Report date: Mar 26, 2024 Conflict count: 356923 Publisher: Inderscience Enterprises Ltd. Title count: 329 Conflict count: 3279 ========================================================== Created: 2018-05-02 07:30:05.0 ConfID: 5363529 CauseID: 1425310467 OtherID: 1424920239 JT: International Journal of Information and Computer Security MD: Gupta, 10 ,2/3,170,2018,Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks DOI: 10.1504/IJICS.2018.10012568(Journal) (5363529-N ) DOI: 10.1504/IJICS.2018.091455(Journal) ========================================================== Created: 2018-05-02 07:30:05.0 ConfID: 5363537 CauseID: 1425310467 OtherID: 1424920242 JT: International Journal of Information and Computer Security MD: Li, 10 ,2/3,149,2018,The research of reputation incentive mechanism of P2P network file sharing system DOI: 10.1504/IJICS.2018.10012570(Journal) (5363537-N ) DOI: 10.1504/IJICS.2018.091460(Journal) ========================================================== Created: 2018-05-02 07:30:05.0 ConfID: 5363540 CauseID: 1425310467 OtherID: 1424920249 JT: International Journal of Information and Computer Security MD: Amita, 10 ,2/3,261,2018,Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique DOI: 10.1504/IJICS.2018.10012572(Journal) (5363540-N ) DOI: 10.1504/IJICS.2018.091463(Journal) ========================================================== Created: 2018-05-02 07:30:05.0 ConfID: 5363544 CauseID: 1425310467 OtherID: 1424920244 JT: International Journal of Information and Computer Security MD: Song, 10 ,2/3,237,2018,Improved pixel relevance based on Mahalanobis distance for image segmentation DOI: 10.1504/IJICS.2018.10012573(Journal) (5363544-N ) DOI: 10.1504/IJICS.2018.091464(Journal) ========================================================== Created: 2018-05-02 07:30:05.0 ConfID: 5363545 CauseID: 1425310467 OtherID: 1424920245 JT: International Journal of Information and Computer Security MD: Raja, 10 ,2/3,303,2018,Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques DOI: 10.1504/IJICS.2018.10012575(Journal) (5363545-N ) DOI: 10.1504/IJICS.2018.091468(Journal) ========================================================== Created: 2022-09-06 07:30:17.0 ConfID: 6581748 CauseID: 1540784654 OtherID: 1540066336 JT: International Journal of Information and Computer Security MD: Wang, 18 ,3/4,237,2022,Secure zero-effort two-factor authentication based on time-frequency audio analysis DOI: 10.1504/IJICS.2022.10050306(Journal) (6581748-N ) DOI: 10.1504/IJICS.2022.125243(Journal) ========================================================== Created: 2022-09-06 07:30:17.0 ConfID: 6581749 CauseID: 1540784654 OtherID: 1540066339 JT: International Journal of Information and Computer Security MD: Amraoui, 18 ,3/4,262,2022,On a secured channel selection in cognitive radio networks DOI: 10.1504/IJICS.2022.10050307(Journal) (6581749-N ) DOI: 10.1504/IJICS.2022.125244(Journal) ========================================================== Created: 2022-09-06 07:30:17.0 ConfID: 6581750 CauseID: 1540784654 OtherID: 1540066341 JT: International Journal of Information and Computer Security MD: Ren, 18 ,3/4,278,2022,A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection DOI: 10.1504/IJICS.2022.10050308(Journal) (6581750-N ) DOI: 10.1504/IJICS.2022.125245(Journal) ========================================================== Created: 2022-11-05 08:30:07.0 ConfID: 6670639 CauseID: 1547250232 OtherID: 1545047428 JT: International Journal of Information and Computer Security MD: Kumar, 19 ,1/2,73,2022,Cryptanalysis and improvement of an authentication scheme for IoT DOI: 10.1504/IJICS.2022.10051392(Journal) (6670639-N ) DOI: 10.1504/IJICS.2022.126754(Journal) ========================================================== Created: 2023-01-05 07:30:33.0 ConfID: 6691732 CauseID: 1557111599 OtherID: 1555137436 JT: International Journal of Information and Computer Security MD: Chatterjee, 20 ,1/2,48,2023,Attack resistant chaos-based cryptosystem by modified baker map and logistic map DOI: 10.1504/IJICS.2023.10052966(Journal) (6691732-N ) DOI: 10.1504/IJICS.2023.128002(Journal) ========================================================== Created: 2023-01-05 07:30:33.0 ConfID: 6691733 CauseID: 1557111599 OtherID: 1555137437 JT: International Journal of Information and Computer Security MD: Emara, 20 ,1/2,84,2023,A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm DOI: 10.1504/IJICS.2023.10052967(Journal) (6691733-N ) DOI: 10.1504/IJICS.2023.128003(Journal) ========================================================== Created: 2023-01-05 07:30:33.0 ConfID: 6691734 CauseID: 1557111599 OtherID: 1555137448 JT: International Journal of Information and Computer Security MD: Verma, 20 ,1/2,133,2023,Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering DOI: 10.1504/IJICS.2023.10052969(Journal) (6691734-N ) DOI: 10.1504/IJICS.2023.128005(Journal)