International Journal of Information Security

Title Publication Date Language Citations
SpyDetector: An approach for detecting side-channel attacks at runtime2018/06/02English19
Secure universal designated verifier signature without random oracles2007/04/05English19
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings2009/02/10English18
Implementing public-key cryptography on passive RFID tags is practical2014/04/11English18
Efficient identity-based online/offline encryption and signcryption with short ciphertext2016/02/18English18
Network-based detection of Android malicious apps2016/08/01English18
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services2019/06/24English18
Measuring and visualizing cyber threat intelligence quality2020/03/02English18
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage2017/11/08English18
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks2016/09/19English18
A case study in hardware Trojan design and implementation2010/09/03English18
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information2019/06/03English17
Privacy-preserving authentication framework using bloom filter for secure vehicular communications2015/09/07English17
Secure localization with attack detection in wireless sensor networks2011/04/19English17
MAPAS: a practical deep learning-based android malware detection system2022/02/09English17
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model2019/03/27English16
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets2016/01/30English16
Security policy verification for multi-domains in cloud systems2013/07/17English16
A study of IoT malware activities using association rule learning for darknet sensor data2019/06/04English16
On the measurement of privacy as an attacker’s estimation error2012/12/11English16
Privacy-preserving authentication of trees and graphs2013/05/26English16
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.02021/02/27English15
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing2019/06/26English15
Efficient microaggregation techniques for large numerical data volumes2012/02/08English15
RORI-based countermeasure selection using the OrBAC formalism2013/08/31English15
SAT-based model-checking for security protocols analysis2007/09/21English15
A methodology to measure and monitor level of operational effectiveness of a CSOC2017/02/16English15
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications2019/04/19English15
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain2019/07/10English14
Privacy-enhanced architecture for smart metering2012/11/28English14