Search dblp for Publications

export results for "stream:streams/journals/ijsppc:"

 download as .bib file

@article{DBLP:journals/ijsppc/Sebastian23,
  author       = {Glorin Sebastian},
  title        = {A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and
                  Regulatory Framework},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijsppc.315591},
  doi          = {10.4018/IJSPPC.315591},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Sebastian23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/A22,
  author       = {Hemlata A.},
  title        = {Analysis of a Multiple-Shift Computer-Based Examination Evaluation
                  System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.307112},
  doi          = {10.4018/IJSPPC.307112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/A22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/AggarwalGCA22,
  author       = {Alankrita Aggarwal and
                  Shivani Gaba and
                  Shally Chawla and
                  Anoopa Arya},
  title        = {Recognition of Alphanumeric Patterns Using Backpropagation Algorithm
                  for Design and Implementation With {ANN}},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.4018/IJSPPC.295086},
  doi          = {10.4018/IJSPPC.295086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AggarwalGCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/BouararaCR22,
  author       = {Hadj Ahmed Bouarara and
                  Bentadj Cheimaa and
                  Mohamed Elhadi Rahmani},
  title        = {Deep Convolutional Real Time Model {(DCRTM)} for American Sign Language
                  {(ASL)} Recognition},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.309079},
  doi          = {10.4018/IJSPPC.309079},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/BouararaCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/BuhariOJK22,
  author       = {Bello Alhaji Buhari and
                  Afolayan Ayodele Obiniyi and
                  Sahalu B. Junaidu and
                  Armand Florentin Donfack Kana},
  title        = {Trends in Remote User Authentication Based on Smart Card and External
                  Memory},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--10},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.307148},
  doi          = {10.4018/IJSPPC.307148},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/BuhariOJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/GharibK22,
  author       = {Hadj Gharib and
                  Abdelkader Khobzaoui},
  title        = {DNA-Based E-Voting System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.302008},
  doi          = {10.4018/IJSPPC.302008},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/GharibK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/HallouFHN22,
  author       = {Amal Hallou and
                  Tarik Fissaa and
                  Hatim Hafiddi and
                  Mahmoud Nassar},
  title        = {A {DSPL} and Reinforcement Learning Approach for Context-Aware IoT
                  Systems Development},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--22},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.310084},
  doi          = {10.4018/IJSPPC.310084},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/HallouFHN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/HamoudAB22,
  author       = {Aymen Hamoud and
                  Esma A{\"{\i}}meur and
                  Mohamed Benmohammed},
  title        = {Individual Processing of Phishing Emails: Towards a Phishing Detection
                  Framework},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--22},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.311060},
  doi          = {10.4018/IJSPPC.311060},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/HamoudAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KakneC22,
  author       = {Ashish Sudhir Kakne and
                  P. M. Chouragade},
  title        = {Home Automation and Application With Bolt IoT},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--7},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.313047},
  doi          = {10.4018/IJSPPC.313047},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KakneC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KhobzaouiMB22,
  author       = {Abdelkader Khobzaoui and
                  Boualem Mansouri and
                  Kadda Benyahia},
  title        = {DNA-Based {LSB} Steganography},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--9},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.302010},
  doi          = {10.4018/IJSPPC.302010},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KhobzaouiMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Pradhan22,
  author       = {Padma Lochan Pradhan},
  title        = {Impact of Cryptographic Key on Scalable Computing},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--17},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.313046},
  doi          = {10.4018/IJSPPC.313046},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Pradhan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/SajidIRK22,
  author       = {Rafat Ul Aman Sajid and
                  Sirajul Islam and
                  Abul Bashar Khan Rakib and
                  Amandeep Kaur},
  title        = {Interpretation on the Google Cloud Platform and Its Wide Cloud Services},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--7},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.313586},
  doi          = {10.4018/IJSPPC.313586},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/SajidIRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Sebastian22,
  author       = {Glorin Sebastian},
  title        = {A Study on Metaverse Awareness, Cyber Risks, and Steps for Increased
                  Adoption},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.308785},
  doi          = {10.4018/IJSPPC.308785},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Sebastian22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/SharmaS22,
  author       = {Vandana Sharma and
                  Rewa Sharma},
  title        = {A Systematic Survey of Automatic Loan Approval System Based on Machine
                  Learning},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--25},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.304893},
  doi          = {10.4018/IJSPPC.304893},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/SharmaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Syed22,
  author       = {Mohammad Haider Syed},
  title        = {Heart Disease Prediction Model Using Varied Classifiers with Score-Level
                  Fusion},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--39},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.313587},
  doi          = {10.4018/IJSPPC.313587},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Syed22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/TiwariG22,
  author       = {Ashish Tiwari and
                  Ritu Garg},
  title        = {A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--21},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.313048},
  doi          = {10.4018/IJSPPC.313048},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/TiwariG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ZannouDV22,
  author       = {Boris Jerson Zannou and
                  Tahirou Djara and
                  Antoine Vianou},
  title        = {Non-Contact Fingerprint Template Protection Using {DFT} Combined Random
                  Projection},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1--21},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsppc.302007},
  doi          = {10.4018/IJSPPC.302007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ZannouDV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/AsthanaP21,
  author       = {Abhishek Asthana and
                  Padma Lochan Pradhan},
  title        = {Proposed Abelian {ACM} Method Optimizing: The Risk on a Real-Time
                  Unix Operating System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {4},
  pages        = {33--52},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021100103},
  doi          = {10.4018/IJSPPC.2021100103},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AsthanaP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/DenkoPF21,
  author       = {Blaz Denko and
                  Spela Pecnik and
                  Iztok Fister Jr.},
  title        = {A Comprehensive Comparison of Hybrid Mobile Application Development
                  Frameworks},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {1},
  pages        = {78--90},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021010105},
  doi          = {10.4018/IJSPPC.2021010105},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/DenkoPF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Gao21,
  author       = {Terry Gao},
  title        = {Detection and Tracking Cows by Computer Vision and Image Classification
                  Methods},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {1},
  pages        = {1--45},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021010101},
  doi          = {10.4018/IJSPPC.2021010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Gao21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/GharsellaouiG21,
  author       = {Lema Gharsellaoui and
                  Moez Ghariani},
  title        = {Isolated Site Wind System Start-Up System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {2},
  pages        = {29--50},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021040103},
  doi          = {10.4018/IJSPPC.2021040103},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/GharsellaouiG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/JainAM21,
  author       = {Shivani Jain and
                  Alankrita Aggarwal and
                  Sandeep Mittal},
  title        = {A Study: Chikungunya Using Social Media Analytics in Delhi},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {1},
  pages        = {46--56},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021010102},
  doi          = {10.4018/IJSPPC.2021010102},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/JainAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KanungoSA21,
  author       = {Sonal Kanungo and
                  Dolly Sharma and
                  Alankrita Aggarwal},
  title        = {{COVID-19:} Impact and New Normal},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {1},
  pages        = {57--68},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021010103},
  doi          = {10.4018/IJSPPC.2021010103},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KanungoSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KumarR21,
  author       = {Vinod Kumar and
                  Ram Murti Rawat},
  title        = {Low Power Restoration Circuits Reduce Swing Voltages of {SRAM} Cell
                  With Improved Read and Write Margins},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {2},
  pages        = {16--28},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021040102},
  doi          = {10.4018/IJSPPC.2021040102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KumarR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/M21,
  author       = {Sushrut M.},
  title        = {Applications of Big Data in Disaster Management: {A} Review},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {4},
  pages        = {1--16},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021100101},
  doi          = {10.4018/IJSPPC.2021100101},
  timestamp    = {Sun, 24 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/MalhotraSM21,
  author       = {Jyotsna Malhotra and
                  Jasleen Kaur Sethi and
                  Mamta Mittal},
  title        = {Analysis of Big Data Using Two Mapper Files in Hadoop},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {1},
  pages        = {69--77},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021010104},
  doi          = {10.4018/IJSPPC.2021010104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/MalhotraSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/RajuR21,
  author       = {P. Salman Raju and
                  P. Venkateswara Rao},
  title        = {An Optimistic Security Model for Improving Cyber Security Using Adaptive
                  Algorithms to Prevent {SQL} Injection Attacks},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {4},
  pages        = {17--32},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021100102},
  doi          = {10.4018/IJSPPC.2021100102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/RajuR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/SinghSA21,
  author       = {Shweta Singh and
                  Ayush Sharma and
                  Alankrita Aggarwal},
  title        = {Performance Comparison of Image Processing Techniques on Various Filters:
                  {A} Review},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {3},
  pages        = {34--42},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021070103},
  doi          = {10.4018/IJSPPC.2021070103},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/SinghSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/TP21,
  author       = {Arunambika T. and
                  Senthil Vadivu P.},
  title        = {Optimal Cloud Service Provider Selection Based on QoS Metrics},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {2},
  pages        = {1--15},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021040101},
  doi          = {10.4018/IJSPPC.2021040101},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/TP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/TanejaAMAK21,
  author       = {Pranav Taneja and
                  Manan Arora and
                  Abhay Mendiratta and
                  Alankrita Aggarwal and
                  Shailender Kumar},
  title        = {{COVID-19:} Impact and Need for Post-Pandemic Crowd Safety - {A} Review},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {3},
  pages        = {1--11},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021070101},
  doi          = {10.4018/IJSPPC.2021070101},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/TanejaAMAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/YakoheneYG21,
  author       = {Samuel Selassie Yakohene and
                  Winfred Yaokumah and
                  Ernest Barfo Boadi Gyebi},
  title        = {Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing
                  and Inference Attacks},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {13},
  number       = {3},
  pages        = {12--33},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsppc.2021070102},
  doi          = {10.4018/IJSPPC.2021070102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/YakoheneYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/AdhikaryBKD20,
  author       = {Kaushik Adhikary and
                  Shashi Bhushan and
                  Sunil Kumar and
                  Kamlesh Dutta},
  title        = {Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {1--18},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100101},
  doi          = {10.4018/IJSPPC.2020100101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AdhikaryBKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/AggarwalDS20,
  author       = {Alankrita Aggarwal and
                  Kanwalvir Singh Dhindsa and
                  P. K. Suri},
  title        = {Design for Software Risk Management Using Soft Computing and Simulated
                  Biological Approach},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {44--54},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040104},
  doi          = {10.4018/IJSPPC.2020040104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AggarwalDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/BajajP20,
  author       = {Divij Bajaj and
                  Dhanya Pramod},
  title        = {Conversational System, Intelligent Virtual Assistant {(IVA)} Named
                  {DIVA} Using Raspberry Pi},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {38--52},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100104},
  doi          = {10.4018/IJSPPC.2020100104},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/BajajP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ChathaAK20,
  author       = {Deepak Chatha and
                  Alankrita Aggarwal and
                  Rajender Kumar},
  title        = {Comparative Analysis of Proposed Artificial Neural Network {(ANN)}
                  Algorithm With Other Techniques},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {29--35},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010103},
  doi          = {10.4018/IJSPPC.2020010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ChathaAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/FatnassiGB20,
  author       = {Ahlem Fatnassi and
                  Hamza Gharsellaoui and
                  Sadok Bouamama},
  title        = {New Hybrid Proposed Solution for Video Steganography Based on Clustering
                  Algorithm},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {30--43},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040103},
  doi          = {10.4018/IJSPPC.2020040103},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/FatnassiGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Gahlawat20,
  author       = {Monica Gahlawat},
  title        = {Survey of Online Identity Management Techniques on Blockchain},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {19--28},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100102},
  doi          = {10.4018/IJSPPC.2020100102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Gahlawat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/GaoW20,
  author       = {Terry Gao and
                  Grace Ying Wang},
  title        = {Brain Signal Classification Based on Deep {CNN}},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {17--29},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040102},
  doi          = {10.4018/IJSPPC.2020040102},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/GaoW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/IdoughiA20,
  author       = {Djilali Idoughi and
                  Djeddi Abdelhakim},
  title        = {A User Centered Model Driven Service Oriented Ubiquitous Government
                  Design Approach},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {17--28},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010102},
  doi          = {10.4018/IJSPPC.2020010102},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/IdoughiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KKM20,
  author       = {Vijayaprabakaran K. and
                  Sathiyamurthy K. and
                  Ponniamma M.},
  title        = {Video-Based Human Activity Recognition for Elderly Using Convolutional
                  Neural Network},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {36--48},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010104},
  doi          = {10.4018/IJSPPC.2020010104},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KandpalP20,
  author       = {Meetu Kandpal and
                  Kalyani Ashesh Patel},
  title        = {Evaluation of the Dynamic Pricing Model in Cloud},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {20--29},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070102},
  doi          = {10.4018/IJSPPC.2020070102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KandpalP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/NC20,
  author       = {Divyabharathi D. N. and
                  Nagaraj G. Cholli},
  title        = {A Review on Identity and Access Management Server (KeyCloak)},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {46--53},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070104},
  doi          = {10.4018/IJSPPC.2020070104},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/NC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ReddyC20,
  author       = {G. Sekhar Reddy and
                  Suneetha Chittineni},
  title        = {UML-Based Data Warehouse Design Using Temporal Dimensional Modelling},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070101},
  doi          = {10.4018/IJSPPC.2020070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ReddyC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Shawky20,
  author       = {Negm Eldin Mohamed Shawky},
  title        = {Accuracy Enhancement of {GPS} for Tracking Multiple Drones Based on
                  {MCMC} Particle Filter},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010101},
  doi          = {10.4018/IJSPPC.2020010101},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Shawky20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/VermaP20,
  author       = {Nidhi Nigam Verma and
                  Deepika Pathak},
  title        = {Linear Regression on Internet Banking Adoption Dataset Using {WEKA}},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {29--37},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100103},
  doi          = {10.4018/IJSPPC.2020100103},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/VermaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Xu20,
  author       = {Li Xu},
  title        = {Research on Ant Colony Optimization With Tabu Search Ability},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040101},
  doi          = {10.4018/IJSPPC.2020040101},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Xu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ZhaiF20,
  author       = {Weifang Zhai and
                  Juan Feng},
  title        = {Research on Root Locus Correction Algorithm in Automatic Control System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {30--45},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070103},
  doi          = {10.4018/IJSPPC.2020070103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ZhaiF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics