Journal: IJICS

Volume 17, Issue 3/4

219 -- 230Jiwoong Kang, Jaehyun Park 0003. SoC-based abnormal ethernet packet detector with automatic rule-set generator
231 -- 260Youssef Taouil, El Bachir Ameur, Amine Benhfid, Rachid Harba, Hassan Douzi. Adaptive steganographic scheme using a variable matrix embedding
261 -- 284Youcef Ould Yahia, Samia Bouzefrane 0001, Hanifa Boucheneb, Soumya Banerjee 0002. A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment
285 -- 309Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour. Design and implementation of an ASIP for SHA-3 hash algorithm
310 -- 320Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu. Simple multi-scale human abnormal behaviour detection based on video
321 -- 331Yujie Wan, Baoxiang Du. A new image encryption algorithm based on cascaded chaos and Arnold transform
332 -- 350Ahmad Azab. The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows
351 -- 364Zhixin Zeng, Liang Chang 0003, Yi-Ning Liu 0002. A fault tolerance data aggregation scheme for fog computing
365 -- 404Khanh-Huu-The Dam, Tayssir Touili. Extracting malicious behaviours
405 -- 423Sumit Kumar Debnath, Nibedita Kundu, Tanmay Choudhury. Efficient post-quantum private set-intersection protocol
424 -- 437Bin Wu, Xiao Yi, Dongning Zhao. A node screening algorithm for wireless sensor network based on threshold measurement

Volume 17, Issue 1/2

1 -- 20G. Prabu Kanna, V. Vasudevan. An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage
21 -- 35Rangana De Silva, Iranga Navaratna, Malitha Kumarasiri, Janaka Alawatugoda, Chuah Chai Wen. On power analysis attacks against hardware stream ciphers
36 -- 56Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
57 -- 82Scott Brookes, Robert Denz, Martin Osterloh, Stephen Taylor. ExOShim: preventing memory disclosure using execute-only kernel code
83 -- 103B. Yamini, R. Sabitha. Image steganalysis: real-time adaptive colour image segmentation for hidden message retrieval and Matthew's correlation coefficient calculation
104 -- 118Hongfeng Zhu, Xintong Wang, Yeh-Cheng Chen, Xueying Wang. Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol
119 -- 146Taghreed AlKhodaidi, Adnan Gutub. Scalable shares generation to increase participants of counting-based secret sharing technique
147 -- 163Omar Alibrahim, Majid Malaika. Botract: abusing smart contracts and blockchain for botnet command and control
164 -- 178Shozab Khurshid, Avinash K. Shrivastava, Javaid Iqbal. Generalised multi release framework for fault determination with fault reduction factor
179 -- 203Toni Grzinic, Eduardo Blázquez González. Methods for automatic malware analysis and classification: a survey
204 -- 218Monika Shah. Detecting over-claim permissions and recognising dangerous permission in Android apps