Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp27.bht:"
@article{DBLP:journals/isjgp/Al-KazazIT18, author = {Noor R. Al{-}Kazaz and Sean A. Irvine and William John Teahan}, title = {An automatic cryptanalysis of simple substitution ciphers using compression}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {1}, pages = {57--75}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1426799}, doi = {10.1080/19393555.2018.1426799}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Al-KazazIT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AlotaibiFC18, author = {Saud Alotaibi and Steven Furnell and Nathan L. Clarke}, title = {A novel transparent user authentication approach for mobile applications}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {5-6}, pages = {292--305}, year = {2018}, url = {https://doi.org/10.1080/19393555.2019.1609628}, doi = {10.1080/19393555.2019.1609628}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AlotaibiFC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AmranZS18, author = {Ammar Amran and Zarul Fitri Zaaba and Manmeet Kaur Mahinderjit Singh}, title = {Habituation effects in computer security warning}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {2}, pages = {119--131}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1448492}, doi = {10.1080/19393555.2018.1448492}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/AmranZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AmranZS18a, author = {Ammar Amran and Zarul Fitri Zaaba and Manmeet Kaur Mahinderjit Singh}, title = {Habituation effects in computer security warning}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {4}, pages = {192--204}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1505008}, doi = {10.1080/19393555.2018.1505008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AmranZS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ChenCN18, author = {Longbin Chen and Li{-}Chiou Chen and Nader Nassar}, title = {Seed-based authentication for mobile clients across multiple devices}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {1}, pages = {29--41}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1423713}, doi = {10.1080/19393555.2018.1423713}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ChenCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DelendaN18, author = {Sabah Delenda and Lemnouar Noui}, title = {A new steganography algorithm using polar decomposition}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {3}, pages = {133--144}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1454557}, doi = {10.1080/19393555.2018.1454557}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DelendaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GajbhiyeKSS18, author = {Samta Gajbhiye and Sanjeev Karmakar and Monisha Sharma and Sanjay Sharma}, title = {Two-party secure connection in Bluetooth-enabled devices}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {1}, pages = {42--56}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1423714}, doi = {10.1080/19393555.2018.1423714}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GajbhiyeKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KaurDOSM18, author = {Jasmin Kaur and Rozita A. Dara and Charlie Obimbo and Fei Song and Karen Menard}, title = {A comprehensive keyword analysis of online privacy policies}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {5-6}, pages = {260--275}, year = {2018}, url = {https://doi.org/10.1080/19393555.2019.1606368}, doi = {10.1080/19393555.2019.1606368}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KaurDOSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KauspadieneRCJR18, author = {Laima Kauspadiene and Simona Ramanauskaite and Antanas Cenys and Justinas Janulevicius and Justinas Rastenis}, title = {Modeling of enterprise management structure for data leakage evaluation}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {1}, pages = {1--13}, year = {2018}, url = {https://doi.org/10.1080/19393555.2017.1423136}, doi = {10.1080/19393555.2017.1423136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KauspadieneRCJR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Lopriore18, author = {Lanfranco Lopriore}, title = {Key management in tree shaped hierarchies}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {4}, pages = {205--213}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1516835}, doi = {10.1080/19393555.2018.1516835}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Lopriore18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MendezPY18, author = {Diego M. Mendez and Ioannis Papapanagiotou and Baijian Yang}, title = {Internet of things: Survey on security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {3}, pages = {162--182}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1458258}, doi = {10.1080/19393555.2018.1458258}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MendezPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MerabetB18, author = {Nour El Houda Asma Merabet and Redha Benzid}, title = {Progressive image secret sharing scheme based on Boolean operations with perfect reconstruction capability}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {1}, pages = {14--28}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1423712}, doi = {10.1080/19393555.2018.1423712}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MerabetB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MwitondiZ18, author = {Kassim S. Mwitondi and Shahrzad Zargari}, title = {An iterative multiple sampling method for intrusion detection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {4}, pages = {230--239}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1539790}, doi = {10.1080/19393555.2018.1539790}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MwitondiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/NaveenaR18, author = {Ambidi Naveena and Katta Rama Linga Reddy}, title = {Malicious node prevention and mitigation in MANETs using a hybrid security model}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {2}, pages = {92--101}, year = {2018}, url = {https://doi.org/10.1080/19393555.2017.1415399}, doi = {10.1080/19393555.2017.1415399}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/NaveenaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OlakanmiO18, author = {Oladayo Olufemi Olakanmi and Samuel Oluwaseye Oke}, title = {{MASHED:} Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {5-6}, pages = {276--291}, year = {2018}, url = {https://doi.org/10.1080/19393555.2019.1609627}, doi = {10.1080/19393555.2019.1609627}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/OlakanmiO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PradeepJ18, author = {K. Pradeep and T. Prem Jacob}, title = {{CGSA} scheduler: {A} multi-objective-based hybrid approach for task scheduling in cloud environment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {2}, pages = {77--91}, year = {2018}, url = {https://doi.org/10.1080/19393555.2017.1407848}, doi = {10.1080/19393555.2017.1407848}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/PradeepJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PrakashaMAKP18, author = {Krishna Prakasha and Balachandra Muniyal and Vasundhara Acharya and Suyash Krishna and Smriti Prakash}, title = {Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {4}, pages = {214--229}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1516836}, doi = {10.1080/19393555.2018.1516836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PrakashaMAKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SelvaganapathyN18, author = {Shymalagowri Selvaganapathy and Mathappan Nivaashini and Hemapriya Natarajan}, title = {Deep belief network based detection and categorization of malicious URLs}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {3}, pages = {145--161}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1456577}, doi = {10.1080/19393555.2018.1456577}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SelvaganapathyN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ShanthiMK18, author = {K. Shanthi and D. Murugan and T. Ganesh Kumar}, title = {Trust-based intrusion detection with secure key management integrated into {MANET}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {4}, pages = {183--191}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1505007}, doi = {10.1080/19393555.2018.1505007}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ShanthiMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SharmaDG18, author = {Ram Gopal Sharma and Priti Dimri and Hitendra Garg}, title = {Visual cryptographic techniques for secret image sharing: a review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {5-6}, pages = {241--259}, year = {2018}, url = {https://doi.org/10.1080/19393555.2019.1567872}, doi = {10.1080/19393555.2019.1567872}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SharmaDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SimsekOMO18, author = {Mehmet Ulvi Simsek and Feyza Yildirim Okay and Dilan Mert and Suat {\"{O}}zdemir}, title = {{TPS3:} {A} privacy preserving data collection protocol for smart grids}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {27}, number = {2}, pages = {102--118}, year = {2018}, url = {https://doi.org/10.1080/19393555.2018.1446231}, doi = {10.1080/19393555.2018.1446231}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SimsekOMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.