ISeCure

短名
Journal Impact0.87
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4)
ISSN2008-2045, 2008-3076
h-index7

期刊主页
出版信息出版商: Iranian Society of Cryptology出版周期: 期刊类型: journal
基本数据创刊年份: 2019原创研究文献占比100.00%自引率:25.00%Gold OA占比: 0.00%
平均审稿周期 网友分享经验:10 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis

2021-9-6

A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly

2021-9-6

A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes

2021-9-6

A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack

2021-9-6

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

2021-9-5

An Efficient Pairing-Free Identity-Based Certificateless Signcryption

2021-8-28

Ransomware Detection Based on PE Header Using Convolutional Neural Networks

2021-8-28

A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems

2021-8-28

Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks

2021-7-1

Better Sampling Method of Enumeration Solution for BKZ-Simulation

2021-7-1

Blind Multipurpose Image Watermarking with Perfect Security

2021-7-1

IDOT: Black-Box Detection of Access Control Violations in Web Applications

2021-7-1

An Obfuscation Method Based on CFGLUTs for Security of FPGAs

2021-7-1

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

2021-7-1

File Fragment Type Classification by Bag-Of-Visual-Words

2021-5-8

Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

2021-5-8

OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing

2021-1-1

An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery

2021-1-1

A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

2021-1-1

Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

2021-1-1

Knowledge Discovery in Cloud-Computing Environment and the Challenges

2020-11-1

Indexed View Technique to Speed-up Data Warehouse Query Processing

2020-11-1

A New Derivation of the Leftover Hash Lemma.

2020-11-1

The Use of Local Sensitive Hashing for E-learner Face Identification.

2020-11-1

Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

2020-11-1

A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

2020-11-1

Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

2020-11-1

A Multilingual Infobot in Airports

2020-11-1

Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer

2020-11-1

Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology

2020-11-1

Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox.

2020-11-1

CEMD: A Cluster-based Ensemble Motif Discovery Tool

2020-11-1

The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

2020-11-1

The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

2020-11-1

Identifying Entrepreneurial Influencers on Twitter

2020-11-1

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

2020-7-1

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

2020-7-1

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

2020-7-1

Enhanced Flush+Reload Attack on AES

2020-7-1

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

2020-7-1

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

2020-7-1

New High Secure Network Steganography Method Based on Packet Length

2020-1-1

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

2020-1-1

Improved Univariate Microaggregation for Integer Values

2020-1-1

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

2020-1-1

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

2020-1-1

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption.

2020-1-1

Access and Mobility Policy Control at the Network Edge

2019-8-1

An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling

2019-8-1

IoT Protocols Based Fog/Cloud over High Traffic

2019-8-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司