Journal: IJICS

Volume 9, Issue 4

271 -- 287Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia. Data hiding using lifting scheme and genetic algorithm
288 -- 301Vasudha Arora, S. S. Tyagi. Update enabled multi-keyword searchable encryption scheme for secure data outsourcing
302 -- 323Rima Djellab, Mohamed Benmohammed. A novel quantum distributed key management protocol for ring-organised group
324 -- 336Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah. A trust-based approach for securing data communication in delay tolerant networks
337 -- 360Abes Dabir, AbdelRahman Abdou, Ashraf Matrawy. A survey on forensic event reconstruction systems
361 -- 386K. Anusha, E. Sathiyamoorthy. MAM-ISSIDS: multi-agent model-based intelligent and self-sharing intrusion detection system for distributed network

Volume 9, Issue 3

157 -- 179Lei Zeng, Hui Chen, Yang Xiao 0001. Accountable administration in operating systems
180 -- 211Shruti Jaiswal, Daya Gupta. Security engineering methods - in-depth analysis
212 -- 228Sofia-Anna Menesidou, Vasilios Katos. Opportunistic key management in delay tolerant networks
229 -- 249Reza Montasari. A standardised data acquisition process model for digital forensic investigations
250 -- 270Prathuri Jhansi Rani, S. Durga Bhavani. Keyed hash function using Bernoulli shift map

Volume 9, Issue 1/2

5 -- 19Ahmad M. Manasrah. Dynamic weighted VM load balancing for cloud-analyst
20 -- 35Aditi Zear, Amit Kumar Singh, Pardeep Kumar. Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications
36 -- 48Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari. Trust delegation-based secure mobile cloud computing framework
49 -- 84Arif Khan. Virtual machine security
85 -- 99Omar M. Al-Jarrah, Moath Al-Ayoub, Yaser Jararweh. Hierarchical detection of insider attacks in cloud computing systems
100 -- 113Hisham M. Alsaghier. A secure mobile commerce framework based on community cloud
114 -- 129Jothi Rangasamy, Lakshmi Kuppusamy, Gopi Krishnan, Velmurugan. Evaluation of puzzle-enabled proxy-assisted denial-of-service protection for web services
130 -- 155Amit Kr. Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya. Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way