Journal: IJICS

Volume 4, Issue 4

295 -- 315Julian L. Rrushi. Anomaly detection via statistical learning in industrial communication networks
316 -- 331Defa Hu, Juanjuan Luo. Digital fingerprinting: problems and solutions
332 -- 344Mahmood Al-khassaweneh. Image encryption method based on using least square error techniques at the decryption stage
345 -- 364Adesina Simon Sodiya, A. Afolorunso, Omoniyi Paul Ogunderu. A countermeasure algorithm for password guessing attacks
365 -- 388Khaled Gaaloul, Henderik Alex Proper, Ehtesham Zahoor, François Charoy, Claude Godart. A logical framework for reasoning about delegation policies in workflow management systems

Volume 4, Issue 3

199 -- 214P. Karthigaikumar, K. Baskaran, K. Jaraline Kirubavathy. Low power implementation of audio watermarking using chirp spread spectrum technique
215 -- 233Jing Jin, Gail-Joon Ahn. Assured resource sharing in Grid environments
234 -- 263Abdelrahman Desoky. Sumstega: summarisation-based steganography methodology
264 -- 275Olakanmi O. Oladayo. RC42's innovative way for data security in wireless data communication
276 -- 294Zhanshan Sam Ma. Frailty modelling for risk analysis in network security and survivability

Volume 4, Issue 2

99 -- 117Philip Woodall, Pearl Brereton. A systematic literature review of inference strategies
118 -- 151Vijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya. A unified index structure for efficient enforcement of spatiotemporal authorisations
152 -- 163Defa Hu, Qiaoliang Li. Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
164 -- 197Abdelrahman Desoky. Comprehensive linguistic steganography survey

Volume 4, Issue 1

1 -- 8Che Wun Chiou, Fu-Hua Chou, Yun-Chi Yeh. Speeding up Euclid's GCD algorithm with no magnitude comparisons
9 -- 23Shiyan Hu. A secure partition-based document image watermarking scheme
24 -- 29Amit K. Awasthi. Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
30 -- 51Ping Wang, Lei Wu, Ryan Cunningham, Cliff C. Zou. Honeypot detection in advanced botnet attacks
52 -- 75Li Qin, Vijayalakshmi Atluri. Semantics-aware security policy specification for the semantic web data
76 -- 97Zhanshan (Sam) Ma. An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis