![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
ISC International Journal of Information Security, Volume 16
Volume 16, Number 1, January 2024
- Meharaj Begum A
, Michael Arock:
Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. 1-16 - Shadab Kalhoro
, Farhan Bashir Shaikh, Anam Kalhoro, Junaid Ur Rehman Abbasi, Ramesh Kumar Ayyasamy:
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios. 17-35 - Morteza Amirmohseni, Sadegh Dorri Nogoorani
:
Safety Guards for Ethereum Smart Contracts. 37-53 - Mehmet Ali Yalçinkaya
, Ecir Ugur Küçüksille:
Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner. 55-77 - Kangkan Talukdar, Debojit Boro
:
Slowloris Attack Detection Using Adaptive Timeout-Based Approach. 79-92 - Mostafa Chegenizadeh
, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref:
HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices. 93-114
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.