Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
International Journal of Information Security
Title
Publication Date
Language
Citations
SpyDetector: An approach for detecting side-channel attacks at runtime
2018/06/02
English
19
Secure universal designated verifier signature without random oracles
2007/04/05
English
19
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
2009/02/10
English
18
Implementing public-key cryptography on passive RFID tags is practical
2014/04/11
English
18
Efficient identity-based online/offline encryption and signcryption with short ciphertext
2016/02/18
English
18
Network-based detection of Android malicious apps
2016/08/01
English
18
A trust management scheme for IoT-enabled environmental health/accessibility monitoring services
2019/06/24
English
18
Measuring and visualizing cyber threat intelligence quality
2020/03/02
English
18
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
2017/11/08
English
18
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
2016/09/19
English
18
A case study in hardware Trojan design and implementation
2010/09/03
English
18
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
2019/06/03
English
17
Privacy-preserving authentication framework using bloom filter for secure vehicular communications
2015/09/07
English
17
Secure localization with attack detection in wireless sensor networks
2011/04/19
English
17
MAPAS: a practical deep learning-based android malware detection system
2022/02/09
English
17
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
2019/03/27
English
16
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
2016/01/30
English
16
Security policy verification for multi-domains in cloud systems
2013/07/17
English
16
A study of IoT malware activities using association rule learning for darknet sensor data
2019/06/04
English
16
On the measurement of privacy as an attacker’s estimation error
2012/12/11
English
16
Privacy-preserving authentication of trees and graphs
2013/05/26
English
16
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
2021/02/27
English
15
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
2019/06/26
English
15
Efficient microaggregation techniques for large numerical data volumes
2012/02/08
English
15
RORI-based countermeasure selection using the OrBAC formalism
2013/08/31
English
15
SAT-based model-checking for security protocols analysis
2007/09/21
English
15
A methodology to measure and monitor level of operational effectiveness of a CSOC
2017/02/16
English
15
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
2019/04/19
English
15
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
2019/07/10
English
14
Privacy-enhanced architecture for smart metering
2012/11/28
English
14
«
‹ Pervious
Next ›
»