Sample articles
You can read all of these full-text articles free of charge - click

International Journal of Information and Computer Security
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
AI-driven approach for robust real-time detection of zero-day phishing websites | Thomas Nagunwa | Vol.23 No.1 | 79-118 | ![]() |
Behavioural analysis and results of malware and ransomware using optimal behavioural feature set | Laxmi B. Bhagwat; Balaji M. Patil | Vol.23 No.1 | 57-78 | ![]() |
Priority-based security-aware virtual machine allocation policy | Aparna Bhonde; Satish R. Devane | Vol.23 No.1 | 40-56 | ![]() |
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers | Tran Thi Luong; Hoang Dinh Linh | Vol.23 No.1 | 16-39 | ![]() |
Image tampering detection based on feature consistency attention | Junlin Gu; Yihan Xu; Juan Sun; Weiwei Liu | Vol.23 No.1 | 1-15 | ![]() |