Journal: IJICS

Volume 6, Issue 1

1 -- 11R. Sakthivel, M. Vanitha, Harish M. Kittur. Low power high throughput reconfigurable stream cipher hardware VLSI architectures
12 -- 50Suvrojit Das, Debayan Chatterjee, Debidas Ghosh, Narayan C. Debnath. Extracting the system call identifier from within VFS: a kernel stack parsing-based approach
51 -- 62P. M. Siva Raja, E. Baburaj. Genetic algorithms based data hiding scheme for digital images with LSBMR
63 -- 92Ahmed AlEroud, George Karabatis, Prayank Sharma, Peng He. Context and semantics for detection of cyber attacks
93 -- 107Achilleas Tsitroulis, Dimitris Lampoudis, Emmanuel Tsekleves. Exposing WPA2 security protocol vulnerabilities