Journal: IJICS

Volume 15, Issue 4

328 -- 342Ningning Du, Chongxu Chen. Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing
343 -- 356Jianchao Zhao. Research on network security defence based on big data clustering algorithms
357 -- 372Nooh Bany Muhammad, Aya Kandil. Information protection of end users on the web: privacy issues and measures
373 -- 385Fengming Ma, Gang Sheng, Yuefeng Ma. E-commerce process reengineering for customer privacy protection
386 -- 399Zhixing Lin, Jian Yu, Shunfa Liu. The prediction of network security situation based on deep learning method
400 -- 410Parmod Kalia, Divya Bansal, Sanjeev Sofat. A hybrid approach for preserving privacy for real estate data

Volume 15, Issue 2/3

109 -- 140Gul Jabeen, Xi Yang, Ping Luo 0004. Vulnerability severity prediction model for software based on Markov chain
141 -- 162Dhruti Sharma, Devesh C. Jinwala. Multi-writer multi-reader conjunctive keyword searchable encryption
163 -- 182Nour El Houda Senoussi, Abdelmalik Bachir, Abdelmadjid Bouabdallah. On QoS-aware location privacy in mobile networks
183 -- 215Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin. A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network
216 -- 230Fagen Song, Tinghuai Ma. High utility differential privacy based on smooth sensitivity and individual ranking
231 -- 253Oladayo Olufemi Olakanmi. A lightweight security and privacy-aware routing scheme for energy-constraint multi-hop wireless sensor networks
254 -- 271Boyu Li 0003, Yanheng Liu, MingHai Wang, Geng Sun, Bin Li. Local anatomy for personalised privacy protection
272 -- 298Shahrzad Sedaghat. New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN
299 -- 321Junaid Akram, Majid Mumtaz, Gul Jabeen, Ping Luo 0004. DroidMD: an efficient and scalable Android malware detection approach at source code level

Volume 15, Issue 1

1 -- 17Geetika Kovelamudi, Bryan Watson, Jun Zheng 0003, Srinivas Mukkamala. On the adoption of scramble keypad for unlocking PIN-protected smartphones
18 -- 48Aafaf Ouaddah, Badr Bellaj. FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT
49 -- 66Waqas Haider, Muhammad Wasif Nisar, Tanzila Saba, Muhammad Sharif 0001, Raja Umair Haider, Nadeem Muhammad Bilal, Muhammad Attique Khan. A complexity reduced and reliable integrity protection for large relational data over clouds
67 -- 87Ting-Fang Cheng, Ying-Chin Chen, Zhu-Dao Song, Ngoc-Tu Huynh, Jung-San Lee. Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem
88 -- 107Jitesh Kumar Bhatia, Anand Singh Jalal. Pixel-based hybrid copy move image forgery detection using Zernike moments and auto colour correlogram