Journal: IJICS

Volume 5, Issue 4

251 -- 274Lawrence Teo, Gail-Joon Ahn. Extensible policy framework for heterogeneous network environments
275 -- 289Anshu Tripathi, Umesh Kumar Singh. Evaluation of severity index of vulnerability categories
290 -- 300Mahmood Al-khassaweneh, Shefa Tawalbeh. A value transformation and random permutation-based coloured image encryption technique
301 -- 333Anup C. Sharma, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney, William L. Sousan. A social dimensional cyber threat model with formal concept analysis and fact-proposition inference
334 -- 358Zhanshan (Sam) Ma. First passage time and first passage percolation models for analysing network resilience and effective strategies in strategic information warfare research: a brief survey and perspective