Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr41.bht:"
@article{DBLP:journals/istr/Al-HawawrehMS18, author = {Muna Al{-}Hawawreh and Nour Moustafa and Elena Sitnikova}, title = {Identification of malicious activities in industrial internet of things based on deep learning models}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {1--11}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.002}, doi = {10.1016/J.JISA.2018.05.002}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Al-HawawrehMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BakhshM18, author = {F. Yazdan Bakhsh and Mohsen Ebrahimi Moghaddam}, title = {A robust {HDR} images watermarking method using artificial bee colony algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {12--27}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.003}, doi = {10.1016/J.JISA.2018.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BakhshM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BaykaraD18, author = {Muhammet Baykara and Resul Das}, title = {A novel honeypot based security approach for real-time intrusion detection and prevention systems}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {103--116}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.004}, doi = {10.1016/J.JISA.2018.06.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BaykaraD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhattGM18, author = {Arpita Jadhav Bhatt and Chetna Gupta and Sangeeta Mittal}, title = {iABC: Towards a hybrid framework for analyzing and classifying behaviour of iOS applications using static and dynamic analysis}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {144--158}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.005}, doi = {10.1016/J.JISA.2018.07.005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BhattGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeyRA18, author = {Prakash Dey and Raghvendra Singh Rohit and Avishek Adhikari}, title = {Single key {MITM} attack and biclique cryptanalysis of full round Khudra}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {117--123}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.005}, doi = {10.1016/J.JISA.2018.06.005}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DeyRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DodangehJ18, author = {Peyman Dodangeh and Amir Hossein Jahangir}, title = {A biometric security scheme for wireless body area networks}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {62--74}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.001}, doi = {10.1016/J.JISA.2018.06.001}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DodangehJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GauravG18, author = {Kumar Gaurav and Umesh Ghanekar}, title = {Image steganography based on Canny edge detection, dilation operator and hybrid coding}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {41--51}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.001}, doi = {10.1016/J.JISA.2018.05.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GauravG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GeorgeJJ18, author = {Teresa K. George and K. Poulose Jacob and Rekha K. James}, title = {Token based Detection and Neural Network based Reconstruction framework against code injection vulnerabilities}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {75--91}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.005}, doi = {10.1016/J.JISA.2018.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GeorgeJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KuribayashiF18, author = {Minoru Kuribayashi and Nobuo Funabiki}, title = {Fingerprinting for multimedia content broadcasting system}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {52--61}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.002}, doi = {10.1016/J.JISA.2018.06.002}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KuribayashiF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MieleILT18, author = {Andrea Miele and Marco Indaco and Fabio Lauri and Pascal Trotta}, title = {Efficient many-core architecture design for cryptanalytic collision search on FPGAs}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {134--143}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.004}, doi = {10.1016/J.JISA.2018.07.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MieleILT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NCR18, author = {Sowmya K. N. and H. R. Chennamma and Lalitha Rangarajan}, title = {Video authentication using spatio temporal relationship for tampering detection}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {159--169}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.002}, doi = {10.1016/J.JISA.2018.07.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NairR18, author = {Manju S. Nair and M. S. Rajasree}, title = {Fine-grained search and access control in multi-user searchable encryption without shared keys}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {124--133}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.006}, doi = {10.1016/J.JISA.2018.06.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NairR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PramkaewN18, author = {Chakan Pramkaew and Sudsanguan Ngamsuriyaroj}, title = {Lightweight scheme of secure outsourcing {SVD} of a large matrix on cloud}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {92--102}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.06.003}, doi = {10.1016/J.JISA.2018.06.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PramkaewN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WolfAK18, author = {Flynn Wolf and Adam J. Aviv and Ravi Kuber}, title = {"It's all about the start" classifying eyes-free mobile authentication techniques}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {28--40}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.004}, doi = {10.1016/J.JISA.2018.05.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WolfAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.