is.\*:("1939-3555")
Results 1 to 25 of 30
Selection :
Metamorphic Malware Detection Using Code MetricsCANFORA, Gerardo; MERCALDO, Francesco; VISAGGIO, Corrado Aaron et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 57-67, issn 1939-3555, 11 p.Article
Secure Patrol: Patrolling Against Buffer Overflow ExploitsSOLANKI, Jaydeep; SHAH, Aenik; MANIK LAL DAS et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 107-117, issn 1939-3555, 11 p.Article
A Distributed Approach of a Threshold Certificate- Based Encryption Scheme with No Trusted EntitiesFOURNARIS, Apostolos P.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 126-139, issn 1939-3555, 14 p.Article
An Improved Framework for Incident HandlingUSMANI, Kaleem; MOHAPATRA, A. K; PRAKASH, Nupur et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 1-9, issn 1939-3555, 9 p.Article
Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm—High Level of Security for Fooling the EnemyDESOKY, Abdelrahman.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 83-97, issn 1939-3555, 15 p.Article
On the Implementation of Robust Copyright Protection Scheme Using Visual Attention ModelBASU, Abhishek; SUBIR KUMAR SARKAR.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 10-20, issn 1939-3555, 11 p.Article
Enhanced Timeline Analysis for Digital Forensic InvestigationsINGLOT, Bartosz; LU LIU.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 32-44, issn 1939-3555, 13 p.Article
The Emerging Technology of Predictive Analytics: Implications for Homeland SecurityLOZADA, Brian A.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 118-122, issn 1939-3555, 5 p.Article
Proposed Methodology for Cyber Criminal ProfilingWARIKOO, Arun.Information security journal (Print). 2014, Vol 23, Num 4-6, pp 172-178, issn 1939-3555, 7 p.Conference Paper
A Novel Watermarking Scheme for Secure Relational DatabasesRAJESH KUMAR TIWARI; SAHOO, G.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 105-116, issn 1939-3555, 12 p.Article
Remote User Authentication Using a Voice Authentication SystemKAMAN, Shilpa; SWETHA, K; AKRAM, Syed et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 117-125, issn 1939-3555, 9 p.Article
Forecasting the Effects of Electromagnetic Fault Injections on Embedded Cryptosystems : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESALBERTO, Diego; MAISTRI, Paolo; LEVEUGLE, Régis et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 237-243, issn 1939-3555, 7 p.Conference Paper
Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESFEITEN, Linus; SPILLA, Andreas; SAUER, Matthias et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 265-273, issn 1939-3555, 9 p.Conference Paper
Multilevel Ionizing-Induced Transient Fault Simulator : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESFENG LU; DI NATALE, Giorgio; FLOTTES, Marie-Lise et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 251-264, issn 1939-3555, 14 p.Conference Paper
Investigating the Viability of Multifactor Graphical Passwords for User AuthenticationMOHD ZALISHAM JALI; FURNELL, Steven M; DOWLAND, Paul S et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 10-21, issn 1939-3555, 12 p.Article
Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AESDARA, Mona; MANOCHEHRI, Kooroush.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 1-9, issn 1939-3555, 9 p.Article
Cybercrimes, Secure Emerging Web Environments, and Digital ForensicsANGELOPOULOU, Olga.Information security journal (Print). 2014, Vol 23, Num 4-6, issn 1939-3555, 57 p.Conference Proceedings
Classification of Clickjacking Attacks and Detection TechniquesSHAHRIAR, Hossain; VAMSHEE KRISHNA DEVENDRAN.Information security journal (Print). 2014, Vol 23, Num 4-6, pp 137-147, issn 1939-3555, 11 p.Conference Paper
An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking AttacksWEDMAN, Shellie; TETMEYER, Annette; SAIEDIAN, Hossein et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 55-67, issn 1939-3555, 13 p.Article
Incorporation of Application Specific Information for Recovery in Database from Malicious TransactionsUDAI PRATAP RAO; PATEL, Dhiren R.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 35-45, issn 1939-3555, 11 p.Article
Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical MemoryVIJAYARAGAVAN, Arun; MOHAN KUMAR, P; SHUNMUGANATHAN, K. L et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 98-103, issn 1939-3555, 6 p.Article
Secure Group Communication with Hidden Group KeyBHATIA, Manjot; SUNIL KUMAR MUTTOO; BHATIA, M. P. S et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 21-34, issn 1939-3555, 14 p.Article
A Markov Decision Process Model for High Interaction HoneypotsHAYATLE, Osama; OTROK, Hadi; YOUSSEF, Amr et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 159-170, issn 1939-3555, 12 p.Article
A Study of Performative Hactivist Subcultures and Threats to BusinessesWORKMAN, Michael; PHELPS, Daniel C; HARE, Robert C et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 187-200, issn 1939-3555, 14 p.Article
Hunting for Pirated Software Using Metamorphic AnalysisRANA, Hardikkumar; STAMP, Mark.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 68-85, issn 1939-3555, 18 p.Article