Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijsppc:"
@article{DBLP:journals/ijsppc/Sebastian23, author = {Glorin Sebastian}, title = {A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {15}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijsppc.315591}, doi = {10.4018/IJSPPC.315591}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Sebastian23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/A22, author = {Hemlata A.}, title = {Analysis of a Multiple-Shift Computer-Based Examination Evaluation System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.307112}, doi = {10.4018/IJSPPC.307112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/A22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/AggarwalGCA22, author = {Alankrita Aggarwal and Shivani Gaba and Shally Chawla and Anoopa Arya}, title = {Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With {ANN}}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.4018/IJSPPC.295086}, doi = {10.4018/IJSPPC.295086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AggarwalGCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/BouararaCR22, author = {Hadj Ahmed Bouarara and Bentadj Cheimaa and Mohamed Elhadi Rahmani}, title = {Deep Convolutional Real Time Model {(DCRTM)} for American Sign Language {(ASL)} Recognition}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.309079}, doi = {10.4018/IJSPPC.309079}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/BouararaCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/BuhariOJK22, author = {Bello Alhaji Buhari and Afolayan Ayodele Obiniyi and Sahalu B. Junaidu and Armand Florentin Donfack Kana}, title = {Trends in Remote User Authentication Based on Smart Card and External Memory}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--10}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.307148}, doi = {10.4018/IJSPPC.307148}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/BuhariOJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/GharibK22, author = {Hadj Gharib and Abdelkader Khobzaoui}, title = {DNA-Based E-Voting System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.302008}, doi = {10.4018/IJSPPC.302008}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/GharibK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/HallouFHN22, author = {Amal Hallou and Tarik Fissaa and Hatim Hafiddi and Mahmoud Nassar}, title = {A {DSPL} and Reinforcement Learning Approach for Context-Aware IoT Systems Development}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--22}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.310084}, doi = {10.4018/IJSPPC.310084}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/HallouFHN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/HamoudAB22, author = {Aymen Hamoud and Esma A{\"{\i}}meur and Mohamed Benmohammed}, title = {Individual Processing of Phishing Emails: Towards a Phishing Detection Framework}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--22}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.311060}, doi = {10.4018/IJSPPC.311060}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/HamoudAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KakneC22, author = {Ashish Sudhir Kakne and P. M. Chouragade}, title = {Home Automation and Application With Bolt IoT}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--7}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.313047}, doi = {10.4018/IJSPPC.313047}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KakneC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KhobzaouiMB22, author = {Abdelkader Khobzaoui and Boualem Mansouri and Kadda Benyahia}, title = {DNA-Based {LSB} Steganography}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--9}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.302010}, doi = {10.4018/IJSPPC.302010}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KhobzaouiMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Pradhan22, author = {Padma Lochan Pradhan}, title = {Impact of Cryptographic Key on Scalable Computing}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.313046}, doi = {10.4018/IJSPPC.313046}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Pradhan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/SajidIRK22, author = {Rafat Ul Aman Sajid and Sirajul Islam and Abul Bashar Khan Rakib and Amandeep Kaur}, title = {Interpretation on the Google Cloud Platform and Its Wide Cloud Services}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--7}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.313586}, doi = {10.4018/IJSPPC.313586}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/SajidIRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Sebastian22, author = {Glorin Sebastian}, title = {A Study on Metaverse Awareness, Cyber Risks, and Steps for Increased Adoption}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.308785}, doi = {10.4018/IJSPPC.308785}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Sebastian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/SharmaS22, author = {Vandana Sharma and Rewa Sharma}, title = {A Systematic Survey of Automatic Loan Approval System Based on Machine Learning}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--25}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.304893}, doi = {10.4018/IJSPPC.304893}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/SharmaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Syed22, author = {Mohammad Haider Syed}, title = {Heart Disease Prediction Model Using Varied Classifiers with Score-Level Fusion}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--39}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.313587}, doi = {10.4018/IJSPPC.313587}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Syed22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/TiwariG22, author = {Ashish Tiwari and Ritu Garg}, title = {A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.313048}, doi = {10.4018/IJSPPC.313048}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/TiwariG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ZannouDV22, author = {Boris Jerson Zannou and Tahirou Djara and Antoine Vianou}, title = {Non-Contact Fingerprint Template Protection Using {DFT} Combined Random Projection}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {14}, number = {1}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.4018/ijsppc.302007}, doi = {10.4018/IJSPPC.302007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ZannouDV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/AsthanaP21, author = {Abhishek Asthana and Padma Lochan Pradhan}, title = {Proposed Abelian {ACM} Method Optimizing: The Risk on a Real-Time Unix Operating System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {4}, pages = {33--52}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021100103}, doi = {10.4018/IJSPPC.2021100103}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AsthanaP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/DenkoPF21, author = {Blaz Denko and Spela Pecnik and Iztok Fister Jr.}, title = {A Comprehensive Comparison of Hybrid Mobile Application Development Frameworks}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {1}, pages = {78--90}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021010105}, doi = {10.4018/IJSPPC.2021010105}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/DenkoPF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Gao21, author = {Terry Gao}, title = {Detection and Tracking Cows by Computer Vision and Image Classification Methods}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {1}, pages = {1--45}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021010101}, doi = {10.4018/IJSPPC.2021010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/Gao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/GharsellaouiG21, author = {Lema Gharsellaoui and Moez Ghariani}, title = {Isolated Site Wind System Start-Up System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {2}, pages = {29--50}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021040103}, doi = {10.4018/IJSPPC.2021040103}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/GharsellaouiG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/JainAM21, author = {Shivani Jain and Alankrita Aggarwal and Sandeep Mittal}, title = {A Study: Chikungunya Using Social Media Analytics in Delhi}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {1}, pages = {46--56}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021010102}, doi = {10.4018/IJSPPC.2021010102}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/JainAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KanungoSA21, author = {Sonal Kanungo and Dolly Sharma and Alankrita Aggarwal}, title = {{COVID-19:} Impact and New Normal}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {1}, pages = {57--68}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021010103}, doi = {10.4018/IJSPPC.2021010103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KanungoSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KumarR21, author = {Vinod Kumar and Ram Murti Rawat}, title = {Low Power Restoration Circuits Reduce Swing Voltages of {SRAM} Cell With Improved Read and Write Margins}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {2}, pages = {16--28}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021040102}, doi = {10.4018/IJSPPC.2021040102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/KumarR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/M21, author = {Sushrut M.}, title = {Applications of Big Data in Disaster Management: {A} Review}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {4}, pages = {1--16}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021100101}, doi = {10.4018/IJSPPC.2021100101}, timestamp = {Sun, 24 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/MalhotraSM21, author = {Jyotsna Malhotra and Jasleen Kaur Sethi and Mamta Mittal}, title = {Analysis of Big Data Using Two Mapper Files in Hadoop}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {1}, pages = {69--77}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021010104}, doi = {10.4018/IJSPPC.2021010104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/MalhotraSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/RajuR21, author = {P. Salman Raju and P. Venkateswara Rao}, title = {An Optimistic Security Model for Improving Cyber Security Using Adaptive Algorithms to Prevent {SQL} Injection Attacks}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {4}, pages = {17--32}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021100102}, doi = {10.4018/IJSPPC.2021100102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/RajuR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/SinghSA21, author = {Shweta Singh and Ayush Sharma and Alankrita Aggarwal}, title = {Performance Comparison of Image Processing Techniques on Various Filters: {A} Review}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {3}, pages = {34--42}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021070103}, doi = {10.4018/IJSPPC.2021070103}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/SinghSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/TP21, author = {Arunambika T. and Senthil Vadivu P.}, title = {Optimal Cloud Service Provider Selection Based on QoS Metrics}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {2}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021040101}, doi = {10.4018/IJSPPC.2021040101}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/TP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/TanejaAMAK21, author = {Pranav Taneja and Manan Arora and Abhay Mendiratta and Alankrita Aggarwal and Shailender Kumar}, title = {{COVID-19:} Impact and Need for Post-Pandemic Crowd Safety - {A} Review}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {3}, pages = {1--11}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021070101}, doi = {10.4018/IJSPPC.2021070101}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/TanejaAMAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/YakoheneYG21, author = {Samuel Selassie Yakohene and Winfred Yaokumah and Ernest Barfo Boadi Gyebi}, title = {Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {13}, number = {3}, pages = {12--33}, year = {2021}, url = {https://doi.org/10.4018/ijsppc.2021070102}, doi = {10.4018/IJSPPC.2021070102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/YakoheneYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/AdhikaryBKD20, author = {Kaushik Adhikary and Shashi Bhushan and Sunil Kumar and Kamlesh Dutta}, title = {Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {1--18}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100101}, doi = {10.4018/IJSPPC.2020100101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AdhikaryBKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/AggarwalDS20, author = {Alankrita Aggarwal and Kanwalvir Singh Dhindsa and P. K. Suri}, title = {Design for Software Risk Management Using Soft Computing and Simulated Biological Approach}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {44--54}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040104}, doi = {10.4018/IJSPPC.2020040104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AggarwalDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/BajajP20, author = {Divij Bajaj and Dhanya Pramod}, title = {Conversational System, Intelligent Virtual Assistant {(IVA)} Named {DIVA} Using Raspberry Pi}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {38--52}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100104}, doi = {10.4018/IJSPPC.2020100104}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/BajajP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ChathaAK20, author = {Deepak Chatha and Alankrita Aggarwal and Rajender Kumar}, title = {Comparative Analysis of Proposed Artificial Neural Network {(ANN)} Algorithm With Other Techniques}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {29--35}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010103}, doi = {10.4018/IJSPPC.2020010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ChathaAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/FatnassiGB20, author = {Ahlem Fatnassi and Hamza Gharsellaoui and Sadok Bouamama}, title = {New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {30--43}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040103}, doi = {10.4018/IJSPPC.2020040103}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/FatnassiGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Gahlawat20, author = {Monica Gahlawat}, title = {Survey of Online Identity Management Techniques on Blockchain}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {19--28}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100102}, doi = {10.4018/IJSPPC.2020100102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Gahlawat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/GaoW20, author = {Terry Gao and Grace Ying Wang}, title = {Brain Signal Classification Based on Deep {CNN}}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {17--29}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040102}, doi = {10.4018/IJSPPC.2020040102}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/GaoW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/IdoughiA20, author = {Djilali Idoughi and Djeddi Abdelhakim}, title = {A User Centered Model Driven Service Oriented Ubiquitous Government Design Approach}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {17--28}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010102}, doi = {10.4018/IJSPPC.2020010102}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/IdoughiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KKM20, author = {Vijayaprabakaran K. and Sathiyamurthy K. and Ponniamma M.}, title = {Video-Based Human Activity Recognition for Elderly Using Convolutional Neural Network}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {36--48}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010104}, doi = {10.4018/IJSPPC.2020010104}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KandpalP20, author = {Meetu Kandpal and Kalyani Ashesh Patel}, title = {Evaluation of the Dynamic Pricing Model in Cloud}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {20--29}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070102}, doi = {10.4018/IJSPPC.2020070102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KandpalP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/NC20, author = {Divyabharathi D. N. and Nagaraj G. Cholli}, title = {A Review on Identity and Access Management Server (KeyCloak)}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {46--53}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070104}, doi = {10.4018/IJSPPC.2020070104}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/NC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ReddyC20, author = {G. Sekhar Reddy and Suneetha Chittineni}, title = {UML-Based Data Warehouse Design Using Temporal Dimensional Modelling}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070101}, doi = {10.4018/IJSPPC.2020070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ReddyC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Shawky20, author = {Negm Eldin Mohamed Shawky}, title = {Accuracy Enhancement of {GPS} for Tracking Multiple Drones Based on {MCMC} Particle Filter}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010101}, doi = {10.4018/IJSPPC.2020010101}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Shawky20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/VermaP20, author = {Nidhi Nigam Verma and Deepika Pathak}, title = {Linear Regression on Internet Banking Adoption Dataset Using {WEKA}}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {29--37}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100103}, doi = {10.4018/IJSPPC.2020100103}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/VermaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Xu20, author = {Li Xu}, title = {Research on Ant Colony Optimization With Tabu Search Ability}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040101}, doi = {10.4018/IJSPPC.2020040101}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Xu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ZhaiF20, author = {Weifang Zhai and Juan Feng}, title = {Research on Root Locus Correction Algorithm in Automatic Control System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {30--45}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070103}, doi = {10.4018/IJSPPC.2020070103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ZhaiF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.