Pascal and Francis Bibliographic Databases

Help

Search results

Your search

is.\*:("1939-3555")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 30

  • Page / 2
Export

Selection :

  • and

Metamorphic Malware Detection Using Code MetricsCANFORA, Gerardo; MERCALDO, Francesco; VISAGGIO, Corrado Aaron et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 57-67, issn 1939-3555, 11 p.Article

Secure Patrol: Patrolling Against Buffer Overflow ExploitsSOLANKI, Jaydeep; SHAH, Aenik; MANIK LAL DAS et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 107-117, issn 1939-3555, 11 p.Article

A Distributed Approach of a Threshold Certificate- Based Encryption Scheme with No Trusted EntitiesFOURNARIS, Apostolos P.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 126-139, issn 1939-3555, 14 p.Article

An Improved Framework for Incident HandlingUSMANI, Kaleem; MOHAPATRA, A. K; PRAKASH, Nupur et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 1-9, issn 1939-3555, 9 p.Article

Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm—High Level of Security for Fooling the EnemyDESOKY, Abdelrahman.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 83-97, issn 1939-3555, 15 p.Article

On the Implementation of Robust Copyright Protection Scheme Using Visual Attention ModelBASU, Abhishek; SUBIR KUMAR SARKAR.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 10-20, issn 1939-3555, 11 p.Article

Enhanced Timeline Analysis for Digital Forensic InvestigationsINGLOT, Bartosz; LU LIU.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 32-44, issn 1939-3555, 13 p.Article

The Emerging Technology of Predictive Analytics: Implications for Homeland SecurityLOZADA, Brian A.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 118-122, issn 1939-3555, 5 p.Article

Proposed Methodology for Cyber Criminal ProfilingWARIKOO, Arun.Information security journal (Print). 2014, Vol 23, Num 4-6, pp 172-178, issn 1939-3555, 7 p.Conference Paper

A Novel Watermarking Scheme for Secure Relational DatabasesRAJESH KUMAR TIWARI; SAHOO, G.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 105-116, issn 1939-3555, 12 p.Article

Remote User Authentication Using a Voice Authentication SystemKAMAN, Shilpa; SWETHA, K; AKRAM, Syed et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 117-125, issn 1939-3555, 9 p.Article

Forecasting the Effects of Electromagnetic Fault Injections on Embedded Cryptosystems : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESALBERTO, Diego; MAISTRI, Paolo; LEVEUGLE, Régis et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 237-243, issn 1939-3555, 7 p.Conference Paper

Implementation and Analysis of Ring Oscillator PUFs on 60 nm Altera Cyclone FPGAs : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESFEITEN, Linus; SPILLA, Andreas; SAUER, Matthias et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 265-273, issn 1939-3555, 9 p.Conference Paper

Multilevel Ionizing-Induced Transient Fault Simulator : TRUSTWORTHY MANUFACTURING AND UTILIZATION OF SECURE DEVICESFENG LU; DI NATALE, Giorgio; FLOTTES, Marie-Lise et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 251-264, issn 1939-3555, 14 p.Conference Paper

Investigating the Viability of Multifactor Graphical Passwords for User AuthenticationMOHD ZALISHAM JALI; FURNELL, Steven M; DOWLAND, Paul S et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 10-21, issn 1939-3555, 12 p.Article

Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AESDARA, Mona; MANOCHEHRI, Kooroush.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 1-9, issn 1939-3555, 9 p.Article

Cybercrimes, Secure Emerging Web Environments, and Digital ForensicsANGELOPOULOU, Olga.Information security journal (Print). 2014, Vol 23, Num 4-6, issn 1939-3555, 57 p.Conference Proceedings

Classification of Clickjacking Attacks and Detection TechniquesSHAHRIAR, Hossain; VAMSHEE KRISHNA DEVENDRAN.Information security journal (Print). 2014, Vol 23, Num 4-6, pp 137-147, issn 1939-3555, 11 p.Conference Paper

An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking AttacksWEDMAN, Shellie; TETMEYER, Annette; SAIEDIAN, Hossein et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 55-67, issn 1939-3555, 13 p.Article

Incorporation of Application Specific Information for Recovery in Database from Malicious TransactionsUDAI PRATAP RAO; PATEL, Dhiren R.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 35-45, issn 1939-3555, 11 p.Article

Mobile Agent-Based Memory Tracer Using Host-Based Intrusion Detection System for Safeguarding Critical MemoryVIJAYARAGAVAN, Arun; MOHAN KUMAR, P; SHUNMUGANATHAN, K. L et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 98-103, issn 1939-3555, 6 p.Article

Secure Group Communication with Hidden Group KeyBHATIA, Manjot; SUNIL KUMAR MUTTOO; BHATIA, M. P. S et al.Information security journal (Print). 2013, Vol 22, Num 1-3, pp 21-34, issn 1939-3555, 14 p.Article

A Markov Decision Process Model for High Interaction HoneypotsHAYATLE, Osama; OTROK, Hadi; YOUSSEF, Amr et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 159-170, issn 1939-3555, 12 p.Article

A Study of Performative Hactivist Subcultures and Threats to BusinessesWORKMAN, Michael; PHELPS, Daniel C; HARE, Robert C et al.Information security journal (Print). 2013, Vol 22, Num 4-6, pp 187-200, issn 1939-3555, 14 p.Article

Hunting for Pirated Software Using Metamorphic AnalysisRANA, Hardikkumar; STAMP, Mark.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 68-85, issn 1939-3555, 18 p.Article

  • Page / 2