Report date: Dec 2,2025 Conflict count: 369596 Publisher: Inderscience Enterprises Ltd. Title count: 346 Conflict count: 3780 ========================================================== Created: 2022-11-05 08:30:07 ConfID: 6670639 CauseID: 1547250232 OtherID: 1545047428 JT: International Journal of Information and Computer Security MD: Kumar,19,1/2,73,2022,Cryptanalysis and improvement of an authentication scheme for IoT DOI: 10.1504/IJICS.2022.10051392(Journal) (6670639-N) DOI: 10.1504/IJICS.2022.126754(Journal) ========================================================== Created: 2025-11-01 12:30:15 ConfID: 8399176 CauseID: 1719153198 OtherID: 1712437172 JT: International Journal of Information and Computer Security MD: Cai,28,3,265,2025,Federated learning: frameworks, optimisation algorithms, security threats and defences DOI: 10.1504/IJICS.2025.10073505(Journal) (8399176-N) DOI: 10.1504/IJICS.2025.149454(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581748 CauseID: 1540784654 OtherID: 1540066336 JT: International Journal of Information and Computer Security MD: Wang,18,3/4,237,2022,Secure zero-effort two-factor authentication based on time-frequency audio analysis DOI: 10.1504/IJICS.2022.10050306(Journal) (6581748-N) DOI: 10.1504/IJICS.2022.125243(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581749 CauseID: 1540784654 OtherID: 1540066339 JT: International Journal of Information and Computer Security MD: Amraoui,18,3/4,262,2022,On a secured channel selection in cognitive radio networks DOI: 10.1504/IJICS.2022.10050307(Journal) (6581749-N) DOI: 10.1504/IJICS.2022.125244(Journal) ========================================================== Created: 2022-09-06 07:30:17 ConfID: 6581750 CauseID: 1540784654 OtherID: 1540066341 JT: International Journal of Information and Computer Security MD: Ren,18,3/4,278,2022,A feature selection method based on neighbourhood rough set and genetic algorithm for intrusion detection DOI: 10.1504/IJICS.2022.10050308(Journal) (6581750-N) DOI: 10.1504/IJICS.2022.125245(Journal) ========================================================== Created: 2025-09-30 11:30:20 ConfID: 8328058 CauseID: 1714369862 OtherID: 1710447899 JT: International Journal of Information and Computer Security MD: Gupta,28,2,145,2025,Leveraging AI for enhanced deepfake detection! Developing framework for designing safe ecosystem to safeguard digital authenticity DOI: 10.1504/IJICS.2025.10073201(Journal) (8328058-N) DOI: 10.1504/IJICS.2025.148859(Journal) ========================================================== Created: 2025-09-30 11:30:20 ConfID: 8328057 CauseID: 1714369862 OtherID: 1710447904 JT: International Journal of Information and Computer Security MD: Azhar,28,2,181,2025,GESKI: a gas efficient structure for processing spatial keyword queries with hybrid storage architecture DOI: 10.1504/IJICS.2025.10073200(Journal) (8328057-N) DOI: 10.1504/IJICS.2025.148858(Journal) ========================================================== Created: 2025-09-30 11:30:20 ConfID: 8328056 CauseID: 1714369862 OtherID: 1710447425 JT: International Journal of Information and Computer Security MD: Lonkar,28,2,227,2025,EBBSMWN: design of an energy-aware blockchain-based bioinspired security model of wireless networks DOI: 10.1504/IJICS.2025.10073199(Journal) (8328056-N) DOI: 10.1504/IJICS.2025.148857(Journal) ========================================================== Created: 2025-11-22 12:30:30 ConfID: 8475537 CauseID: 1722349583 OtherID: 1714568321 JT: International Journal of Information and Computer Security MD: Wu,28,4,403,2025,Certificate-less key secure communication protocol for internet of things based on smart contracts DOI: 10.1504/IJICS.2025.10073818(Journal) (8475537-N) DOI: 10.1504/IJICS.2025.150031(Journal) ========================================================== Created: 2025-11-22 12:30:30 ConfID: 8475536 CauseID: 1722349583 OtherID: 1714568320 JT: International Journal of Information and Computer Security MD: Wang,28,4,474,2025,Research on key technologies of cross-domain authentication for intelligent vehicle networks based on massive identity resolution DOI: 10.1504/IJICS.2025.10073817(Journal) (8475536-N) DOI: 10.1504/IJICS.2025.150030(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363537 CauseID: 1425310467 OtherID: 1424920242 JT: International Journal of Information and Computer Security MD: Li,10,2/3,149,2018,The research of reputation incentive mechanism of P2P network file sharing system DOI: 10.1504/IJICS.2018.10012570(Journal) (5363537-N) DOI: 10.1504/IJICS.2018.091460(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363540 CauseID: 1425310467 OtherID: 1424920249 JT: International Journal of Information and Computer Security MD: Amita,10,2/3,261,2018,Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique DOI: 10.1504/IJICS.2018.10012572(Journal) (5363540-N) DOI: 10.1504/IJICS.2018.091463(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363545 CauseID: 1425310467 OtherID: 1424920245 JT: International Journal of Information and Computer Security MD: Raja,10,2/3,303,2018,Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques DOI: 10.1504/IJICS.2018.10012575(Journal) (5363545-N) DOI: 10.1504/IJICS.2018.091468(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363544 CauseID: 1425310467 OtherID: 1424920244 JT: International Journal of Information and Computer Security MD: Song,10,2/3,237,2018,Improved pixel relevance based on Mahalanobis distance for image segmentation DOI: 10.1504/IJICS.2018.10012573(Journal) (5363544-N) DOI: 10.1504/IJICS.2018.091464(Journal) ========================================================== Created: 2018-05-02 07:30:05 ConfID: 5363529 CauseID: 1425310467 OtherID: 1424920239 JT: International Journal of Information and Computer Security MD: Gupta,10,2/3,170,2018,Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks DOI: 10.1504/IJICS.2018.10012568(Journal) (5363529-N) DOI: 10.1504/IJICS.2018.091455(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691734 CauseID: 1557111599 OtherID: 1555137448 JT: International Journal of Information and Computer Security MD: Verma,20,1/2,133,2023,Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering DOI: 10.1504/IJICS.2023.10052969(Journal) (6691734-N) DOI: 10.1504/IJICS.2023.128005(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691732 CauseID: 1557111599 OtherID: 1555137436 JT: International Journal of Information and Computer Security MD: Chatterjee,20,1/2,48,2023,Attack resistant chaos-based cryptosystem by modified baker map and logistic map DOI: 10.1504/IJICS.2023.10052966(Journal) (6691732-N) DOI: 10.1504/IJICS.2023.128002(Journal) ========================================================== Created: 2023-01-05 07:30:33 ConfID: 6691733 CauseID: 1557111599 OtherID: 1555137437 JT: International Journal of Information and Computer Security MD: Emara,20,1/2,84,2023,A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm DOI: 10.1504/IJICS.2023.10052967(Journal) (6691733-N) DOI: 10.1504/IJICS.2023.128003(Journal)