Search dblp for Publications

export results for "toc:db/journals/isecure/isecure4.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AfzaliNA12,
  author       = {Hammad Afzali and
                  Hamed Nemati and
                  Reza Azmi},
  title        = {Private Key based query on encrypted data},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {41--50},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.5},
  doi          = {10.22042/ISECURE.2015.4.1.5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AfzaliNA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BaraniA12,
  author       = {Fatemeh Barani and
                  Mahdi Abadi},
  title        = {BeeID: intrusion detection in AODV-based MANETs using artificial Bee
                  colony and negative selection algorithms},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {25--39},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.4},
  doi          = {10.22042/ISECURE.2015.4.1.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/BaraniA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FarhatDGA12,
  author       = {Farshid Farhat and
                  Abolfazl Diyanat and
                  Shahrokh Ghaemmaghami and
                  Mohammad Reza Aref},
  title        = {Eigenvalues-based {LSB} steganalysis},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {97--106},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.1},
  doi          = {10.22042/ISECURE.2013.4.2.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/FarhatDGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhafariVM12,
  author       = {Vahid Amin Ghafari and
                  Ali Vardasbi and
                  Javad Mohajeri},
  title        = {Cryptanalysis of {GSM} encryption algorithm {A5/1}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {107--114},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.2},
  doi          = {10.22042/ISECURE.2013.4.2.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GhafariVM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HooshmandEA12,
  author       = {Reza Hooshmand and
                  Taraneh Eghlidos and
                  Mohammad Reza Aref},
  title        = {Improving the Rao-Nam secret key cryptosystem using regular {EDF-QC-LDPC}
                  codes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {3--14},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.2},
  doi          = {10.22042/ISECURE.2015.4.1.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/HooshmandEA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili12,
  author       = {Rasool Jalili},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.1},
  doi          = {10.22042/ISECURE.2015.4.1.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Jalili12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili12a,
  author       = {Rasool Jalili},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {95--96},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2012.4.2.7},
  doi          = {10.22042/ISECURE.2012.4.2.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Jalili12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MabutoV12,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  title        = {Analyzing registry, log files, and prefetch files in finding digital
                  evidence in graphic design applications},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {137--150},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.5},
  doi          = {10.22042/ISECURE.2013.4.2.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MabutoV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MehrnejadBHT12,
  author       = {Maryam Mehrnejad and
                  Abbas Ghaemi Bafghi and
                  Ahad Harati and
                  Ehsan Toreini},
  title        = {{SEIMCHA:} a new semantic image {CAPTCHA} using geometric transformations},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {63--76},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.7},
  doi          = {10.22042/ISECURE.2015.4.1.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MehrnejadBHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadiH12,
  author       = {Somayyeh Mohammadi and
                  Ahmad Hakimi},
  title        = {A chaos-based video watermarking algorithm},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {77--86},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.8},
  doi          = {10.22042/ISECURE.2015.4.1.8},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MohammadiH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShakeriB12,
  author       = {Hassan Shakeri and
                  Abbas Ghaemi Bafghi},
  title        = {A confidence-aware interval-based trust model},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {151--165},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.6},
  doi          = {10.22042/ISECURE.2013.4.2.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ShakeriB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TaheriM12,
  author       = {Motahareh Taheri and
                  Saeed Mozaffari},
  title        = {Improving security of double random phase encoding with chaos theory
                  using fractal images},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {115--124},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.3},
  doi          = {10.22042/ISECURE.2013.4.2.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/TaheriM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/VardasbiSM12,
  author       = {Ali Vardasbi and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri},
  title        = {On the multi {\_} chi-square tests and their data complexity},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {15--24},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.3},
  doi          = {10.22042/ISECURE.2015.4.1.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/VardasbiSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/YahyazadehA12,
  author       = {Moosa Yahyazadeh and
                  Mahdi Abadi},
  title        = {BotOnus: an online unsupervised method for Botnet detection},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {51--62},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2015.4.1.6},
  doi          = {10.22042/ISECURE.2015.4.1.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/YahyazadehA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZaliH012,
  author       = {Zeinab Zali and
                  Massoud Reza Hashemi and
                  Hossein Saidi},
  title        = {Real-Time intrusion detection alert correlation and attack scenario
                  extraction based on the prerequisite consequence approach},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {125--136},
  year         = {2012},
  url          = {https://doi.org/10.22042/isecure.2013.4.2.4},
  doi          = {10.22042/ISECURE.2013.4.2.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ZaliH012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics