首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:International journal of information security

缩写:INT J INF SECUR

ISSN:1615-5262

e-ISSN:1615-5270

IF/分区:3.2/Q2

文章目录 更多期刊信息

共收录本刊相关文章索引16
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Oussama Amine,Karim Baghery,Zaira Pindado et al. Oussama Amine et al.
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are the most efficient proof systems in terms of proof size and verification. Currently, Groth's scheme from EUROCRYPT 2016, Groth 16 , is the state-of-the-art and ...
Shahriar Mohammadi,Mehdi Babagoli Shahriar Mohammadi
Along with the advancement of online platforms and significant growth in Internet usage, various threats and cyber-attacks have been emerging and become more complicated and perilous in a day-by-day base. Anomaly-based intrusion detection s...
Leonardo Dias Menezes,Luciano Vieira de Araújo,Marislei Nishijima Leonardo Dias Menezes
This paper proposes a blockchain solution for some activities currently performed by notary offices under the Civil Law judiciary that is technically viable. The architecture is also planned to accommodate Brazil's legal, political, and eco...
Rabie Barhoun,Maryam Ed-Daibouni Rabie Barhoun
The issue of trust is a primary concern for individuals in distributed collaborative environments (DCEs), particularly in emergencies such as the COVID-19 pandemic. In these environments, collaboration and access to services are achieved th...
Aggeliki Tsohou,Vasiliki Diamantopoulou,Stefanos Gritzalis et al. Aggeliki Tsohou et al.
Society has become increasingly dependent on IT infrastructure and services. Additionally, the pandemic of COVID-19 forced the transition of the traditional way of working (i.e., physical presence) into a more modern and flexible one (i.e.,...
Imdad Ullah,Roksana Boreli,Salil S Kanhere Imdad Ullah
Targeted advertising has transformed the marketing landscape for a wide variety of businesses, by creating new opportunities for advertisers to reach prospective customers by delivering personalised ads, using an infrastructure of a number ...
Kai Wang,Jinxia Wu,Tianqing Zhu et al. Kai Wang et al.
Graph neural networks have demonstrated remarkable performance in learning node or graph representations for various graph-related tasks. However, learning with graph data or its embedded representations may induce privacy issues when the n...
Swati,Sangita Roy,Jawar Singh et al. Swati et al.
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current ...
Qin An,Wilson Cheong Hin Hong,XiaoShu Xu et al. Qin An et al.
During the pandemic, the prevailing online learning has brought tremendous benefits to the education field. However, it has also become a target for cybercriminals. Cybersecurity awareness (CSA) or Internet security awareness in the educati...
Shubhangi Rastogi,Divya Bansal Shubhangi Rastogi
Fake news has become an industry on its own, where users paid to write fake news and create clickbait content to allure the audience. Apparently, the detection of fake news is a crucial problem and several studies have proposed machine-lear...