Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
International Journal of Information Security
Title
Publication Date
Language
Citations
Using contourlet transform and cover selection for secure steganography
2010/08/05
English
23
Double-spending prevention for Bitcoin zero-confirmation transactions
2018/11/24
English
23
Leveraging cyber threat intelligence for a dynamic risk framework
2019/04/08
English
23
Toward a blockchain-based framework for challenge-based collaborative intrusion detection
2020/02/11
English
23
Dynamic security labels and static information flow control
2007/03/13
English
23
Stealing PINs via mobile sensors: actual risk versus user perception
2017/04/07
English
22
A log mining approach for process monitoring in SCADA
2012/04/21
English
22
Delegation in role-based access control
2007/09/19
English
22
A blockchain-based medical data preservation scheme for telecare medical information systems
2020/08/30
English
22
Entropy analysis to classify unknown packing algorithms for malware detection
2016/05/04
English
22
Modeling contextual security policies
2007/11/06
English
22
EXAM: a comprehensive environment for the analysis of access control policies
2010/05/09
English
22
The IoT security gap: a look down into the valley between threat models and their implementation
2019/06/19
English
21
Structural analysis and detection of android botnets using machine learning techniques
2017/02/01
English
21
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
2017/06/01
English
21
An open virtual testbed for industrial control system security research
2012/04/22
English
21
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
2013/02/12
English
21
Computer security
2001/08/01
English
21
Shoulder-surfing-proof graphical password authentication scheme
2013/11/02
English
21
Dynamic malware detection and phylogeny analysis using process mining
2018/06/29
English
21
Malware detection using bilayer behavior abstraction and improved one-class support vector machines
2015/08/09
English
21
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
2006/03/08
English
21
Public key versus symmetric key cryptography in client–server authentication protocols
2021/03/08
English
20
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes
2017/08/07
English
20
Stochastic game net and applications in security analysis for enterprise network
2011/10/22
English
19
Protecting data privacy through hard-to-reverse negative databases
2007/07/24
English
19
A pairing-based cryptographic approach for data security in the cloud
2017/04/28
English
19
Hydras and IPFS: a decentralised playground for malware
2019/06/04
English
19
Modeling runtime enforcement with mandatory results automata
2014/04/24
English
19
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
2019/08/08
English
19
«
‹ Pervious
Next ›
»