Journal: IJICS

Volume 26, Issue 4

291 -- 315K. Kanagalakshmi, Joycy K. Antony. An effective approach for fingerprint template protection based on CiKX transform and Tanimoto similarity measure
316 -- 331Vinay Kumar, Abhishek Vaish. Optimising the detection of metamorphic malwares using ensemble learning technique
332 -- 371Anwesha Kashyap, Angshuman Jana. A survey: on detection and prevention techniques of SQL injection attacks
372 -- 393Keshuo Sun, Haiying Gao, Chao Ma 0016, Bin Hu 0011, Xiufeng Zhao. HP-CP-ABE scheme against collusion attacks under an attribute-key security model
394 -- 421K. Jane Nithya, K. Shyamala. Entropy dragonfly optimisation-based cluster head selection and deep learning clone node detection for wireless sensor network