


default search action
Journal of Information Security and Applications, Volume 52
Volume 52, June 2020
- Mohammad Ashiqur Rahman
, Md. Golam Moula Mehedi Hasan, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic analysis to defend against remote operating system fingerprinting. 102456 - Stefano Berlato
, Mariano Ceccato
:
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. 102463 - Putra Wanda
, Huang Jin Jie:
DeepProfile: Finding fake profile in online social network using dynamic CNN. 102465 - Nader Abdel Karim, Zarina Shukur, AbedElkarim M. AL-banna:
UIPA: User authentication method based on user interface preferences for account recovery process. 102466 - Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek, Imed Romdhani:
Trust-aware and cooperative routing protocol for IoT security. 102467 - SK Hafizul Islam:
Provably secure two-party authenticated key agreement protocol for post-quantum environments. 102468 - Sikdar Md. S. Askari, Md. Anwar Hussain:
IFDTC4.5: Intuitionistic fuzzy logic based decision tree for E-transactional fraud detection. 102469 - K. Abhimanyu Kumar Patro
, Ayushi Soni, Pradeep Kumar Netam, Bibhudendra Acharya
:
Multiple grayscale image encryption using cross-coupled chaotic maps. 102470 - Martín Barrère
, Chris Hankin
, Nicolas Nicolaou, Demetrios G. Eliades, Thomas Parisini:
Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies. 102471 - Peyman Ayubi
, Saeed Setayeshi
, Amir Masoud Rahmani:
Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application. 102472 - Fahd N. Al-Wesabi, Khalid Mahmood
, Nadhem Nemri
:
A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model. 102473 - Tommaso Zoppi
, Andrea Ceccarelli
, Lorenzo Salani, Andrea Bondavalli
:
On the educated selection of unsupervised algorithms via attacks and anomaly classes. 102474 - Kunj Bihari Meena
, Vipin Tyagi
:
A copy-move image forgery detection technique based on tetrolet transform. 102481 - Raghavendra Raghuram Jinagde, R. Sanjeev Kunte:
Extended Local Ternary Co-relation Pattern: A novel feature descriptor for face Anti-spoofing. 102482 - R. Vidhya, M. Brindha
:
A novel conditional Butterfly Network Topology based chaotic image encryption. 102484 - Miguel Angel Olivero
, Antonia Bertolino
, Francisco José Domínguez Mayo
, María José Escalona, Ilaria Matteucci
:
Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life. 102492 - Quanqiang Zhou
, Jinxia Wu, Liangliang Duan
:
Recommendation attack detection based on deep learning. 102493 - Hakjun Lee, Dongwoo Kang, Jihyeon Ryu, Dongho Won, Hyoungshick Kim, Youngsook Lee:
A three-factor anonymous user authentication scheme for Internet of Things environments. 102494 - Juan Wang
, Haoxi Zhang
, Fei Li, Zuli Wang, Jun Zhao:
Intelligent vehicle knowledge representation and anomaly detection using neural knowledge DNA. 102498 - Mengxia Shuai, Bin Liu, Nenghai Yu, Ling Xiong, Changhui Wang:
Efficient and privacy-preserving authentication scheme for wireless body area networks. 102499 - Mohamed Amine Ferrag
, Messaoud Babaghayou
, Mehmet Akif Yazici
:
Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. 102500 - Zeeshan Ali
, Anwar Ghani
, Imran Khan, Shehzad Ashraf Chaudhry
, SK Hafizul Islam, Debasis Giri
:
A robust authentication and access control protocol for securing wireless healthcare sensor networks. 102502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.