Huang; Dong Fang; Lei Hu DOI: 10.1504/IJICS.2025.146883 |