International Journal of Information Security

Title Publication Date Language Citations
Using contourlet transform and cover selection for secure steganography2010/08/05English23
Double-spending prevention for Bitcoin zero-confirmation transactions2018/11/24English23
Leveraging cyber threat intelligence for a dynamic risk framework2019/04/08English23
Toward a blockchain-based framework for challenge-based collaborative intrusion detection2020/02/11English23
Dynamic security labels and static information flow control2007/03/13English23
Stealing PINs via mobile sensors: actual risk versus user perception2017/04/07English22
A log mining approach for process monitoring in SCADA2012/04/21English22
Delegation in role-based access control2007/09/19English22
A blockchain-based medical data preservation scheme for telecare medical information systems2020/08/30English22
Entropy analysis to classify unknown packing algorithms for malware detection2016/05/04English22
Modeling contextual security policies2007/11/06English22
EXAM: a comprehensive environment for the analysis of access control policies2010/05/09English22
The IoT security gap: a look down into the valley between threat models and their implementation2019/06/19English21
Structural analysis and detection of android botnets using machine learning techniques2017/02/01English21
ZombieCoin 2.0: managing next-generation botnets using Bitcoin2017/06/01English21
An open virtual testbed for industrial control system security research2012/04/22English21
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts2013/02/12English21
Computer security2001/08/01English21
Shoulder-surfing-proof graphical password authentication scheme2013/11/02English21
Dynamic malware detection and phylogeny analysis using process mining2018/06/29English21
Malware detection using bilayer behavior abstraction and improved one-class support vector machines2015/08/09English21
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design2006/03/08English21
Public key versus symmetric key cryptography in client–server authentication protocols2021/03/08English20
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes2017/08/07English20
Stochastic game net and applications in security analysis for enterprise network2011/10/22English19
Protecting data privacy through hard-to-reverse negative databases2007/07/24English19
A pairing-based cryptographic approach for data security in the cloud2017/04/28English19
Hydras and IPFS: a decentralised playground for malware2019/06/04English19
Modeling runtime enforcement with mandatory results automata2014/04/24English19
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain2019/08/08English19