Sample articles
You can read all of these full-text articles free of charge - click ![]()

International Journal of Information and Computer Security
| Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
| AI-driven approach for robust real-time detection of zero-day phishing websites | Thomas Nagunwa | Vol.23 No.1 | 79-118 | |
| Behavioural analysis and results of malware and ransomware using optimal behavioural feature set | Laxmi B. Bhagwat; Balaji M. Patil | Vol.23 No.1 | 57-78 | |
| Priority-based security-aware virtual machine allocation policy | Aparna Bhonde; Satish R. Devane | Vol.23 No.1 | 40-56 | |
| On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers | Tran Thi Luong; Hoang Dinh Linh | Vol.23 No.1 | 16-39 | |
| Image tampering detection based on feature consistency attention | Junlin Gu; Yihan Xu; Juan Sun; Weiwei Liu | Vol.23 No.1 | 1-15 |