Publisher: Inderscience Publishers   (Total: 449 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

  First | 1 2 3 | Last   [Sort by number of followers]   [Restore default list]

Showing 201 - 400 of 449 Journals sorted alphabetically
Intl. J. of Image Mining     Hybrid Journal   (Followers: 1)
Intl. J. of Immunological Studies     Hybrid Journal   (Followers: 1)
Intl. J. of Indian Culture and Business Management     Hybrid Journal   (Followers: 3)
Intl. J. of Industrial and Systems Engineering     Hybrid Journal   (Followers: 11, SJR: 0.34, CiteScore: 1)
Intl. J. of Industrial Electronics and Drives     Hybrid Journal   (Followers: 3)
Intl. J. of Information and Coding Theory     Hybrid Journal   (Followers: 6)
Intl. J. of Information and Communication Technology     Hybrid Journal   (Followers: 8, SJR: 0.13, CiteScore: 0)
Intl. J. of Information and Computer Security     Hybrid Journal   (Followers: 16, SJR: 0.141, CiteScore: 0)
Intl. J. of Information and Decision Sciences     Hybrid Journal   (Followers: 10, SJR: 0.233, CiteScore: 1)
Intl. J. of Information and Operations Management Education     Hybrid Journal   (Followers: 8)
Intl. J. of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 27)
Intl. J. of Information Quality     Hybrid Journal   (Followers: 3, SJR: 0.111, CiteScore: 0)
Intl. J. of Information Systems and Change Management     Hybrid Journal   (Followers: 12, SJR: 0.141, CiteScore: 0)
Intl. J. of Information Systems and Management     Hybrid Journal   (Followers: 4)
Intl. J. of Information Technology and Management     Hybrid Journal   (Followers: 12, SJR: 0.12, CiteScore: 0)
Intl. J. of Information Technology, Communications and Convergence     Hybrid Journal   (Followers: 16)
Intl. J. of Innovation and Learning     Hybrid Journal   (Followers: 25, SJR: 0.26, CiteScore: 1)
Intl. J. of Innovation and Regional Development     Hybrid Journal   (Followers: 8)
Intl. J. of Innovation and Sustainable Development     Hybrid Journal   (Followers: 11, SJR: 0.271, CiteScore: 1)
Intl. J. of Innovation in Education     Hybrid Journal   (Followers: 9)
Intl. J. of Innovative Computing and Applications     Hybrid Journal   (Followers: 3, SJR: 0.144, CiteScore: 1)
Intl. J. of Instrumentation Technology     Hybrid Journal   (Followers: 6)
Intl. J. of Integrated Supply Management     Hybrid Journal   (Followers: 4, SJR: 0.263, CiteScore: 1)
Intl. J. of Intellectual Property Management     Hybrid Journal   (Followers: 30, SJR: 0.101, CiteScore: 0)
Intl. J. of Intelligence and Sustainable Computing     Hybrid Journal   (Followers: 3)
Intl. J. of Intelligent Defence Support Systems     Hybrid Journal   (Followers: 5)
Intl. J. of Intelligent Engineering Informatics     Hybrid Journal  
Intl. J. of Intelligent Enterprise     Hybrid Journal   (Followers: 1, SJR: 0.138, CiteScore: 0)
Intl. J. of Intelligent Information and Database Systems     Hybrid Journal   (Followers: 4, SJR: 0.11, CiteScore: 0)
Intl. J. of Intelligent Internet of Things Computing     Hybrid Journal   (Followers: 3)
Intl. J. of Intelligent Machines and Robotics     Hybrid Journal   (Followers: 1)
Intl. J. of Intelligent Systems Design and Computing     Hybrid Journal  
Intl. J. of Intelligent Systems Technologies and Applications     Hybrid Journal   (Followers: 2, SJR: 0.152, CiteScore: 0)
Intl. J. of Intercultural Information Management     Hybrid Journal   (Followers: 12)
Intl. J. of Internet and Enterprise Management     Hybrid Journal   (Followers: 1)
Intl. J. of Internet Manufacturing and Services     Hybrid Journal   (Followers: 1, SJR: 0.118, CiteScore: 0)
Intl. J. of Internet Marketing and Advertising     Hybrid Journal   (Followers: 21, SJR: 0.223, CiteScore: 1)
Intl. J. of Internet of Things and Cyber-Assurance     Hybrid Journal  
Intl. J. of Internet Protocol Technology     Hybrid Journal   (Followers: 2, SJR: 0.139, CiteScore: 1)
Intl. J. of Internet Technology and Secured Transactions     Hybrid Journal   (Followers: 8, SJR: 0.217, CiteScore: 0)
Intl. J. of Inventory Research     Hybrid Journal   (Followers: 2)
Intl. J. of Islamic Marketing and Branding     Hybrid Journal   (Followers: 6)
Intl. J. of Knowledge and Learning     Hybrid Journal   (Followers: 4, SJR: 0.103, CiteScore: 0)
Intl. J. of Knowledge and Web Intelligence     Hybrid Journal   (Followers: 41)
Intl. J. of Knowledge Engineering and Data Mining     Hybrid Journal   (Followers: 41)
Intl. J. of Knowledge Engineering and Soft Data Paradigms     Hybrid Journal   (Followers: 2)
Intl. J. of Knowledge Management in Tourism and Hospitality     Hybrid Journal   (Followers: 3)
Intl. J. of Knowledge Management Studies     Hybrid Journal   (Followers: 33, SJR: 0.111, CiteScore: 0)
Intl. J. of Knowledge-Based Development     Hybrid Journal   (Followers: 5, SJR: 0.278, CiteScore: 1)
Intl. J. of Lean Enterprise Research     Hybrid Journal   (Followers: 2)
Intl. J. of Learning and Change     Hybrid Journal   (Followers: 14, SJR: 0.189, CiteScore: 0)
Intl. J. of Learning and Intellectual Capital     Hybrid Journal   (Followers: 2, SJR: 0.228, CiteScore: 1)
Intl. J. of Learning Technology     Hybrid Journal   (Followers: 9, SJR: 0.184, CiteScore: 1)
Intl. J. of Leisure and Tourism Marketing     Hybrid Journal   (Followers: 20)
Intl. J. of Liability and Scientific Enquiry     Hybrid Journal   (Followers: 1)
Intl. J. of Lifecycle Performance Engineering     Hybrid Journal   (Followers: 1)
Intl. J. of Logistics Economics and Globalisation     Hybrid Journal   (Followers: 6)
Intl. J. of Logistics Systems and Management     Hybrid Journal   (Followers: 13, SJR: 0.371, CiteScore: 1)
Intl. J. of Low Radiation     Hybrid Journal   (Followers: 1, SJR: 0.115, CiteScore: 0)
Intl. J. of Machine Intelligence and Sensory Signal Processing     Hybrid Journal   (Followers: 5)
Intl. J. of Machining and Machinability of Materials     Hybrid Journal   (Followers: 6, SJR: 0.408, CiteScore: 1)
Intl. J. of Management and Decision Making     Hybrid Journal   (Followers: 7, SJR: 0.233, CiteScore: 1)
Intl. J. of Management and Enterprise Development     Hybrid Journal   (SJR: 0.164, CiteScore: 0)
Intl. J. of Management and Network Economics     Hybrid Journal  
Intl. J. of Management Concepts and Philosophy     Hybrid Journal   (Followers: 3)
Intl. J. of Management Development     Hybrid Journal   (Followers: 13)
Intl. J. of Management in Education     Hybrid Journal   (Followers: 8, SJR: 0.209, CiteScore: 0)
Intl. J. of Management Practice     Hybrid Journal   (Followers: 4, SJR: 0.127, CiteScore: 0)
Intl. J. of Managerial and Financial Accounting     Hybrid Journal   (Followers: 9, SJR: 0.195, CiteScore: 1)
Intl. J. of Manufacturing Research     Hybrid Journal   (Followers: 8, SJR: 0.411, CiteScore: 1)
Intl. J. of Manufacturing Technology and Management     Hybrid Journal   (Followers: 9, SJR: 0.159, CiteScore: 0)
Intl. J. of Markets and Business Systems     Hybrid Journal  
Intl. J. of Masonry Research and Innovation     Hybrid Journal   (Followers: 1)
Intl. J. of Mass Customisation     Hybrid Journal  
Intl. J. of Materials and Product Technology     Hybrid Journal   (Followers: 3, SJR: 0.23, CiteScore: 1)
Intl. J. of Materials and Structural Integrity     Hybrid Journal   (Followers: 8, SJR: 0.369, CiteScore: 0)
Intl. J. of Materials Engineering Innovation     Hybrid Journal   (Followers: 2, SJR: 0.178, CiteScore: 0)
Intl. J. of Mathematical Modelling and Numerical Optimisation     Hybrid Journal   (Followers: 6, SJR: 0.157, CiteScore: 0)
Intl. J. of Mathematics in Operational Research     Hybrid Journal   (Followers: 2, SJR: 0.322, CiteScore: 1)
Intl. J. of Mechanisms and Robotic Systems     Hybrid Journal   (Followers: 2)
Intl. J. of Mechatronics and Automation     Hybrid Journal   (Followers: 6, SJR: 0.129, CiteScore: 1)
Intl. J. of Mechatronics and Manufacturing Systems     Hybrid Journal   (Followers: 2, SJR: 0.199, CiteScore: 0)
Intl. J. of Medical Engineering and Informatics     Hybrid Journal   (Followers: 4, SJR: 0.181, CiteScore: 0)
Intl. J. of Metadata, Semantics and Ontologies     Hybrid Journal   (Followers: 11, SJR: 0.173, CiteScore: 1)
Intl. J. of Metaheuristics     Hybrid Journal   (Followers: 1)
Intl. J. of Microstructure and Materials Properties     Hybrid Journal   (Followers: 8, SJR: 0.148, CiteScore: 0)
Intl. J. of Migration and Border Studies     Hybrid Journal   (Followers: 17)
Intl. J. of Migration and Residential Mobility     Hybrid Journal   (Followers: 10)
Intl. J. of Mining and Mineral Engineering     Hybrid Journal   (Followers: 8, SJR: 0.232, CiteScore: 1)
Intl. J. of Mobile Communications     Hybrid Journal   (Followers: 9, SJR: 0.665, CiteScore: 2)
Intl. J. of Mobile Learning and Organisation     Hybrid Journal   (Followers: 18, SJR: 0.85, CiteScore: 2)
Intl. J. of Mobile Network Design and Innovation     Hybrid Journal   (Followers: 2, SJR: 0.123, CiteScore: 1)
Intl. J. of Modelling in Operations Management     Hybrid Journal   (Followers: 4)
Intl. J. of Modelling, Identification and Control     Hybrid Journal   (Followers: 1, SJR: 0.401, CiteScore: 2)
Intl. J. of Monetary Economics and Finance     Hybrid Journal   (Followers: 9, SJR: 0.237, CiteScore: 1)
Intl. J. of Multicriteria Decision Making     Hybrid Journal   (Followers: 8, SJR: 0.181, CiteScore: 0)
Intl. J. of Multimedia Intelligence and Security     Hybrid Journal   (Followers: 9)
Intl. J. of Multinational Corporation Strategy     Hybrid Journal  
Intl. J. of Multivariate Data Analysis     Hybrid Journal   (Followers: 2)
Intl. J. of Nano and Biomaterials     Hybrid Journal   (Followers: 9, SJR: 0.111, CiteScore: 0)
Intl. J. of Nanomanufacturing     Hybrid Journal   (SJR: 0.17, CiteScore: 0)
Intl. J. of Nanoparticles     Hybrid Journal   (Followers: 1, SJR: 0.167, CiteScore: 1)
Intl. J. of Nanotechnology     Hybrid Journal   (Followers: 8, SJR: 0.202, CiteScore: 0)
Intl. J. of Network Science     Hybrid Journal   (Followers: 3)
Intl. J. of Networking and Virtual Organisations     Hybrid Journal   (Followers: 14, SJR: 0.163, CiteScore: 0)
Intl. J. of Nonlinear Dynamics and Control     Hybrid Journal   (Followers: 5)
Intl. J. of Nuclear Desalination     Hybrid Journal   (Followers: 1)
Intl. J. of Nuclear Energy Science and Technology     Hybrid Journal   (Followers: 5, SJR: 0.246, CiteScore: 0)
Intl. J. of Nuclear Governance, Economy and Ecology     Hybrid Journal   (Followers: 1)
Intl. J. of Nuclear Hydrogen Production and Applications     Hybrid Journal   (Followers: 1)
Intl. J. of Nuclear Knowledge Management     Hybrid Journal   (Followers: 1)
Intl. J. of Nuclear Law     Hybrid Journal   (Followers: 5)
Intl. J. of Nuclear Safety and Security     Hybrid Journal   (Followers: 1)
Intl. J. of Ocean Systems Management     Hybrid Journal   (Followers: 3)
Intl. J. of Oil, Gas and Coal Technology     Hybrid Journal   (Followers: 9, SJR: 0.265, CiteScore: 1)
Intl. J. of Operational Research     Hybrid Journal   (Followers: 3, SJR: 0.467, CiteScore: 1)
Intl. J. of Organisational Design and Engineering     Hybrid Journal   (Followers: 5)
Intl. J. of Petroleum Engineering     Hybrid Journal   (Followers: 2)
Intl. J. of Planning and Scheduling     Hybrid Journal   (Followers: 3)
Intl. J. of Pluralism and Economics Education     Hybrid Journal  
Intl. J. of Portfolio Analysis and Management     Hybrid Journal   (Followers: 4)
Intl. J. of Postharvest Technology and Innovation     Hybrid Journal   (Followers: 3, SJR: 0.144, CiteScore: 0)
Intl. J. of Power and Energy Conversion     Hybrid Journal   (Followers: 3, SJR: 0.132, CiteScore: 0)
Intl. J. of Power Electronics     Hybrid Journal   (Followers: 25, SJR: 0.233, CiteScore: 1)
Intl. J. of Powertrains     Hybrid Journal   (Followers: 2)
Intl. J. of Precision Technology     Hybrid Journal   (Followers: 1)
Intl. J. of Private Law     Hybrid Journal   (Followers: 10, SJR: 0.101, CiteScore: 0)
Intl. J. of Process Management and Benchmarking     Hybrid Journal   (Followers: 2, SJR: 0.314, CiteScore: 1)
Intl. J. of Process Systems Engineering     Hybrid Journal   (Followers: 2)
Intl. J. of Procurement Management     Hybrid Journal   (Followers: 12, SJR: 0.331, CiteScore: 1)
Intl. J. of Product Development     Hybrid Journal   (Followers: 1, SJR: 0.209, CiteScore: 1)
Intl. J. of Product Lifecycle Management     Hybrid Journal   (Followers: 1, SJR: 0.328, CiteScore: 1)
Intl. J. of Productivity and Quality Management     Hybrid Journal   (Followers: 7, SJR: 0.352, CiteScore: 1)
Intl. J. of Project Organisation and Management     Hybrid Journal   (Followers: 19, SJR: 0.273, CiteScore: 1)
Intl. J. of Public Law and Policy     Hybrid Journal   (Followers: 12, SJR: 0.108, CiteScore: 0)
Intl. J. of Public Policy     Hybrid Journal   (Followers: 4, SJR: 0.128, CiteScore: 0)
Intl. J. of Public Sector Performance Management     Hybrid Journal   (Followers: 11, SJR: 0.142, CiteScore: 0)
Intl. J. of Qualitative Research in Services     Hybrid Journal   (Followers: 4)
Intl. J. of Quality and Innovation     Hybrid Journal   (Followers: 6)
Intl. J. of Quality Engineering and Technology     Hybrid Journal   (Followers: 4, SJR: 0.134, CiteScore: 0)
Intl. J. of Quantitative Research in Education     Hybrid Journal   (Followers: 5)
Intl. J. of Radio Frequency Identification Technology and Applications     Hybrid Journal   (Followers: 5)
Intl. J. of Rapid Manufacturing     Hybrid Journal   (Followers: 3)
Intl. J. of Reasoning-based Intelligent Systems     Hybrid Journal   (SJR: 0.126, CiteScore: 0)
Intl. J. of Reliability and Safety     Hybrid Journal   (Followers: 12, SJR: 0.201, CiteScore: 0)
Intl. J. of Renewable Energy Technology     Hybrid Journal   (Followers: 10)
Intl. J. of Research, Innovation and Commercialisation     Hybrid Journal  
Intl. J. of Revenue Management     Hybrid Journal   (Followers: 2, SJR: 0.154, CiteScore: 0)
Intl. J. of Risk Assessment and Management     Hybrid Journal   (Followers: 15, SJR: 0.142, CiteScore: 0)
Intl. J. of Satellite Communications Policy and Management     Hybrid Journal   (Followers: 12)
Intl. J. of Security and Networks     Hybrid Journal   (Followers: 11, SJR: 0.212, CiteScore: 1)
Intl. J. of Sensor Networks     Hybrid Journal   (Followers: 4, SJR: 0.25, CiteScore: 1)
Intl. J. of Service and Computing Oriented Manufacturing     Hybrid Journal   (Followers: 2)
Intl. J. of Services and Operations Management     Hybrid Journal   (Followers: 5, SJR: 0.288, CiteScore: 1)
Intl. J. of Services and Standards     Hybrid Journal   (Followers: 1, SJR: 0.13, CiteScore: 0)
Intl. J. of Services Operations and Informatics     Hybrid Journal   (Followers: 1, SJR: 0.106, CiteScore: 0)
Intl. J. of Services Sciences     Hybrid Journal  
Intl. J. of Services Technology and Management     Hybrid Journal   (Followers: 1, SJR: 0.129, CiteScore: 0)
Intl. J. of Services, Economics and Management     Hybrid Journal   (SJR: 0.118, CiteScore: 0)
Intl. J. of Shipping and Transport Logistics     Hybrid Journal   (Followers: 6, SJR: 0.416, CiteScore: 1)
Intl. J. of Signal and Imaging Systems Engineering     Hybrid Journal   (SJR: 0.179, CiteScore: 1)
Intl. J. of Simulation and Process Modelling     Hybrid Journal   (Followers: 5, SJR: 0.259, CiteScore: 1)
Intl. J. of Six Sigma and Competitive Advantage     Hybrid Journal   (Followers: 3, SJR: 0.161, CiteScore: 0)
Intl. J. of Smart Grid and Green Communications     Hybrid Journal   (Followers: 1)
Intl. J. of Smart Technology and Learning     Hybrid Journal   (Followers: 3)
Intl. J. of Social and Humanistic Computing     Hybrid Journal   (Followers: 1)
Intl. J. of Social Computing and Cyber-Physical Systems     Hybrid Journal   (Followers: 1)
Intl. J. of Social Entrepreneurship and Innovation     Hybrid Journal   (Followers: 22)
Intl. J. of Social Media and Interactive Learning Environments     Hybrid Journal   (Followers: 16)
Intl. J. of Social Network Mining     Hybrid Journal   (Followers: 2)
Intl. J. of Society Systems Science     Hybrid Journal  
Intl. J. of Soft Computing and Networking     Hybrid Journal   (Followers: 1)
Intl. J. of Software Engineering, Technology and Applications     Hybrid Journal   (Followers: 4)
Intl. J. of Space Science and Engineering     Hybrid Journal   (Followers: 10)
Intl. J. of Space-Based and Situated Computing     Hybrid Journal   (Followers: 2)
Intl. J. of Spatial, Temporal and Multimedia Information Systems     Hybrid Journal   (Followers: 1)
Intl. J. of Spatio-Temporal Data Science     Hybrid Journal  
Intl. J. of Sport Management and Marketing     Hybrid Journal   (Followers: 10, SJR: 0.377, CiteScore: 1)
Intl. J. of Strategic Business Alliances     Hybrid Journal   (Followers: 3)
Intl. J. of Strategic Change Management     Hybrid Journal   (Followers: 12)
Intl. J. of Strategic Engineering Asset Management     Hybrid Journal   (Followers: 5)
Intl. J. of Structural Engineering     Hybrid Journal   (Followers: 12, SJR: 0.326, CiteScore: 1)
Intl. J. of Supply Chain and Inventory Management     Hybrid Journal   (Followers: 14)
Intl. J. of Supply Chain and Operations Resilience     Hybrid Journal   (Followers: 7)
Intl. J. of Surface Science and Engineering     Hybrid Journal   (Followers: 8, SJR: 0.412, CiteScore: 1)
Intl. J. of Sustainable Agricultural Management and Informatics     Hybrid Journal   (Followers: 1)
Intl. J. of Sustainable Aviation     Hybrid Journal   (Followers: 4)
Intl. J. of Sustainable Design     Hybrid Journal   (Followers: 9)
Intl. J. of Sustainable Development     Hybrid Journal   (Followers: 16, SJR: 0.2, CiteScore: 0)
Intl. J. of Sustainable Economy     Hybrid Journal   (Followers: 1)
Intl. J. of Sustainable Manufacturing     Hybrid Journal   (Followers: 4)
Intl. J. of Sustainable Materials and Structural Systems     Hybrid Journal   (Followers: 3)
Intl. J. of Sustainable Real Estate and Construction Economics     Hybrid Journal   (Followers: 2)
Intl. J. of Sustainable Society     Hybrid Journal   (Followers: 3, SJR: 0.297, CiteScore: 1)
Intl. J. of Sustainable Strategic Management     Hybrid Journal   (Followers: 4)
Intl. J. of Swarm Intelligence     Hybrid Journal   (Followers: 2)
Intl. J. of System Control and Information Processing     Hybrid Journal   (Followers: 3)
Intl. J. of System of Systems Engineering     Hybrid Journal   (Followers: 2, SJR: 0.212, CiteScore: 0)
Intl. J. of Systems, Control and Communications     Hybrid Journal   (Followers: 4, SJR: 0.142, CiteScore: 0)
Intl. J. of Teaching and Case Studies     Hybrid Journal   (Followers: 5)

  First | 1 2 3 | Last   [Sort by number of followers]   [Restore default list]

Similar Journals
Journal Cover
International Journal of Information and Computer Security
Journal Prestige (SJR): 0.141
Number of Followers: 16  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1744-1765 - ISSN (Online) 1744-1773
Published by Inderscience Publishers Homepage  [449 journals]
  • CFM: collusion-free model of privacy preserving frequent itemset
           mining
    • Authors: Yanhong Li, Jinjun Dai, Xinli Wang, Jim Slotta
      Pages: 249 - 267
      Abstract: Although many privacy preserving frequent itemset mining protocols have been proposed to preserve the privacy of participants, most of them are vulnerable against collusion. Usually, these protocols are designed for semi-honest model; where in this model, it is assumed that the participants do not deviate from the protocol. However, in real world, participants may collude with each other in order to falsify the protocol or to obtain the secret values of other parties. In this paper, we analyse the vulnerability of previous privacy preserving frequent itemset mining protocols from privacy point of view, and then, we proposes a new protocol (CFM), which preserves the privacy of participants, even in collusion state. CFM is designed for mining frequent itemsets from homogenous (horizontally partitioned) data, which not only preserves the privacy of participants in collusion states, but also shows better performance in comparison with previous works. In order to achieve this goal, CFM employs a new secret sharing and secret summation scheme, which distributes secret values among participants. Privacy preserving level of CFM is evaluated based on the disclosure of sensitive information.
      Keywords: privacy preserving data mining; frequent itemset mining; secure computation; collision-free model; privacy preservation; PPDM; information disclosure
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 249 - 267
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109476
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Towards automated SCADA forensic investigation: challenges, opportunities
           and promising paradigms
    • Authors: Mohamed Elhoseny, Hosny Abbas
      Pages: 268 - 288
      Abstract: Modern supervisory control and data acquisition (SCADA) networks represent a challenging domain for forensic investigators who have the responsibility to determine the main causes of the catastrophic incidents that could happen in SCADA systems and to provide precise and logical evidences supported with comprehensive technical reports to the legal organisations. They are characterised to be complex, large-scale, and highly distributed systems comprising diversities of proprietary components such as field devices, embedded control systems, computers, communication networks, etc. Providing forensic investigators with fully or partially automated forensic investigation can be an effective solution against the challenging nature of modern SCADA networks. This review paper discusses the challenges and opportunities towards achieving that goal and highlights the emerging technological paradigms that can be considered as promising in the realisation of such a framework. Finally, this paper proposes a conceptual framework for automated forensic investigation in modern SCADA networks accompanied with a possible realisation architecture based on the multi-agent systems and wireless sensor networks promising technological paradigms.
      Keywords: digital forensic investigation; automated forensic investigation; industrial environments; SCADA systems; SCADA forensics; conceptual framework
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 268 - 288
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109477
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Fast causal division for supporting robust causal discovery
    • Authors: Guizhen Mai, Shuiguo Peng, Yinghan Hong, Pinghua Chen
      Pages: 289 - 308
      Abstract: Discovering the causal relationship from the observational data is a key problem in many scientific research fields. However, it is not easy to detect the causal relationship by using general causal discovery methods among large scale data, due to the curse of the dimension. Although some causal dividing frameworks are proposed to alleviate these problems, they are, in fact, also faced with high dimensional problems. In this work, we propose a split-and-merge method for causal discovery. The original dataset is firstly divided into two smaller subsets by using low-order CI tests, and then the subsets are further divided into a set of smaller subsets. For each subset, we employ the existing causal learning method to discovery the corresponding structures, by combined all these structures, we finally obtain the complete causal structure. Various experiments are conducted to verify that compared with other methods, it returns more reliable results and has strong applicability.
      Keywords: high dimension; causal inference; causal network
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 289 - 308
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109478
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • System for DDoS attack mitigation by discovering the attack vectors
           through statistical traffic analysis
    • Authors: Mircho Jordanov Mirchev, Seferin Todorov Mirtchev
      Pages: 309 - 321
      Abstract: DDoS attacks are becoming an increasing threat to the internet due to the easy availability of user-friendly attack tools. In meantime defending from such attacks is very difficult, because it is very hard to differentiate between the legitimate traffic and attack traffic and also maintain the attacked service still accessible while under attack. This paper describes a method for discovering the vector of a DDoS attack using statistical traffic analysis. The discussed methods are based on having a notification of the attack and making a statistical analysis of the attack traffic to find the vector and profiling a statistical baseline of normal traffic and discovering the abnormal traffic as a difference in the statistical parameters of TCP/IP packets in a given moment to the baseline and thus making a decision of the attack and its vector simultaneously.
      Keywords: distributed denial-of-service; DDoS attack; vector of attack; statistical analysis; IP network security
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 309 - 321
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109479
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • HHDSSC: harnessing healthcare data security in cloud using ciphertext
           policy attribute-based encryption
    • Authors: Dharavath Ramesh, Rashmi Priya Sharma, Damodar Reddy Edla
      Pages: 322 - 336
      Abstract: The advancement of cloud computing has great impact on the medical sector. Due to its storage facility, e-healthcare has emerged as a promising healthcare solution for providing fast and immediate treatment to patients. The PHRs collected and outsourced in the cloud leads to security concern. The data outsourced in the cloud is no more under the direct control of the patient, hence data should be encrypted prior its storage. Existing works based on group signature require high amount of computation. Other issues like confidentiality of private data, efficient key distribution, scalable and flexible fine-grained data access, revocation and tracing the malicious user is yet to be addressed to maintain the integrity of the patients. In this manuscript, we propose EPOC-1-based multi authority CP-ABE which can trace and revoke the malicious user who leaks the real identity and confidential data of the patient without any storage overhead. This methodology of white-box traceability presented in this manuscript, traces the malicious user efficiently. The proposed scheme is validated with some existing policies and makes the healthcare domain more securable under the cloud setup.
      Keywords: cloud data storage; personal health records; PHRs; CP-ABE; EPOC-1; traceability; accessibility revocation
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 322 - 336
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109480
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • A categorical survey of state-of-the-art intrusion detection
           system-Snort
    • Authors: Alka Gupta, Lalit Sen Sharma
      Pages: 337 - 356
      Abstract: Internet has shown a tremendous growth in the last few years and along with it, the impact, quality and quantity of threats on it have also increased. Organisations are striving to find methods to protect their data and network from the existing and emerging threats. Defence and monitoring system have become an essential part of all organisations who want to secure their data against network threats. This paper presents a categorical survey on the various research techniques taken for improving the performance of open-source intrusion detection system, <i>Snort</i> – de facto in the field of intrusion detection and prevention. The pros and cons of all the techniques have been presented. A novel parallel architecture has been proposed to increase the performance of <i>Snort</i>-IDS in a high speed network. The architecture is based on the constituent protocol proportions of the network traffic.
      Keywords: keywords-network intrusion detection system; parallel architecture; Snort; signature-based; pattern-matching; HIDS; NIDS
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 337 - 356
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109481
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • A lightweight fully homomorphic encryption scheme for cloud security
    • Authors: V. Biksham, D. Vasumathi
      Pages: 357 - 371
      Abstract: A decade ago, fully homomorphic encryption mechanism came as a great breakthrough in security. In homomorphic encryption, ciphertext (data in encrypted format) should be sent to the cloud, the computations are made on the ciphertext, and the result of this computation is a ciphertext form itself. If the result of the computation is decrypted, then the correct plaintext result must be obtained. Maintaining the secrecy and privacy of data, generally in cloud scenario, has become an intense challenge for present day's practical applications. However, transferring private data to any third party consists of large amount risks of disclosure of private data while computation. This problem can be addressed by performing computations on encrypted data without decrypting it. In this paper, we propose a fully homomorphic encryption framework which is lightweight in nature and utilising symmetric key. Analysis of the scheme confirms that our proposed system is efficient and practical to adopt it in various cloud computation applications. Further, to prove the novelty, we present the implementation results and given the comparative analysis of our scheme with significant state-of-the-art.
      Keywords: homomorphic encryption; symmetric FHE; privacy; security; cloud server
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 357 - 371
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109482
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Fuzzy ARM and cluster analysis for database intrusion detection and
           prevention
    • Authors: Indu Singh, Nikhil Arora, Shivam Arora, Parteek Singhal
      Pages: 372 - 395
      Abstract: Designing and implementation of an intrusion detection system in any database environment has emerged as an absolute necessity in the recent years. Detection of both, the outsider attack and privilege abuse from within the organisation, has become a fundamental need for maintenance of dynamic, scalable and reinforced databases. Proposed advanced approach, malicious query detection using fuzzy and cluster analysis (MQDFCA) operates in a seamless manner and efficaciously performs detection and prevention of transactions that are intrusive in nature, within a database environment, thus shielding the vital data stored in a database from any unauthorised/malicious access or modifications. The method utilises concepts of machine learning like fuzzy logic, association rule mining and clustering algorithms at various stages to validate a newly generated transaction at role segment, profile segment and the rule validation segment. The degree of adherence of user supplied queries within a transaction to the previously generated user roles, transaction profiles and extracted rules is used to categorise the transaction as non-malicious or malicious. The efficaciousness of proposed methodology in detection of intrusions is exemplified from the results of the experiments conducted on the synthetic dataset yielding recall and precision values of 93% and 98% respectively.
      Keywords: database intrusion detection; fuzzy association rule mining; data mining; clustering; transaction profiles; database security; FP growth; fuzzy c-means; computer security; data security; privilege abuse
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 372 - 395
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109483
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Data encoding and cost optimised distribution for efficient and secure
           storage in cloud federation
    • Authors: Sonika Shrivastava, R.K. Pateriya
      Pages: 396 - 410
      Abstract: Cloud federation is the future paradigm of computing which can reduce cost and avoid vendor lock-in problem. Cloud providers are now collaborating for increasing revenue and building trust among customers and indirectly help in better resource utilisation of every service provider in the federation. In the proposed framework all collaborating service providers share their storage resources and use single sign-on federated identity management model which will reduce the overhead of maintaining multiple credentials and strengthen the authentication process. Initially, files are encrypted with the secret key created with client id, session token and a random number which will improve the data security and based on the service level selected for files erasure codes are applied, which will reduce storage overhead as compared to the traditional replication techniques. Hence overall reliability, availability and security of data stored in the cloud federation is improved.
      Keywords: cloud storage; cloud federation; data backup in cloud; erasure codes; Reed-Solomon code; single sign-on
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 396 - 410
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109484
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Comparative study of classification approaches for e-mail analysis
    • Authors: Pranjal S. Bogawar, K.K. Bhoyar
      Pages: 411 - 427
      Abstract: Illicit messages like threatening and abusive messages affect emotions and psychology of a person. Such messages start exerting influence on mental status, and ultimately physical condition of a person. E-mails are one of the popularly used sources, for communicating personal and official messages. Typically, sentiment analysis of these e-mails includes classifying them into positive, negative and neutral messages. Identifying the sentiments of e-mails using an efficient and effective algorithm is very important and useful step in the domain of e-mail forensics. In this work, support vector machine, k-nearest neighbour, and neural network back-propagation algorithms are used to classify the sentiments of e-mail into positive, negative and neutral categories using self-curated e-mail dataset. This dataset is a combination of Enron's e-mail dataset and publicly available messages converted into e-mails. This paper presents a comparative study of classification approaches for e-mail analysis. Finally, it is concluded that the neural network with the back-propagation training algorithm provides the best results considering the accuracy and the memory requirements with the little compromise on the time required to recognise the sentiment of a given e-mail.
      Keywords: e-mail mining; e-mail classification; k-nearest neighbour; neural network; support vector machine; forensic; abusive; threatening
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 411 - 427
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109485
      Issue No: Vol. 13, No. 3/4 (2020)
       
  • Intruder model for generating attack scenarios in computer systems
    • Authors: Pranjal S. Bogawar, K.K. Bhoyar
      Pages: 428 - 443
      Abstract: In this paper, a new technique for automatic generation of complex intruder attacks is proposed. In this approach, the generation of attack scenarios is guided by an intruder strategy. Thus, only attack scenarios achieving the intruder objectives are generated. Therefore, the generated attack graph do not contain redundant nodes or edges, and enables a network administrator to have a better visualisation and apprehension of different attack scenarios for a computer network. In this way, our approach is made as a candidate for increasing accuracy of the attack graph generated based on the use of the intruder strategy.
      Keywords: computer security; network; vulnerability; intruder; modelling; attack scenarios; formal technique; attack graph
      Citation: International Journal of Information and Computer Security, Vol. 13, No. 3/4 (2020) pp. 428 - 443
      PubDate: 2020-09-10T23:20:50-05:00
      DOI: 10.1504/IJICS.2020.109486
      Issue No: Vol. 13, No. 3/4 (2020)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 100.24.125.162
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-