Journal: IJICS

Volume 16, Issue 1/2

1 -- 19Lakshmi H. R., Surekha Borra. Digital video watermarking tools: an overview
20 -- 32Akram Boukhamla, Javier Coronel Gaviro. CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed
33 -- 50Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi. Empirical risk assessment of attack graphs using time to compromise framework
51 -- 62Izzat Alsmadi, Ahmed AlEroud, Ahmad A. Saifan. Fault-based testing for discovering SQL injection vulnerabilities in web applications
63 -- 83Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang. Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
84 -- 102Yuchen Cao, Yongbin Zhou, Hailong Zhang 0001. Multi-channel time-frequency fusion attacks
103 -- 119Geng Wang. Time-based key management in attribute-based encryption using piecewise key generation
120 -- 136Chetna Singhal, A. Rajesh. Heuristic trust-based neighbour centric routing for CPS-enabled wireless sensor and ad hoc network
137 -- 149Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, Shade O. Kuyoro. Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study
150 -- 169Zhanwei Cui, Jianping Zeng, Chengrong Wu. A layer-crossing multi-factor and dynamic security model over a moving target defence
170 -- 191Xiao Luo, Chengchao Yao, A. Nur Zincir-Heywood. Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework
192 -- 206Adarsh Anand, Navneet Bhatt, Omar Hussain Alhazmi. Vulnerability discovery modelling: a general framework