researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJICS
Home
Index
Info
Volume
Volume
4
, Issue
4
295
--
315
Julian L. Rrushi
.
Anomaly detection via statistical learning in industrial communication networks
316
--
331
Defa Hu
,
Juanjuan Luo
.
Digital fingerprinting: problems and solutions
332
--
344
Mahmood Al-khassaweneh
.
Image encryption method based on using least square error techniques at the decryption stage
345
--
364
Adesina Simon Sodiya
,
A. Afolorunso
,
Omoniyi Paul Ogunderu
.
A countermeasure algorithm for password guessing attacks
365
--
388
Khaled Gaaloul
,
Henderik Alex Proper
,
Ehtesham Zahoor
,
François Charoy
,
Claude Godart
.
A logical framework for reasoning about delegation policies in workflow management systems
Volume
4
, Issue
3
199
--
214
P. Karthigaikumar
,
K. Baskaran
,
K. Jaraline Kirubavathy
.
Low power implementation of audio watermarking using chirp spread spectrum technique
215
--
233
Jing Jin
,
Gail-Joon Ahn
.
Assured resource sharing in Grid environments
234
--
263
Abdelrahman Desoky
.
Sumstega: summarisation-based steganography methodology
264
--
275
Olakanmi O. Oladayo
.
RC42's innovative way for data security in wireless data communication
276
--
294
Zhanshan Sam Ma
.
Frailty modelling for risk analysis in network security and survivability
Volume
4
, Issue
2
99
--
117
Philip Woodall
,
Pearl Brereton
.
A systematic literature review of inference strategies
118
--
151
Vijayalakshmi Atluri
,
Qi Guo
,
Heechang Shin
,
Jaideep Vaidya
.
A unified index structure for efficient enforcement of spatiotemporal authorisations
152
--
163
Defa Hu
,
Qiaoliang Li
.
Bandwidth efficient asymmetric fingerprinting based on one-out-of-two oblivious transfer
164
--
197
Abdelrahman Desoky
.
Comprehensive linguistic steganography survey
Volume
4
, Issue
1
1
--
8
Che Wun Chiou
,
Fu-Hua Chou
,
Yun-Chi Yeh
.
Speeding up Euclid's GCD algorithm with no magnitude comparisons
9
--
23
Shiyan Hu
.
A secure partition-based document image watermarking scheme
24
--
29
Amit K. Awasthi
.
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
30
--
51
Ping Wang
,
Lei Wu
,
Ryan Cunningham
,
Cliff C. Zou
.
Honeypot detection in advanced botnet attacks
52
--
75
Li Qin
,
Vijayalakshmi Atluri
.
Semantics-aware security policy specification for the semantic web data
76
--
97
Zhanshan (Sam) Ma
.
An integrated approach to network intrusion detection with block clustering analysis, generalised logistic regression and linear discriminant analysis