
International Journal of Information and Computer Security
2025 Vol.27 No.4
| Pages | Title and author(s) |
| 423-436 | A novel mutual quantum identity authentication of two-party protocol with chaotic systemsLu Zhang; Chaonan Wang; Yan Sun; Hongfeng Zhu DOI: 10.1504/IJICS.2025.148098 |
| 437-464 | DDoS attack detection in blockchain network layer using dual attention based dense convolutional gated recurrent unitRohidas Balu Sangore; Manoj Eknath Patil DOI: 10.1504/IJICS.2025.148108 |
| 465-487 | A context-based password change enforcement modelAdesina S. Sodiya; Akinkunmi A. Owolabi; Saidat A. Onashoga; Enoch O. Oluwumi DOI: 10.1504/IJICS.2025.148110 |
| 488-514 | Unveiling the digital fingerprints: analysis of internet attacks based on website fingerprintsBlerim Rexha; Arbena Musa; Kamer Vishi; Edlira Martiri DOI: 10.1504/IJICS.2025.148112 |
| 515-535 | Integrating geolocation intelligence with ensemble machine learning models for enhanced darknet traffic classificationNgaira Mandela; Nilay R. Mistry DOI: 10.1504/IJICS.2025.148111 |