Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp27.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/Al-KazazIT18,
  author       = {Noor R. Al{-}Kazaz and
                  Sean A. Irvine and
                  William John Teahan},
  title        = {An automatic cryptanalysis of simple substitution ciphers using compression},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {1},
  pages        = {57--75},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1426799},
  doi          = {10.1080/19393555.2018.1426799},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Al-KazazIT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AlotaibiFC18,
  author       = {Saud Alotaibi and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {A novel transparent user authentication approach for mobile applications},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {5-6},
  pages        = {292--305},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2019.1609628},
  doi          = {10.1080/19393555.2019.1609628},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AlotaibiFC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AmranZS18,
  author       = {Ammar Amran and
                  Zarul Fitri Zaaba and
                  Manmeet Kaur Mahinderjit Singh},
  title        = {Habituation effects in computer security warning},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {2},
  pages        = {119--131},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1448492},
  doi          = {10.1080/19393555.2018.1448492},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/AmranZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AmranZS18a,
  author       = {Ammar Amran and
                  Zarul Fitri Zaaba and
                  Manmeet Kaur Mahinderjit Singh},
  title        = {Habituation effects in computer security warning},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {4},
  pages        = {192--204},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1505008},
  doi          = {10.1080/19393555.2018.1505008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AmranZS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ChenCN18,
  author       = {Longbin Chen and
                  Li{-}Chiou Chen and
                  Nader Nassar},
  title        = {Seed-based authentication for mobile clients across multiple devices},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {1},
  pages        = {29--41},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1423713},
  doi          = {10.1080/19393555.2018.1423713},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ChenCN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DelendaN18,
  author       = {Sabah Delenda and
                  Lemnouar Noui},
  title        = {A new steganography algorithm using polar decomposition},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {3},
  pages        = {133--144},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1454557},
  doi          = {10.1080/19393555.2018.1454557},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DelendaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GajbhiyeKSS18,
  author       = {Samta Gajbhiye and
                  Sanjeev Karmakar and
                  Monisha Sharma and
                  Sanjay Sharma},
  title        = {Two-party secure connection in Bluetooth-enabled devices},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {1},
  pages        = {42--56},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1423714},
  doi          = {10.1080/19393555.2018.1423714},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GajbhiyeKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KaurDOSM18,
  author       = {Jasmin Kaur and
                  Rozita A. Dara and
                  Charlie Obimbo and
                  Fei Song and
                  Karen Menard},
  title        = {A comprehensive keyword analysis of online privacy policies},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {5-6},
  pages        = {260--275},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2019.1606368},
  doi          = {10.1080/19393555.2019.1606368},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KaurDOSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KauspadieneRCJR18,
  author       = {Laima Kauspadiene and
                  Simona Ramanauskaite and
                  Antanas Cenys and
                  Justinas Janulevicius and
                  Justinas Rastenis},
  title        = {Modeling of enterprise management structure for data leakage evaluation},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {1},
  pages        = {1--13},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2017.1423136},
  doi          = {10.1080/19393555.2017.1423136},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KauspadieneRCJR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Lopriore18,
  author       = {Lanfranco Lopriore},
  title        = {Key management in tree shaped hierarchies},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {4},
  pages        = {205--213},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1516835},
  doi          = {10.1080/19393555.2018.1516835},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Lopriore18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MendezPY18,
  author       = {Diego M. Mendez and
                  Ioannis Papapanagiotou and
                  Baijian Yang},
  title        = {Internet of things: Survey on security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {3},
  pages        = {162--182},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1458258},
  doi          = {10.1080/19393555.2018.1458258},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MendezPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MerabetB18,
  author       = {Nour El Houda Asma Merabet and
                  Redha Benzid},
  title        = {Progressive image secret sharing scheme based on Boolean operations
                  with perfect reconstruction capability},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {1},
  pages        = {14--28},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1423712},
  doi          = {10.1080/19393555.2018.1423712},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MerabetB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MwitondiZ18,
  author       = {Kassim S. Mwitondi and
                  Shahrzad Zargari},
  title        = {An iterative multiple sampling method for intrusion detection},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {4},
  pages        = {230--239},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1539790},
  doi          = {10.1080/19393555.2018.1539790},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MwitondiZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/NaveenaR18,
  author       = {Ambidi Naveena and
                  Katta Rama Linga Reddy},
  title        = {Malicious node prevention and mitigation in MANETs using a hybrid
                  security model},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {2},
  pages        = {92--101},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2017.1415399},
  doi          = {10.1080/19393555.2017.1415399},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/NaveenaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OlakanmiO18,
  author       = {Oladayo Olufemi Olakanmi and
                  Samuel Oluwaseye Oke},
  title        = {{MASHED:} Security and privacy-aware mutual authentication scheme
                  for heterogeneous and distributed mobile cloud computing services},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {5-6},
  pages        = {276--291},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2019.1609627},
  doi          = {10.1080/19393555.2019.1609627},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/OlakanmiO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PradeepJ18,
  author       = {K. Pradeep and
                  T. Prem Jacob},
  title        = {{CGSA} scheduler: {A} multi-objective-based hybrid approach for task
                  scheduling in cloud environment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {2},
  pages        = {77--91},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2017.1407848},
  doi          = {10.1080/19393555.2017.1407848},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/PradeepJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PrakashaMAKP18,
  author       = {Krishna Prakasha and
                  Balachandra Muniyal and
                  Vasundhara Acharya and
                  Suyash Krishna and
                  Smriti Prakash},
  title        = {Efficient digital certificate verification in wireless public key
                  infrastructure using enhanced certificate revocation list},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {4},
  pages        = {214--229},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1516836},
  doi          = {10.1080/19393555.2018.1516836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PrakashaMAKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SelvaganapathyN18,
  author       = {Shymalagowri Selvaganapathy and
                  Mathappan Nivaashini and
                  Hemapriya Natarajan},
  title        = {Deep belief network based detection and categorization of malicious
                  URLs},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {3},
  pages        = {145--161},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1456577},
  doi          = {10.1080/19393555.2018.1456577},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SelvaganapathyN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ShanthiMK18,
  author       = {K. Shanthi and
                  D. Murugan and
                  T. Ganesh Kumar},
  title        = {Trust-based intrusion detection with secure key management integrated
                  into {MANET}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {4},
  pages        = {183--191},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1505007},
  doi          = {10.1080/19393555.2018.1505007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ShanthiMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SharmaDG18,
  author       = {Ram Gopal Sharma and
                  Priti Dimri and
                  Hitendra Garg},
  title        = {Visual cryptographic techniques for secret image sharing: a review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {5-6},
  pages        = {241--259},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2019.1567872},
  doi          = {10.1080/19393555.2019.1567872},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SharmaDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SimsekOMO18,
  author       = {Mehmet Ulvi Simsek and
                  Feyza Yildirim Okay and
                  Dilan Mert and
                  Suat {\"{O}}zdemir},
  title        = {{TPS3:} {A} privacy preserving data collection protocol for smart
                  grids},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {27},
  number       = {2},
  pages        = {102--118},
  year         = {2018},
  url          = {https://doi.org/10.1080/19393555.2018.1446231},
  doi          = {10.1080/19393555.2018.1446231},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SimsekOMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics