
International Journal of Information and Computer Security
2026 Vol.29 No.1
| Pages | Title and author(s) |
| 1-19 | Designing secure image retrieval with SKDTree and security protocolsDawei Yin; Lihong Zhang; Kai Yan DOI: 10.1504/IJICS.2026.150534 |
| 20-43 | Weighted chi-squared and LightGBM-based bagging for enhanced intrusion detection in edge IoMT networksAbdelkarim Ait Temghart; Hmad Zennou; Mbarek Marwan; Mohamed Baslam DOI: 10.1504/IJICS.2026.150537 |
| 44-62 | Information privacy protection in malicious node detection in wireless sensor networksTao Chen DOI: 10.1504/IJICS.2026.150535 |
| 63-86 | A novel worm propagation model based on SDN dynamic honeypotsYafei Bie; Fengjiao Li; Jianguo Ren DOI: 10.1504/IJICS.2026.150533 |
| 87-111 | CASA: a comprehensive automatic web servers auditAssadarat Khurat; Dolvara Gunatilaka; Wasutum Kethom DOI: 10.1504/IJICS.2026.150538 |