- AI-driven approach for robust real-time detection of zero-day phishing websites
- Behavioural analysis and results of malware and ransomware using optimal behavioural feature set
- Priority-based security-aware virtual machine allocation policy
- On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers
- Image tampering detection based on feature consistency attention
21 March 2025
Free sample articles newly available from International Journal of Information and Computer Security
The following sample articles from the International Journal of Information and Computer Security are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment