Report date: Nov 6,2024 Conflict count: 361874 Publisher: Inderscience Enterprises Ltd. Title count: 333 Conflict count: 3421 ========================================================== Created: 2022-11-05 08:30:07 ConfID: 6670639 CauseID: 1547250232 OtherID: 1545047428 JT: International Journal of Information and Computer Security MD: Kumar,19,1/2,73,2022,Cryptanalysis and improvement of an authentication scheme for IoT DOI: 10.1504/IJICS.2022.10051392(Journal) (6670639-N) DOI: 10.1504/IJICS.2022.126754(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581748 CauseID: 1540784654 OtherID: 1540066336 JT: International Journal of Information and Computer Security MD: Wang,18,3/4,237,2022,Secure zero-effort two-factor authentication based on time-frequency audio analysis DOI: 10.1504/IJICS.2022.10050306(Journal) (6581748-N) DOI: 10.1504/IJICS.2022.125243(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581749 CauseID: 1540784654 OtherID: 1540066339 JT: International Journal of Information and Computer Security MD: Amraoui,18,3/4,262,2022,On a secured channel selection in cognitive radio networks DOI: 10.1504/IJICS.2022.10050307(Journal) (6581749-N) DOI: 10.1504/IJICS.2022.125244(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581750 CauseID: 1540784654 OtherID: 1540066341 JT: International Journal of Information and Computer Security MD: Ren,18,3/4,278,2022,A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection DOI: 10.1504/IJICS.2022.10050308(Journal) (6581750-N) DOI: 10.1504/IJICS.2022.125245(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363537 CauseID: 1425310467 OtherID: 1424920242 JT: International Journal of Information and Computer Security MD: Li,10,2/3,149,2018,The research of reputation incentive mechanism of P2P network file sharing system DOI: 10.1504/IJICS.2018.10012570(Journal) (5363537-N) DOI: 10.1504/IJICS.2018.091460(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363540 CauseID: 1425310467 OtherID: 1424920249 JT: International Journal of Information and Computer Security MD: Amita,10,2/3,261,2018,Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique DOI: 10.1504/IJICS.2018.10012572(Journal) (5363540-N) DOI: 10.1504/IJICS.2018.091463(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363545 CauseID: 1425310467 OtherID: 1424920245 JT: International Journal of Information and Computer Security MD: Raja,10,2/3,303,2018,Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques DOI: 10.1504/IJICS.2018.10012575(Journal) (5363545-N) DOI: 10.1504/IJICS.2018.091468(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363544 CauseID: 1425310467 OtherID: 1424920244 JT: International Journal of Information and Computer Security MD: Song,10,2/3,237,2018,Improved pixel relevance based on Mahalanobis distance for image segmentation DOI: 10.1504/IJICS.2018.10012573(Journal) (5363544-N) DOI: 10.1504/IJICS.2018.091464(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363529 CauseID: 1425310467 OtherID: 1424920239 JT: International Journal of Information and Computer Security MD: Gupta,10,2/3,170,2018,Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks DOI: 10.1504/IJICS.2018.10012568(Journal) (5363529-N) DOI: 10.1504/IJICS.2018.091455(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691734 CauseID: 1557111599 OtherID: 1555137448 JT: International Journal of Information and Computer Security MD: Verma,20,1/2,133,2023,Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering DOI: 10.1504/IJICS.2023.10052969(Journal) (6691734-N) DOI: 10.1504/IJICS.2023.128005(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691732 CauseID: 1557111599 OtherID: 1555137436 JT: International Journal of Information and Computer Security MD: Chatterjee,20,1/2,48,2023,Attack resistant chaos-based cryptosystem by modified baker map and logistic map DOI: 10.1504/IJICS.2023.10052966(Journal) (6691732-N) DOI: 10.1504/IJICS.2023.128002(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691733 CauseID: 1557111599 OtherID: 1555137437 JT: International Journal of Information and Computer Security MD: Emara,20,1/2,84,2023,A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm DOI: 10.1504/IJICS.2023.10052967(Journal) (6691733-N) DOI: 10.1504/IJICS.2023.128003(Journal)