Journal: IJICS

Volume 24, Issue 3/4

155 -- 187Ruixia Yan, Yuan Jia, Lin Gao. A robust feature points-based screen-shooting resilient watermarking scheme
188 -- 213Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher. An image encryption using hybrid grey wolf optimisation and chaotic map
214 -- 235Kumari Suniti Singh, Harsh Vikram Singh. Robust watermarking of medical images using SVM and hybrid DWT-SVD
236 -- 257Sunil Kumar Patel, Saravanan Chandran, Purushottam Kumar. Secure digital academic certificate verification system using blockchain
258 -- 283Xiangning Liang, Pushpendu Kar. Robust and secure file transmission through video streaming using steganography and blockchain
284 -- 321Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta. Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review
322 -- 337Ravi Sheth, Chandresh Parekha. An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning
338 -- 360Joon Son, Essia Hamouda, Garo Pannosian, Vijay Bhuse. Data dissemination and policy enforcement in multi-level secure multi-domain environments

Volume 24, Issue 1/2

5 -- 27Lenin Narengbam, Shouvik Dey. Anomaly-based intrusion detection system using Harris Hawks optimisation with a sigmoid neuron network
28 -- 43Lijun Deng. Multi-agent secure payment model of e-commerce based on blockchain perspective
44 -- 59Jianhua Liu, Huijie Ma. The optimisation of enterprise internet of things security management system under digital economy
60 -- 79Zhezhou Li, Xiangrong Kong, Xiaozhen Jiang. The relationship between digital information security of the supply chain and enterprise development
80 -- 97Yongling Zhang, Xuandong Zhang, Jinlong Song. Enterprise intelligent financial sharing mechanism in the security environment of the internet of things
98 -- 116Jingfeng Jiang, Yongyi Wu. Analysis of competitive differences in the bilateral platforms of the digital economy using artificial intelligence and network data security
117 -- 136Rachid Rimani, Adda Ali-Pacha, Naima Hadj-Said. Encryption by block based on rekeying and inter-intra pixel permutation
137 -- 153Jianxin Xiong, Xianping Wang. Library data protection and threat detection system based on network security