Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr21.bht:"
@article{DBLP:journals/istr/ChenL15, author = {Chia{-}Mei Chen and Hsiao{-}Chung Lin}, title = {Detecting botnet by anomalous traffic}, journal = {J. Inf. Secur. Appl.}, volume = {21}, pages = {42--51}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.05.002}, doi = {10.1016/J.JISA.2014.05.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarPR15, author = {Manish Kumar and Pradeep Powduri and Avinash Reddy}, title = {An {RGB} image encryption using diffusion process associated with chaotic map}, journal = {J. Inf. Secur. Appl.}, volume = {21}, pages = {20--30}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.11.003}, doi = {10.1016/J.JISA.2014.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/OdeluDG15, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card}, journal = {J. Inf. Secur. Appl.}, volume = {21}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2015.01.001}, doi = {10.1016/J.JISA.2015.01.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/OdeluDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PallipamuRV15, author = {Venkateswara Rao Pallipamu and K. Thammi Reddy and P. Suresh Varma}, title = {{ASH-160:} {A} novel algorithm for secure hashing using geometric concepts}, journal = {J. Inf. Secur. Appl.}, volume = {21}, pages = {52--63}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.05.001}, doi = {10.1016/J.JISA.2014.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PallipamuRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SatohNI15, author = {Akihiro Satoh and Yutaka Nakamura and Takeshi Ikenaga}, title = {A flow-based detection method for stealthy dictionary attacks against Secure Shell}, journal = {J. Inf. Secur. Appl.}, volume = {21}, pages = {31--41}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.08.003}, doi = {10.1016/J.JISA.2014.08.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SatohNI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.