Journal: IJICS

Volume 26, Issue 1/2

1 -- 21Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware
22 -- 40Zeng Shou, Yue-bin Di, Xiao Ma, Rui-chao Xu, Heqiu Chai, Long Yin. The APT family classification system based on APT call sequences and attention mechanism
41 -- 67Miao He, Nurmamat Helil. A lattice-based CP-ABE scheme with immediate attribute revocation
68 -- 90Moumita Sahoo, Sabyasachi Samanta, Soumen Ghosh. An ensemble classification model for improved performance of phishing detection system
91 -- 108Junjing Zhu, HongGang Lin. Method for botnet detection with small labelled samples based on graph neural network
109 -- 146Xian Guo, Kai Zheng, Yongbo Jiang, Jing Wang, Junli Fang 0001. Security-enhanced machine learning framework based on PATE
147 -- 158Orkhan Valikhanli. Detection of malware in ground control stations of unmanned aerial vehicles based on image processing
159 -- 177Nabila Sehito, Shouyi Yang, Raja Sohail Ahmed Larik, Ghulam Raza, Safi Ullah. Analysis of outage probability and optimising secrecy capacity in physical layer security based on wireless cooperative relay networks