Search dblp for Publications

export results for "toc:db/journals/istr/istr41.bht:"

 download as .bib file

@article{DBLP:journals/istr/Al-HawawrehMS18,
  author       = {Muna Al{-}Hawawreh and
                  Nour Moustafa and
                  Elena Sitnikova},
  title        = {Identification of malicious activities in industrial internet of things
                  based on deep learning models},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {1--11},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.002},
  doi          = {10.1016/J.JISA.2018.05.002},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Al-HawawrehMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BakhshM18,
  author       = {F. Yazdan Bakhsh and
                  Mohsen Ebrahimi Moghaddam},
  title        = {A robust {HDR} images watermarking method using artificial bee colony
                  algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {12--27},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.003},
  doi          = {10.1016/J.JISA.2018.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BakhshM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BaykaraD18,
  author       = {Muhammet Baykara and
                  Resul Das},
  title        = {A novel honeypot based security approach for real-time intrusion detection
                  and prevention systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {103--116},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.004},
  doi          = {10.1016/J.JISA.2018.06.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BaykaraD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhattGM18,
  author       = {Arpita Jadhav Bhatt and
                  Chetna Gupta and
                  Sangeeta Mittal},
  title        = {iABC: Towards a hybrid framework for analyzing and classifying behaviour
                  of iOS applications using static and dynamic analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {144--158},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.005},
  doi          = {10.1016/J.JISA.2018.07.005},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BhattGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeyRA18,
  author       = {Prakash Dey and
                  Raghvendra Singh Rohit and
                  Avishek Adhikari},
  title        = {Single key {MITM} attack and biclique cryptanalysis of full round
                  Khudra},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {117--123},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.005},
  doi          = {10.1016/J.JISA.2018.06.005},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DeyRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DodangehJ18,
  author       = {Peyman Dodangeh and
                  Amir Hossein Jahangir},
  title        = {A biometric security scheme for wireless body area networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {62--74},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.001},
  doi          = {10.1016/J.JISA.2018.06.001},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DodangehJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GauravG18,
  author       = {Kumar Gaurav and
                  Umesh Ghanekar},
  title        = {Image steganography based on Canny edge detection, dilation operator
                  and hybrid coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {41--51},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.001},
  doi          = {10.1016/J.JISA.2018.05.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GauravG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GeorgeJJ18,
  author       = {Teresa K. George and
                  K. Poulose Jacob and
                  Rekha K. James},
  title        = {Token based Detection and Neural Network based Reconstruction framework
                  against code injection vulnerabilities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {75--91},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.005},
  doi          = {10.1016/J.JISA.2018.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GeorgeJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KuribayashiF18,
  author       = {Minoru Kuribayashi and
                  Nobuo Funabiki},
  title        = {Fingerprinting for multimedia content broadcasting system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {52--61},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.002},
  doi          = {10.1016/J.JISA.2018.06.002},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KuribayashiF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MieleILT18,
  author       = {Andrea Miele and
                  Marco Indaco and
                  Fabio Lauri and
                  Pascal Trotta},
  title        = {Efficient many-core architecture design for cryptanalytic collision
                  search on FPGAs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {134--143},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.004},
  doi          = {10.1016/J.JISA.2018.07.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MieleILT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NCR18,
  author       = {Sowmya K. N. and
                  H. R. Chennamma and
                  Lalitha Rangarajan},
  title        = {Video authentication using spatio temporal relationship for tampering
                  detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {159--169},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.002},
  doi          = {10.1016/J.JISA.2018.07.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NairR18,
  author       = {Manju S. Nair and
                  M. S. Rajasree},
  title        = {Fine-grained search and access control in multi-user searchable encryption
                  without shared keys},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {124--133},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.006},
  doi          = {10.1016/J.JISA.2018.06.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NairR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PramkaewN18,
  author       = {Chakan Pramkaew and
                  Sudsanguan Ngamsuriyaroj},
  title        = {Lightweight scheme of secure outsourcing {SVD} of a large matrix on
                  cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {92--102},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.06.003},
  doi          = {10.1016/J.JISA.2018.06.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PramkaewN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WolfAK18,
  author       = {Flynn Wolf and
                  Adam J. Aviv and
                  Ravi Kuber},
  title        = {"It's all about the start" classifying eyes-free mobile authentication
                  techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {28--40},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.004},
  doi          = {10.1016/J.JISA.2018.05.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WolfAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics