Journal: IET Information Security

Volume 9, Issue 6

305 -- 312Khaled Salah, Aslam Chaudary. Modelling and analysis of rule-based network security middleboxes
313 -- 320Suleiman Y. Yerima, Sakir Sezer, Igor Muttik. High accuracy android malware detection using ensemble learning
321 -- 327Zhenqing Shi, Bin Zhang 0003, Dengguo Feng. Practical-time related-key attack on Hummingbird-2
328 -- 333Riham AlTawy, Amr M. Youssef. Watch your constants: malicious Streebog
334 -- 343Walid I. Khedr, Mahmoud I. Abdalla, Asmaa A. Elsheikh. Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
344 -- 353Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu. Exploring risk flow attack graph for security risk assessment
354 -- 364Gaoli Wang, Hongbo Yu. Improved cryptanalysis on RIPEMD-128
365 -- 373Ali Al-Haj, Gheith A. Abandah, Noor Hussein. Crypto-based algorithms for secured medical image transmission
374 -- 379Wei Wang 0012, Yongzhong He, Jiqiang Liu, Sylvain Gombault. Constructing important features from massive network traffic for lightweight intrusion detection
380 -- 386Lin Cheng, Qiaoyan Wen. Cryptanalysis and improvement of a certificateless partially blind signature