
International Journal of Information and Computer Security
2025 Vol.28 No.3
| Pages | Title and author(s) |
| 265-303 | Federated learning: frameworks, optimisation algorithms, security threats and defencesHongYun Cai; Yu Zhang; ShiYun Wang; MeiLing Zhang; Ao Zhao DOI: 10.1504/IJICS.2025.149454 |
| 304-326 | Magnitude-based nonlinear steganography approach with image using assisted prediction from artificial neural networksSabyasachi Samanta; Sudipta Roy; Dipak Kumar Jana DOI: 10.1504/IJICS.2025.149447 |
| 327-347 | Deep learning prediction model for DoS and SQL injection attack in SDNRejo Rajan Mathew; Amarsinh Vidhate DOI: 10.1504/IJICS.2025.149446 |
| 348-376 | Explainable C/C++ vulnerability detectionZhen Huang; Amy Aumpansub; Sameer Shaik DOI: 10.1504/IJICS.2025.149450 |
| 377-401 | EATIS: an environmentally adaptive traffic identification system for open world networksYulong Liang; Fei Wang; Shuhui Chen; Yunjiao Bo; Na Wang DOI: 10.1504/IJICS.2025.149448 |