Journal: IJICS

Volume 21, Issue 3/4

229 -- 261Yuvraj Singh Malhi, Virendra Singh Shekhawat. Two-level machine learning driven intrusion detection model for IoT environments
262 -- 292Justice Odoom, Xiaofang Huang, Richlove Samuel Soglo. JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract
293 -- 319Ranjeet Kumar Ranjan, Amit Singh. A comparative study of deep transfer learning models for malware classification using image datasets
320 -- 335N. D. Patel, B. M. Mehtre, Rajeev Wankar. Artificial neural network-based intrusion detection system using multi-objective genetic algorithm
336 -- 359Swapnil Sutar, Vikas Tiwari, Ajeet Singh. Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT
360 -- 382S. P. Ramya, Rajagopal Eswari. A shallow-based neural network model for fake news detection in social networks
383 -- 398U. Nandhini, S. V. N. Santhosh Kumar. A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things
399 -- 413Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy. A message encryption scheme inspired by Sudoku puzzle
414 -- 435Zareen Tasneem, Maria Afnan, Md. Arman Hossain, Md. Mahbubur Rahman, Samrat Kumar Dey. Performance evaluation of various deep convolutional neural network models through classification of malware
436 -- 456Kheira Lakel, Fatima Bendella. A bio-inspired algorithm for enhancing DNA cryptography

Volume 21, Issue 1/2

1 -- 18Monika Mathur, Nidhi Goel. FPGA implementation of AES encryptor based on rolled and masked approach
19 -- 34Jing Niu. Design of automatic monitoring system for network information security in cloud computing environment
35 -- 69K. Abhimanyu Kumar Patro, Bibhudendra Acharya. An efficient two-level image encryption system using chaotic maps
70 -- 81Sunil Gupta, Akansha Bansiya, Mansi Saini, Amuleek Sidhu. Blockchain-based EHR storage and access control system
82 -- 108Nureni Ayofe Azeez, Odejinmi Oluwatobi Samuel. A cyberstalking-free global network with artificial intelligence approach
109 -- 134K. K. Amith, H. A. Sanjay 0001, Ajay Mahadevan, K. Harshita, D. Eshwar, K. Aditya Shastry. Performance driven Hyperledger Fabric-based blockchain framework for mass e-voting in India
135 -- 161Thembekile O. Mayayise. BYOD security issues and controls framework: an outcome of a systematic literature review
162 -- 184Akanksha S. Mahajan, Pradnya K. Navale, Vaishnavi V. Patil, Vijay M. Khadse, Parikshit N. Mahalle. The hybrid framework of ensemble technique in machine learning for phishing detection
185 -- 204P. L. Chithra, R. Aparna. Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme
205 -- 228Jay Dave, Meghna Bhatt, Deep Pancholi. Secure proof of ownership for deduplicated cloud storage system