Journal: IJICS

Volume 17, Issue 3/4

219 -- 230Jiwoong Kang, Jaehyun Park 0003. SoC-based abnormal ethernet packet detector with automatic rule-set generator
231 -- 260Youssef Taouil, El Bachir Ameur, Amine Benhfid, Rachid Harba, Hassan Douzi. Adaptive steganographic scheme using a variable matrix embedding
261 -- 284Youcef Ould Yahia, Samia Bouzefrane 0001, Hanifa Boucheneb, Soumya Banerjee 0002. A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment
285 -- 309Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour. Design and implementation of an ASIP for SHA-3 hash algorithm
310 -- 320Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu. Simple multi-scale human abnormal behaviour detection based on video
321 -- 331Yujie Wan, Baoxiang Du. A new image encryption algorithm based on cascaded chaos and Arnold transform
332 -- 350Ahmad Azab. The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows
351 -- 364Zhixin Zeng, Liang Chang 0003, Yi-Ning Liu 0002. A fault tolerance data aggregation scheme for fog computing
365 -- 404Khanh-Huu-The Dam, Tayssir Touili. Extracting malicious behaviours
405 -- 423Sumit Kumar Debnath, Nibedita Kundu, Tanmay Choudhury. Efficient post-quantum private set-intersection protocol
424 -- 437Bin Wu, Xiao Yi, Dongning Zhao. A node screening algorithm for wireless sensor network based on threshold measurement