![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:journals/sap:"
@article{DBLP:journals/sap/AbdmeziemAZ24, author = {Mohammed Riyadh Abdmeziem and Hiba Akli and Rima Zourane}, title = {Nodes selection review for federated learning in the blockchain-based internet of things}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.344}, doi = {10.1002/SPY2.344}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AbdmeziemAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AllavarpuNM24, author = {V. V. L. Divakar Allavarpu and Vankamamidi Srinivasa Naresh and A. Krishna Mohan}, title = {Privacy-preserving credit risk analysis based on homomorphic encryption aware logistic regression in the cloud}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.372}, doi = {10.1002/SPY2.372}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AllavarpuNM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BarmanCS24, author = {Subhas Barman and Samiran Chattopadhyay and Debasis Samanta}, title = {Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.339}, doi = {10.1002/SPY2.339}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BarmanCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BilakantiPPU24, author = {Harini Bilakanti and Sreevani Pasam and Varshini Palakollu and Sairam Utukuru}, title = {Anomaly detection in IoT environment using machine learning}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.366}, doi = {10.1002/SPY2.366}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BilakantiPPU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BishtDG24, author = {Abhishek Bisht and Ashok Kumar Das and Debasis Giri}, title = {Personal health record storage and sharing using searchable encryption and blockchain: {A} comprehensive survey}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.351}, doi = {10.1002/SPY2.351}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BishtDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BodkheT24, author = {Umesh Bodkhe and Sudeep Tanwar}, title = {\emph{V2XCom:} Lightweight and secure message dissemination scheme for Internet of vehicles}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.352}, doi = {10.1002/SPY2.352}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BodkheT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DashSS24, author = {Priyabrata Dash and Monalisa Sarma and Debasis Samanta}, title = {Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.375}, doi = {10.1002/SPY2.375}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DashSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DekkerA24, author = {Martijn Dekker and Lampis Alevizos}, title = {A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.333}, doi = {10.1002/SPY2.333}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DekkerA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DemlaA24, author = {Kunal Demla and Ashima Anand}, title = {MieWC: Medical image encryption using wavelet transform and multiple chaotic maps}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.369}, doi = {10.1002/SPY2.369}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DemlaA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DhadhaniaBMTSV24, author = {Archan Dhadhania and Jitendra Bhatia and Rachana Mehta and Sudeep Tanwar and Ravi Sharma and Amit Verma}, title = {Unleashing the power of {SDN} and {GNN} for network anomaly detection: State-of-the-art, challenges, and future directions}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.337}, doi = {10.1002/SPY2.337}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DhadhaniaBMTSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DinAAAZ24, author = {Ikram Ud Din and Wajahat Ali and Ahmad Almogren and Iehab Al Rassan and Sherali Zeadally}, title = {Using smart grid infrastructure for authentication and data management in Internet of Medical Things}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.376}, doi = {10.1002/SPY2.376}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DinAAAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GuptaCBK24, author = {Sangeeta Gupta and Premkumar Chithaluru and May El Barachi and Manoj Kumar}, title = {Secure data access using blockchain technology through IoT cloud and fabric environment}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.356}, doi = {10.1002/SPY2.356}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/GuptaCBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HassanHESE24, author = {Heba A. Hassan and Ezz El{-}Din Hemdan and Walid El{-}Shafai and Mona Shokair and Fathi E. Abd El{-}Samie}, title = {Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.350}, doi = {10.1002/SPY2.350}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HassanHESE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HemaB24, author = {P. P. Hema and Anchare V. Babu}, title = {Full-duplex jamming for physical layer security improvement in NOMA-enabled overlay cognitive radio networks}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.371}, doi = {10.1002/SPY2.371}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HemaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HuangWCC24, author = {Zhongming Huang and Feng Wang and Chin{-}Chen Chang and Xiuqiang Chen}, title = {A new authentication scheme for dynamic charging system of electric vehicles in fog environment}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.365}, doi = {10.1002/SPY2.365}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HuangWCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/IslamM24, author = {Md. Azharul Islam and Sanjay Madria}, title = {Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.336}, doi = {10.1002/SPY2.336}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/IslamM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JavedAMK24, author = {Mubeen Javed and Muhammad Arslan Akram and Adnan Noor Mian and Saru Kumari}, title = {On the security of a novel privacy-preserving authentication scheme for {V2G} networks}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.357}, doi = {10.1002/SPY2.357}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/JavedAMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KarnatakMTWSD24, author = {Vijay Karnatak and Amit Kumar Mishra and Neha Tripathi and Mohammad Wazid and Jaskaran Singh and Ashok Kumar Das}, title = {A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.353}, doi = {10.1002/SPY2.353}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KarnatakMTWSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhalafRASSSE24, author = {Osamah Ibrahim Khalaf and Ashokkumar S. R and Sameer Algburi and Anupallavi S and Dhanasekaran Selvaraj and Mhd Saeed Sharif and Wael Elmedany}, title = {Federated learning with hybrid differential privacy for secure and reliable cross-IoT platform knowledge sharing}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.374}, doi = {10.1002/SPY2.374}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhalafRASSSE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Khan24, author = {Mohammed Rauf Ali Khan}, title = {Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.328}, doi = {10.1002/SPY2.328}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Khan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KrishnaiahNS24, author = {Parikshith Nayaka Sheetakallu Krishnaiah and Dayanand Lal Narayan and Kartick Sutradhar}, title = {A survey on secure metadata of agile software development process using blockchain technology}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.342}, doi = {10.1002/SPY2.342}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KrishnaiahNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarDP24, author = {Animesh Kumar and Sandip Dutta and Prashant Pranav}, title = {Analysis of {SQL} injection attacks in the cloud and in {WEB} applications}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.370}, doi = {10.1002/SPY2.370}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarS24, author = {Pawan Kumar and Sukhdip Singh}, title = {Enhancing android application security: {A} novel approach using DroidXGB for malware detection based on permission analysis}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.361}, doi = {10.1002/SPY2.361}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarSSKG24, author = {Ravi Kumar and Samayveer Singh and Deepti Singh and Mohit Kumar and Sukhpal Singh Gill}, title = {A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.335}, doi = {10.1002/SPY2.335}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarSSKG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumariSGNGR24, author = {Indu Kumari and Pranav Kumar Singh and Shivram N. Gowtham and Sukumar Nandi and Uttam Ghosh and Danda B. Rawat}, title = {{RFPM:} {A} RSU-aided framework for pseudonym management to preserve location privacy in IoV}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.329}, doi = {10.1002/SPY2.329}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumariSGNGR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LiLXDG24, author = {Ruiqi Li and Fupeng Li and Peng Xu and Shuiting Du and Bingling Gu}, title = {Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.368}, doi = {10.1002/SPY2.368}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LiLXDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MakinaLR24, author = {Hela Makina and Asma Ben Letaifa and Abderrezak Rachedi}, title = {Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.346}, doi = {10.1002/SPY2.346}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MakinaLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MekdadAACLFU24, author = {Yassine Mekdad and Ahmet Aris and Abbas Acar and Mauro Conti and Riccardo Lazzeretti and Abdeslam El Fergougui and A. Selcuk Uluagac}, title = {A comprehensive security and performance assessment of {UAV} authentication schemes}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.338}, doi = {10.1002/SPY2.338}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MekdadAACLFU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MishraOM24, author = {Ankita Mishra and Mohammad S. Obaidat and Dheerendra Mishra}, title = {Privacy preserving content distribution framework for multidistributor {DRM} systems}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.327}, doi = {10.1002/SPY2.327}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MishraOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NareshR24, author = {Vankamamidi Srinivasa Naresh and Sivaranjani Reddi}, title = {An identity-based secure {VANET} communication system}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.349}, doi = {10.1002/SPY2.349}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NareshR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OishiSATO24, author = {Keiichiro Oishi and Yuichi Sei and J. Andrew and Yasuyuki Tahara and Akihiko Ohsuga}, title = {Algorithm to satisfy \emph{l}-diversity by combining dummy records and grouping}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.373}, doi = {10.1002/SPY2.373}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OishiSATO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PaliAA24, author = {Isha Pali and Ruhul Amin and Mohammad Abdussami}, title = {Autonomous vehicle security: Current survey and future research challenges}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.367}, doi = {10.1002/SPY2.367}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PaliAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PatelPKOATSY24, author = {Alay Patel and Devam Patel and Riya Kakkar and Parita Rajiv Oza and Smita Agrawal and Sudeep Tanwar and Ravi Sharma and Nagendar Yamsani}, title = {Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.354}, doi = {10.1002/SPY2.354}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PatelPKOATSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PradhanDCJV24, author = {Grishan Pradhan and Babu R. Dawadi and Abiral Chaulagain and Anish Lal Joshi and Prajal Govinda Vaidya}, title = {Chaos and {DNA} coding technique for image cryptography}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.359}, doi = {10.1002/SPY2.359}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PradhanDCJV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RaniKC24, author = {Deepa Rani and Rajeev Kumar and Naveen Chauhan}, title = {A secure framework for IoT-based healthcare using blockchain and {IPFS}}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.348}, doi = {10.1002/SPY2.348}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RaniKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RostamME24, author = {Habib Esmaeelzadeh Rostam and Homayun Motameni and Rasul Enayatifar}, title = {Privacy-preserving in the smart healthcare system using steganography and chaotic functions based on {DNA}}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.363}, doi = {10.1002/SPY2.363}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RostamME24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SanghviBHGVNDJTSY24, author = {Harshil Sanghvi and Rushir Bhavsar and Vini Hundlani and Lata Gohil and Tarjni Vyas and Anuja Nair and Shivani Desai and Nilesh Kumar Jadav and Sudeep Tanwar and Ravi Sharma and Nagendar Yamsani}, title = {\emph{MetaHate}: AI-based hate speech detection for secured online gaming in metaverse using blockchain}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.343}, doi = {10.1002/SPY2.343}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SanghviBHGVNDJTSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SankhwarACJJV24, author = {Shweta Sankhwar and Rupali Ahuja and Tanya Choubey and Priyanshi Jain and Tanusha Jain and Muskan Verma}, title = {Cybercrime in India: An analysis of crime against women in ever expanding digital space}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.340}, doi = {10.1002/SPY2.340}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SankhwarACJJV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SaurabhS24, author = {Shyam Saurabh and Kishore Sinha}, title = {Optimal key pre-distribution schemes from affine resolvable and partially affine resolvable designs}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.334}, doi = {10.1002/SPY2.334}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SaurabhS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SchraheS24, author = {Dominik Schrahe and Thomas St{\"{a}}dter}, title = {Privacy preserving vaccinating- and testing-pass for the European Union}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.332}, doi = {10.1002/SPY2.332}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SchraheS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SharmaAK24, author = {Sandeep Sharma and Prachi Ahlawat and Kavita Khanna}, title = {DeepMDFC: {A} deep learning based android malware detection and family classification method}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.347}, doi = {10.1002/SPY2.347}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SharmaAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SharmilaN24, author = {B. S. Sharmila and Rohini Nagapadma}, title = {{P-DNN:} Parallel {DNN} based {IDS} framework for the detection of IoT vulnerabilities}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.330}, doi = {10.1002/SPY2.330}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SharmilaN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SinghHSB24, author = {N. Joychandra Singh and Nazrul Hoque and Kh Robindro Singh and Dhruba K. Bhattacharyya}, title = {Botnet-based IoT network traffic analysis using deep learning}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.355}, doi = {10.1002/SPY2.355}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SinghHSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SuHLJQXS24, author = {Xiaole Su and Yuanchao Hu and Wei Liu and Zhipeng Jiang and Chan Qiu and Jie Xiong and Ju Sun}, title = {A blockchain-based smart contract model for secured energy trading management in smart microgrids}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.341}, doi = {10.1002/SPY2.341}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SuHLJQXS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SubramaniARL24, author = {Jegadeesan Subramani and Maria Azees and Arun Sekar Rajasekaran and Jaime Lloret}, title = {Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones}, journal = {Secur. Priv.}, volume = {7}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/spy2.364}, doi = {10.1002/SPY2.364}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SubramaniARL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VadherPNVDGTGS24, author = {Himanshu Vadher and Pal Patel and Anuja Nair and Tarjni Vyas and Shivani Desai and Lata Gohil and Sudeep Tanwar and Deepak Garg and Anupam Singh}, title = {EEG-based biometric authentication system using convolutional neural network for military applications}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.345}, doi = {10.1002/SPY2.345}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/VadherPNVDGTGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VangalaDKVKP24, author = {Anusha Vangala and Ashok Kumar Das and Neeraj Kumar and Pandi Vijayakumar and Marimuthu Karuppiah and Youngho Park}, title = {Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.362}, doi = {10.1002/SPY2.362}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/VangalaDKVKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VermaS24, author = {Upendra Verma and Mayank Sohani}, title = {An efficient lightweight authentication scheme for dew-assisted IoT networks}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.360}, doi = {10.1002/SPY2.360}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/VermaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZoghiS24, author = {Zeinab Zoghi and G{\"{u}}rsel Serpen}, title = {{UNSW-NB15} computer security dataset: Analysis through visualization}, journal = {Secur. Priv.}, volume = {7}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/spy2.331}, doi = {10.1002/SPY2.331}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZoghiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AbedA23, author = {Ali Kamil Abed and Angesh Anupam}, title = {Review of security issues in Internet of Things and artificial intelligence-driven solutions}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.285}, doi = {10.1002/SPY2.285}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AbedA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AgrawalAT23, author = {Kanika Agrawal and Mayank Aggarwal and Sudeep Tanwar}, title = {\emph{MyEasyHealthcare}: An efficient and secure three-tier blockchain-based healthcare system}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.314}, doi = {10.1002/SPY2.314}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AgrawalAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AithekarGD23, author = {Ashutosh Aithekar and Pratik Gupta and Dharminder Dharminder}, title = {A provably secure, shortest, and efficient identity based signcryption technique in the standard model}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.272}, doi = {10.1002/SPY2.272}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AithekarGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlAttarAZ23, author = {Zaid Shakir Al{-}Attar and Tarek Abbes and Faouzi Zerai}, title = {Privacy-preserving hands-free voice authentication leveraging edge technology}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.290}, doi = {10.1002/SPY2.290}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AlAttarAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AryamanNVA23, author = {Aryaman and Nenavath Srinivas Naik and Satyanarayana Vollala and Ruhul Amin}, title = {Detecting and predicting countermeasures against clickjacking}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.302}, doi = {10.1002/SPY2.302}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AryamanNVA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BangaB23, author = {Manu Banga and Abhay Bansal}, title = {Proposed software faults detection using hybrid approach}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.103}, doi = {10.1002/SPY2.103}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BangaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BenimamST23, author = {Houssem Benimam and Said Sadoudi and Djamel Teguig}, title = {Software defined radio implementation of a secure waveform for real-time data transmission using universal software radio peripheral}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.280}, doi = {10.1002/SPY2.280}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BenimamST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BhattacharyaRCDS23, author = {Munmun Bhattacharya and Sandip Roy and Samiran Chattopadhyay and Ashok Kumar Das and Sachin Shetty}, title = {A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.275}, doi = {10.1002/SPY2.275}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/CaiZHZY23, author = {Baorui Cai and Bin Zhang and Jinding He and Rongkui Zhang and Wenlin Yan}, title = {The risks brought by blockchain applications to the safe operation of power grids}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.219}, doi = {10.1002/SPY2.219}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/CaiZHZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChandrakarBKDA23, author = {Palak Chandrakar and Rashi Bagga and Yogesh Kumar and Sanjeev Kumar Dwivedi and Ruhul Amin}, title = {Blockchain based security protocol for device to device secure communication in internet of things networks}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.267}, doi = {10.1002/SPY2.267}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ChandrakarBKDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChatterjeeRAKD23, author = {Uddalak Chatterjee and Sangram Ray and Sharmistha Adhikari and Muhammad Khurram Khan and Mou Dasgupta}, title = {Efficient and secure e-voting scheme using elliptic curve cryptography}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.283}, doi = {10.1002/SPY2.283}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ChatterjeeRAKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChenHLYYZN23, author = {Zhikui Chen and Muhammad Zeeshan Haider and Naiwen Luo and Shuo Yu and Xu Yuan and Yaochen Zhang and Tayyaba Noreen}, title = {Reputation-based partition scheme for IoT security}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.287}, doi = {10.1002/SPY2.287}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ChenHLYYZN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DamghaniED23, author = {Hamidreza Damghani and Soheila Estaji and Leila Damghani}, title = {Providing robust and reversible watermarking algorithm and detection of malicious manipulation}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.270}, doi = {10.1002/SPY2.270}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DamghaniED23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DuOWH23, author = {Zhuang Du and Mohammad S. Obaidat and Guowei Wu and Kuei{-}Fang Hsiao}, title = {An efficient caching security approach for content-centric mobile networks in internet of things systems}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.294}, doi = {10.1002/SPY2.294}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DuOWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FarAH23, author = {Saeed Banaeian Far and Maryam Rajabzadeh Asaar and Afrooz Haghbin}, title = {Zero-knowledge-based distributed auditing protocol}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.289}, doi = {10.1002/SPY2.289}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FarAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FarR23, author = {Saeed Banaeian Far and Azadeh Imani Rad}, title = {What are the benefits and opportunities of launching a Metaverse for {NEOM} city?}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.282}, doi = {10.1002/SPY2.282}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/FarR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FarooqCK23, author = {Sameer Farooq and Priyanka Chawla and Neeraj Kumar}, title = {A cryptographic security framework for hybrid Cloud-Internet of Things network}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.309}, doi = {10.1002/SPY2.309}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FarooqCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GuptaK23, author = {Shweta Gupta and Adesh Kumar}, title = {Study on early accurate diagnosis and treatment of {COVID-19} with smart phone tracking using bionics}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.303}, doi = {10.1002/SPY2.303}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/GuptaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Hao23, author = {Yunhui Hao}, title = {Intelligent control of electric automation instrumentation based on blockchain}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.206}, doi = {10.1002/SPY2.206}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Hao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HemmatiZS23, author = {Atefeh Hemmati and Mani Zarei and Alireza Souri}, title = {Blockchain-based internet of vehicles (BIoV): {A} systematic review of surveys and reviews}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.317}, doi = {10.1002/SPY2.317}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HemmatiZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Hu23, author = {Lei Hu}, title = {Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.215}, doi = {10.1002/SPY2.215}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Hu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/IbrishimovaL23, author = {Marina Danchovsky Ibrishimova and Kin Fun Li}, title = {Discerning cyber threatening incidents from ordinary events using sentiment analysis and logistic regression}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.69}, doi = {10.1002/SPY2.69}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/IbrishimovaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/IganiboAMBB23, author = {Ibifubara Iganibo and Massimiliano Albanese and Marc Mosko and Eric Bier and Alejandro E. Brito}, title = {An attack volume metric}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.298}, doi = {10.1002/SPY2.298}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/IganiboAMBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JumaniSLHNQ23, author = {Awais Khan Jumani and Jinglun Shi and Asif Ali Laghari and Zhihui Hu and Aftab ul Nabi and Huang Qian}, title = {Fog computing security: {A} review}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.313}, doi = {10.1002/SPY2.313}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/JumaniSLHNQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KaushikK23, author = {Keshav Kaushik and Adarsh Kumar}, title = {Demystifying quantum blockchain for healthcare}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.284}, doi = {10.1002/SPY2.284}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KaushikK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhanparaLTTVS23, author = {Pimal Khanpara and Kruti Lavingia and Rajvi Trivedi and Sudeep Tanwar and Amit Verma and Ravi Sharma}, title = {A context-aware internet of things-driven security scheme for smart homes}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.269}, doi = {10.1002/SPY2.269}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhanparaLTTVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhanparaSTVS23, author = {Pimal Khanpara and Ishwa Shah and Sudeep Tanwar and Amit Verma and Ravi Sharma}, title = {Toward the internet of things forensics: {A} data analytics perspective}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.306}, doi = {10.1002/SPY2.306}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhanparaSTVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KiranMB23, author = {Usha Kiran and Rajat Moona and Santosh Biswas}, title = {A protocol to establish trust on biometric authentication devices}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.305}, doi = {10.1002/SPY2.305}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KiranMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarAB23, author = {C. Madan Kumar and Ruhul Amin and M. Brindha}, title = {Cryptanalysis and improvement of {REAS-TMIS:} Resource-efficient authentication scheme for telecare medical information system}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.268}, doi = {10.1002/SPY2.268}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KumarAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarK23, author = {Sunil Kumar and Dilip Kumar}, title = {Performance evaluation and design of {B-128} modified Blowfish algorithm}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.307}, doi = {10.1002/SPY2.307}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarRS23, author = {Akshay Kumar and Rajneesh Rani and Samayveer Singh}, title = {A survey of recent advances in image steganography}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.281}, doi = {10.1002/SPY2.281}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarRSKD23, author = {Vivek Kumar and Sangram Ray and Dipanwita Sadhukhan and Jayashree Karmakar and Mou Dasgupta}, title = {Enhanced pairing-free identity-based broadcast authentication protocol in {WSN} using ElGamal {ECC}}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.278}, doi = {10.1002/SPY2.278}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarRSKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarWSSDPR23, author = {Pankaj Kumar and Mohammad Wazid and Devesh Pratap Singh and Jaskaran Singh and Ashok Kumar Das and Youngho Park and Joel J. P. C. Rodrigues}, title = {Explainable artificial intelligence envisioned security mechanism for cyber threat hunting}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.312}, doi = {10.1002/SPY2.312}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarWSSDPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumharB23, author = {Malaram Kumhar and Jitendra Bhatia}, title = {Software-defined networks-enabled fog computing for IoT-based healthcare: Security, challenges and opportunities}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.291}, doi = {10.1002/SPY2.291}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumharB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LauYYC23, author = {Chi Ho Lau and Kai{-}Hau Yeung and Fan Yan and Sammy Chan}, title = {Blockchain-based authentication and secure communication in IoT networks}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.319}, doi = {10.1002/SPY2.319}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/LauYYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Li23, author = {Qiang Li}, title = {Evaluation of enterprise financial investment environment based on block-chain and cloud computing}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.217}, doi = {10.1002/SPY2.217}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LoneMA23, author = {Aejaz Nazir Lone and Suhel Mustajab and Mahfooz Alam}, title = {A comprehensive study on cybersecurity challenges and opportunities in the IoT world}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.318}, doi = {10.1002/SPY2.318}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LoneMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LuoLD23, author = {Wenjun Luo and Die Lai and Zesen Dai}, title = {Research on disturbing white-box cryptography algorithm based on local differential privacy}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.320}, doi = {10.1002/SPY2.320}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/LuoLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MaccarioN23, author = {Guglielmo Maccario and Maurizio Naldi}, title = {Privacy in smart speakers: {A} systematic literature review}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.274}, doi = {10.1002/SPY2.274}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MaccarioN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Mahajan23, author = {Shilpa Mahajan}, title = {Phishing uniform resource locator detection using machine learning: {A} step towards secure system}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.311}, doi = {10.1002/SPY2.311}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Mahajan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MalarvizhiPB23, author = {N. Malarvizhi and R. Priya and Rajaram Bhavani}, title = {An enhanced reversible image steganography using distributive Tian's method}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.266}, doi = {10.1002/SPY2.266}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MalarvizhiPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MarascoAPVS23, author = {Emanuela Marasco and Massimiliano Albanese and Venkata Vamsi Ram Patibandla and Anudeep Vurity and Sumanth Sai Sriram}, title = {Biometric multi-factor authentication: On the usability of the FingerPIN scheme}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.261}, doi = {10.1002/SPY2.261}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MarascoAPVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MittalKK23, author = {Gaurav Mittal and Sunil Kumar and Sandeep Kumar}, title = {An efficient procedure for online/offline ID-based signature using extended chaotic maps and group ring}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.279}, doi = {10.1002/SPY2.279}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MittalKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MoritzU23, author = {Stephan Moritz and Osmanbey Uzunkol}, title = {Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers\({}^{\mbox{{\textdagger}}}\)}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.70}, doi = {10.1002/SPY2.70}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MoritzU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NkurunzizaTEL23, author = {Egide Nkurunziza and Lawrence Tandoh and Issameldeen Elfadul and Fagen Li}, title = {{ECAAP-SG:} Efficient certificateless anonymous authentication protocol for {SG}}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.273}, doi = {10.1002/SPY2.273}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/NkurunzizaTEL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PulipetiK23, author = {Srikanth Pulipeti and Adarsh Kumar}, title = {Secure quantum computing for healthcare sector: {A} short analysis}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.293}, doi = {10.1002/SPY2.293}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PulipetiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PursharthiM23, author = {Komal Pursharthi and Dheerendra Mishra}, title = {On the security of ring learning with error-based key exchange protocol against signal leakage attack}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.310}, doi = {10.1002/SPY2.310}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PursharthiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RenugadeviJVBT23, author = {N. Renugadevi and Stheya Julakanti and Sai Charan Vemula and Somya Bhatnagar and Shirisha Thangallapally}, title = {Low area and high throughput implementation of advanced encryption standard hardware accelerator on {FPGA} using Mux-Demux pair}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.292}, doi = {10.1002/SPY2.292}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/RenugadeviJVBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SainiSJ23, author = {Ikjot Saini and Sherif Saad and Arunita Jaekel}, title = {Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad-hoc network}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.68}, doi = {10.1002/SPY2.68}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SainiSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SalahdineHZ23, author = {Fatima Salahdine and Tao Han and Ning Zhang}, title = {Security in 5G and beyond recent advances and future challenges}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.271}, doi = {10.1002/SPY2.271}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SalahdineHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SallamEEASEE23, author = {Youssef F. Sallam and Samy Abd El{-}Nabi and Walid El{-}Shafai and Hossam Eldin H. Ahmed and Adel A. Saleeb and Nirmeen A. El{-}Bahnasawy and Fathi E. Abd El{-}Samie}, title = {Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from {UNSW-NB15} dataset}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.300}, doi = {10.1002/SPY2.300}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SallamEEASEE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Sarda23, author = {Thais Sard{\'{a}}}, title = {An onion with layers of hope and fear: {A} cross-case analysis of the media representation of Tor Network reflecting theoretical perspectives of new technologies}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.296}, doi = {10.1002/SPY2.296}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Sarda23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Sarker23, author = {Iqbal H. Sarker}, title = {Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: {A} comprehensive overview}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.295}, doi = {10.1002/SPY2.295}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Sarker23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ShahKPDTVS23, author = {Kaushal Shah and Sarth Kanani and Shivam Patel and Manan Devani and Sudeep Tanwar and Amit Verma and Ravi Sharma}, title = {Blockchain-based object detection scheme using federated learning}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.276}, doi = {10.1002/SPY2.276}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ShahKPDTVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ShanmugamB23, author = {Sathiya Devi Shanmugam and Arumugam Bhuvaneswari}, title = {Design of efficient storage and retrieval of medical records in blockchain based on InterPlanetary File System and modified bloom tree}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.301}, doi = {10.1002/SPY2.301}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ShanmugamB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SharmaMR23, author = {Shanil Sharma and Dheerendra Mishra and Saurabh Rana}, title = {A privacy oriented authorized key agreement framework for vehicular edge computing}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.277}, doi = {10.1002/SPY2.277}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SharmaMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SikiruOFOAOSGI23, author = {Ismaeel Abiodun Sikiru and Lukman Abiodun Olawoyin and Nasir Faruk and Abdulkarim Ayopo Oloyede and Abubakar Abdulkarim and Imam{-}Fulani Yusuf Olayinka and Olugbenga A. Sowande and Salisu Garba and Agbotiname Lucky Imoize}, title = {Physical layer security using boundary technique for emerging wireless communication systems}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.288}, doi = {10.1002/SPY2.288}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SikiruOFOAOSGI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SouriAK23, author = {Alireza Souri and Eyhab Al{-}Masri and Saru Kumari}, title = {Blockchain architecture and methodologies for internet of things environment}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.299}, doi = {10.1002/SPY2.299}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SouriAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SreedharanK23, author = {Ajish Sreedharan and K. S. Anil Kumar}, title = {Effect of Hadamard multiplication on bloom filter and double bloom filter transformations}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.316}, doi = {10.1002/SPY2.316}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SreedharanK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TrivediRPBTS23, author = {Chandan Trivedi and Udai Pratap Rao and Keyur Parmar and Pronaya Bhattacharya and Sudeep Tanwar and Ravi Sharma}, title = {A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.308}, doi = {10.1002/SPY2.308}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/TrivediRPBTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VasilopoulosOME23, author = {Dimitrios Vasilopoulos and Melek {\"{O}}nen and Refik Molva and Kaoutar Elkhiyaoui}, title = {Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance{\textdagger}}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.137}, doi = {10.1002/SPY2.137}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/VasilopoulosOME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang23, author = {Lin Wang}, title = {Optimization algorithm of digital media sharing platform based on blockchain technology}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.205}, doi = {10.1002/SPY2.205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang23a, author = {Liping Wang}, title = {Financial risk analysis system and supervision based on big data and blockchain technology}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.224}, doi = {10.1002/SPY2.224}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang23b, author = {Ruijun Wang}, title = {Convergence model of "cloud + VR" technology on account of mobile Internet of Things and exhibition industry}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.211}, doi = {10.1002/SPY2.211}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang23c, author = {Yue Wang}, title = {Import and export trade forecasting algorithm based on blockchain security and {PSO} optimized hybrid {RVM} model}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.218}, doi = {10.1002/SPY2.218}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang23c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang23d, author = {Juanling Wang}, title = {Research on the construction of accounting information audit quality control system based on blockchain}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.227}, doi = {10.1002/SPY2.227}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang23d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/WangLC23, author = {Xu Wang and Jui{-}Chuan Liu and Chin{-}Chen Chang}, title = {A novel reversible data hiding scheme for {VQ} codebooks}, journal = {Secur. Priv.}, volume = {6}, number = {6}, year = {2023}, url = {https://doi.org/10.1002/spy2.315}, doi = {10.1002/SPY2.315}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/WangLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/WangLHY23, author = {Rongxia Wang and Zhifang Liu and Fen He and Weihuang Yang}, title = {Protection and detection of physical hazards for the intelligent system under industrial Internet of Things by neural network}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.207}, doi = {10.1002/SPY2.207}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/WangLHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/XiaoW23, author = {Haiyan Xiao and Lifang Wang}, title = {Differential fault analysis on the lightweight block cipher plug-in plug-out}, journal = {Secur. Priv.}, volume = {6}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/spy2.286}, doi = {10.1002/SPY2.286}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/XiaoW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Yu23, author = {Haiping Yu}, title = {Application of blockchain technology in the data processing security system of financial enterprises}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.230}, doi = {10.1002/SPY2.230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Yu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Zhang23, author = {Erni Zhang}, title = {Economic supply chain management of advanced manufacturing industry based on blockchain technology}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.204}, doi = {10.1002/SPY2.204}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Zhang23a, author = {Baicheng Zhang}, title = {The strategy guidance of business English intercultural communication based on blockchain security and genetic algorithms}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.214}, doi = {10.1002/SPY2.214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZhangYH23, author = {Lan Zhang and Bin Yu and Liangsheng He}, title = {Differential analysis of the {NBC} algorithm based on mixed integer linear programming model}, journal = {Secur. Priv.}, volume = {6}, number = {4}, year = {2023}, url = {https://doi.org/10.1002/spy2.297}, doi = {10.1002/SPY2.297}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZhangYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZhangZ23, author = {Jinfeng Zhang and Dongdong Zhang}, title = {Internet of things network intrusion detection model based on quantum artificial fish group and fuzzy kernel clustering algorithm}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.220}, doi = {10.1002/SPY2.220}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZhangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Zhen23, author = {Yeping Zhen}, title = {Design of library smart cloud service system based on blockchain technology}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.213}, doi = {10.1002/SPY2.213}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Zhen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Zhou23, author = {Jingdong Zhou}, title = {Information construction of construction project management based on internet of things blockchain}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.221}, doi = {10.1002/SPY2.221}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Zhou23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZiaMSMS23, author = {Unsub Zia and Mark McCartney and Bryan W. Scotney and Jorge Mart{\'{\i}}nez and Ali Sajjad}, title = {A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.304}, doi = {10.1002/SPY2.304}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZiaMSMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlevizosTE22, author = {Lampis Alevizos and Vinh{-}Thong Ta and Max Hashem Eiza}, title = {Augmenting zero trust architecture to endpoints using blockchain: {A} state-of-the-art review}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.191}, doi = {10.1002/SPY2.191}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlevizosTE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlmousaZSA22, author = {May Almousa and Tianyang Zhang and Abdolhossein Sarrafzadeh and Mohd Anwar}, title = {Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.256}, doi = {10.1002/SPY2.256}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlmousaZSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AnnaneALR22, author = {Boubakeur Annane and Adel Alti and Lamri Laouamer and Hamza Reffad}, title = {Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.249}, doi = {10.1002/SPY2.249}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AnnaneALR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AnwarGFG22, author = {Memoona J. Anwar and Asif Qumer Gill and Anthony D. Fitzgibbon and Inam Gull}, title = {{PESTLE+} risk analysis model to assess pandemic preparedness of digital ecosystems}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.187}, doi = {10.1002/SPY2.187}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AnwarGFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BairagiPBL22, author = {Ravi Bairagi and Preetesh Purohit and Kailash Chandra Bandhu and Ratnesh Litoriya}, title = {A secure and efficient mechanism for scheduling tasks in cloud computing environments}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.252}, doi = {10.1002/SPY2.252}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BanerjeeKMAD22, author = {Somesh Banerjee and Khilesh Kumar and Prajwal Masulkar and Ruhul Amin and Sanjeev Kumar Dwivedi}, title = {Blockchain and IPFS-based reliable land registry system}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.236}, doi = {10.1002/SPY2.236}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BanerjeeKMAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BarmanCSB22, author = {Subhas Barman and Samiran Chattopadhyay and Debasis Samanta and Sayantani Barman}, title = {A blockchain-based approach to secure electronic health records using fuzzy commitment scheme}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.231}, doi = {10.1002/SPY2.231}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BarmanCSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BasicevicBO22, author = {Ilija Basicevic and Nikola Blazic and Stanislav Ocovaj}, title = {On the use of principal component analysis in the entropy based detection of denial-of-service attacks}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.193}, doi = {10.1002/SPY2.193}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BasicevicBO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BegumU22, author = {Mahbuba Begum and Mohammad Shorif Uddin}, title = {Towards the development of an effective image watermarking system}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.196}, doi = {10.1002/SPY2.196}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BegumU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BelalMGD22, author = {Mohamad Mulham Belal and Tanmoy Maitra and Debasis Giri and Ashok Kumar Das}, title = {Chaotic neural networks and farfalle construction based parallel keyed secure hash function}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.259}, doi = {10.1002/SPY2.259}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BelalMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BhavnaniBMS22, author = {Harshit Bhavnani and Shreyansh Bardia and Aniket Modi and Ujwal Shah}, title = {An extensive review of data security infrastructure and legislature}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.189}, doi = {10.1002/SPY2.189}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BhavnaniBMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BryantS22, author = {Blake D. Bryant and Hossein Saiedian}, title = {Key challenges in security of IoT devices and securing them with the blockchain technology}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.251}, doi = {10.1002/SPY2.251}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BryantS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Bu-Pasha22, author = {Shakila Bu{-}Pasha}, title = {Legal aspects, public interest, and legitimate interest in processing personal data to operate autonomous buses in the regular transportation system}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.247}, doi = {10.1002/SPY2.247}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Bu-Pasha22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/CheccoBLB22, author = {Alessandro Checco and Lorenzo Bracciale and Douglas J. Leith and Giuseppe Bianchi}, title = {OpenNym: Privacy preserving recommending via pseudonymous group authentication}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.201}, doi = {10.1002/SPY2.201}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/CheccoBLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChhabraL22, author = {Surbhi Chhabra and Kusum Lata}, title = {Towards the enhancement of {AES} {IP} security using hardware obfuscation technique: {A} practical approach for secure data transmission in IoT}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.233}, doi = {10.1002/SPY2.233}, timestamp = {Thu, 11 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ChhabraL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChhikaraRMM22, author = {Deepak Chhikara and Saurabh Rana and Ankita Mishra and Dheerendra Mishra}, title = {Construction of elliptic curve cryptography-based authentication protocol for internet of things}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.226}, doi = {10.1002/SPY2.226}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ChhikaraRMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Choudhury22, author = {Hiten Choudhury}, title = {Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.222}, doi = {10.1002/SPY2.222}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Choudhury22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DandoohEEH22, author = {Azza Dandooh and Adel S. El{-}Fishawy and Fathi E. Abd El{-}Samie and Ezz El{-}Din Hemdan}, title = {Secure audio signal transmission based on color image watermarking}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.185}, doi = {10.1002/SPY2.185}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DandoohEEH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DharminderNA22, author = {Dharminder Dharminder and Ankur Nehra and Aditya Arya}, title = {A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.257}, doi = {10.1002/SPY2.257}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/DharminderNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Dirik22, author = {Mahmut Dirik}, title = {Predicting credit card fraud using multipurpose classification based on evolutionary rules}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.239}, doi = {10.1002/SPY2.239}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Dirik22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DosselmannH22, author = {Richard Dosselmann and Howard J. Hamilton}, title = {Limiting sensitive values in an anonymized table while reducing information loss via p-proportion}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.202}, doi = {10.1002/SPY2.202}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DosselmannH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DoyleGG22, author = {Joseph Doyle and Muhammed Golec and Sukhpal Singh Gill}, title = {BlockchainBus: {A} lightweight framework for secure virtual machine migration in cloud federations using blockchain}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.197}, doi = {10.1002/SPY2.197}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DoyleGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/EbazadehF22, author = {Yaser Ebazadeh and Reza Fotohi}, title = {A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.183}, doi = {10.1002/SPY2.183}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/EbazadehF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/EldesoukySAE22, author = {Samer Eldesouky and Walid El Shafai and Hossam Eldin H. Ahmed and Fathi E. Abd El{-}Samie}, title = {Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.198}, doi = {10.1002/SPY2.198}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/EldesoukySAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GargWSSD22, author = {Neha Garg and Mohammad Wazid and Jaskaran Singh and Devesh Pratap Singh and Ashok Kumar Das}, title = {Security in IoMT-driven smart healthcare: {A} comprehensive review and open challenges}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.235}, doi = {10.1002/SPY2.235}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/GargWSSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GermanosZ22, author = {Vasileios Germanos and Wen Zeng}, title = {Model-based risk assessment evaluation}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.240}, doi = {10.1002/SPY2.240}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/GermanosZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GuzeltepeC22, author = {Murat G{\"{u}}zeltepe and Selda {\c{C}}alkavur}, title = {Skew-cyclic codes based public-key cryptosystem approach}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.255}, doi = {10.1002/SPY2.255}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/GuzeltepeC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HathaliyaTS22, author = {Jigna J. Hathaliya and Sudeep Tanwar and Priyanka Sharma}, title = {Adversarial learning techniques for security and privacy preservation: {A} comprehensive review}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.209}, doi = {10.1002/SPY2.209}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HathaliyaTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HemavathiAZS22, author = {Hemavathi and S. Akhila and Samreen Zubeda and Shashidhara}, title = {{DS2AN:} Deep stacked sparse autoencoder for secure and fast authentication in HetNets}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.208}, doi = {10.1002/SPY2.208}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HemavathiAZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JalaliNEAF22, author = {Foad Jalali and Mehran Alidoost Nia and Tatiana Ermakova and Meisam Abdollahi and Benjamin Fabian}, title = {Investigating the role of usable security in developers' intention toward security enhancement in service-oriented applications}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.199}, doi = {10.1002/SPY2.199}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KebandeC22, author = {Victor R. Kebande and Kim{-}Kwang Raymond Choo}, title = {Finite state machine for cloud forensic readiness as a service (CFRaaS) events}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.182}, doi = {10.1002/SPY2.182}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KebandeC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarA22, author = {Shivansh Kumar and Ruhul Amin}, title = {Decentralized trade finance using blockchain and lightning network}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.260}, doi = {10.1002/SPY2.260}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KumarA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarOGB22, author = {Adarsh Kumar and Carlo Ottaviani and Sukhpal Singh Gill and Rajkumar Buyya}, title = {Securing the future internet of things with post-quantum cryptography}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.200}, doi = {10.1002/SPY2.200}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarOGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Li22, author = {Yanting Li}, title = {A study of detection of abnormal network traffic: {A} comparison of multiple algorithms}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.190}, doi = {10.1002/SPY2.190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LuL22, author = {Yang Lu and Shujun Li}, title = {From data flows to privacy-benefit trade-offs: {A} user-centric semantic model}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.225}, doi = {10.1002/SPY2.225}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LuL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MadaniMM22, author = {Mirmorsal Madani and Homayun Motameni and Hosein Mohamadi}, title = {Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.264}, doi = {10.1002/SPY2.264}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MadaniMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MahasingheJ22, author = {Anuradha Mahasinghe and Youvin Jayasinghe}, title = {An initial step toward a quantum annealing approach to the discrete logarithm problem}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.234}, doi = {10.1002/SPY2.234}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MahasingheJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MannaSM22, author = {Asmita Manna and Anirban Sengupta and Chandan Mazumdar}, title = {A risk-based methodology for privacy requirements elicitation and control selection}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.188}, doi = {10.1002/SPY2.188}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MannaSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MardiH22, author = {Dhaneshwar Mardi and Jaydeep Howlader}, title = {Anonymous Bitcoin transaction: {A} solution using secure multiparty computation}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.232}, doi = {10.1002/SPY2.232}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MardiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MartinRAA22, author = {Kevin Martin and Mohamed Rahouti and Moussa Ayyash and Izzat Alsmadi}, title = {Anomaly detection in blockchain using network representation and machine learning}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.192}, doi = {10.1002/SPY2.192}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MartinRAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MatyokurehwaRGC22, author = {Kanos Matyokurehwa and Norman Rudhumbu and Cross Gombiro and Colletor Chipfumbu{-}Kangara}, title = {Enhanced social engineering framework mitigating against social engineering attacks in higher education}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.237}, doi = {10.1002/SPY2.237}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MatyokurehwaRGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MukherjeeSM22, author = {Preetam Mukherjee and Anirban Sengupta and Chandan Mazumdar}, title = {"Security Gap" as a metric for enterprise business processes}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.263}, doi = {10.1002/SPY2.263}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MukherjeeSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MurthyAT22, author = {Amith Murthy and Muhammad Rizwan Asghar and Wanqing Tu}, title = {Towards a data-driven framework for optimizing security-efficiency tradeoff in {QUIC}}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.184}, doi = {10.1002/SPY2.184}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MurthyAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NemaN22, author = {Prashant Nema and Manisha J. Nene}, title = {Quantum web of trust}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.195}, doi = {10.1002/SPY2.195}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NemaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NemaN22a, author = {Prashant Nema and Manisha J. Nene}, title = {Qubits based mutual authentication protocol}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.203}, doi = {10.1002/SPY2.203}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NemaN22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PatelD22, author = {Shreya Patel and Rinku Dewri}, title = {Private record linkage with linkage maps}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.265}, doi = {10.1002/SPY2.265}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PatelD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PonnuruPROK22, author = {Raveendra Babu Ponnuru and Basker Palaniswamy and Alavalapati Goutham Reddy and Vanga Odelu and Hyunsung Kim}, title = {A survey on security challenges and protocols of electric vehicle dynamic charging system}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.210}, doi = {10.1002/SPY2.210}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PonnuruPROK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RajamanickamVR22, author = {Siranjeevi Rajamanickam and Satyanarayana Vollala and Natarajan Ramasubramanian}, title = {{EAPIOD:} {ECC} based authentication protocol for insider attack protection in IoD scenario}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.248}, doi = {10.1002/SPY2.248}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/RajamanickamVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RanaKHS22, author = {Shubham Rana and Nitesh Kumar and Anand Handa and Sandeep K. Shukla}, title = {Automated Windows behavioral tracing for malware analysis}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.253}, doi = {10.1002/SPY2.253}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/RanaKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RenugadeviTVJB22, author = {N. Renugadevi and Shirisha Thangallapally and Sai Charan Vemula and Stheya Julakanti and Somya Bhatnagar}, title = {Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array-A survey}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.254}, doi = {10.1002/SPY2.254}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RenugadeviTVJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RipanIAS22, author = {Rony Chowdhury Ripan and Md. Moinul Islam and Hamed AlQahtani and Iqbal H. Sarker}, title = {Effectively predicting cyber-attacks through isolation forest learning-based outlier detection}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.212}, doi = {10.1002/SPY2.212}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RipanIAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SaadKB22, author = {Sabra Ben Saad and Adlen Ksentini and Bouziane Brik}, title = {An end-to-end trusted architecture for network slicing in 5G and beyond networks}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.186}, doi = {10.1002/SPY2.186}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SaadKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SaurabhS22, author = {Shyam Saurabh and Kishore Sinha}, title = {Perfect secret sharing schemes from combinatorial squares}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.262}, doi = {10.1002/SPY2.262}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SaurabhS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/StephenJ22, author = {Steffie Maria Stephen and Arunita Jaekel}, title = {Roadside unit-based pseudonym authentication in vehicular ad hoc network}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.238}, doi = {10.1002/SPY2.238}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/StephenJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SumithraSM22, author = {V. Sumithra and Shashidhara and Debajyoti Mukhopadhyay}, title = {Design of a secure and privacy preserving authentication protocol for telecare medical information systems}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.228}, doi = {10.1002/SPY2.228}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SumithraSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasmeenU22, author = {Fauzia Yasmeen and Mohammad Shorif Uddin}, title = {A novel watermarking scheme based on discrete wavelet transform-singular value decomposition}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.216}, doi = {10.1002/SPY2.216}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YasmeenU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasmeenU22a, author = {Fauzia Yasmeen and Mohammad Shorif Uddin}, title = {An efficient image steganography approach based on {QR} factorization and singular value decomposition in non-subsampled contourlet transform domain}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.229}, doi = {10.1002/SPY2.229}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/YasmeenU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YiHZM22, author = {Yuzi Yi and Jingsha He and Nafei Zhu and Xiangjun Ma}, title = {Social influence-based privacy inference attacks in online social networks}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.194}, doi = {10.1002/SPY2.194}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YiHZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZengBX22, author = {Fanfeng Zeng and Haoyin Bai and Ke Xiao}, title = {Blind watermarking algorithm combining NSCT, DWT, SVD, and {HVS}}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.223}, doi = {10.1002/SPY2.223}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ZengBX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZeydanTT22, author = {Engin Zeydan and Yekta Turk and Yaman Yagiz Tasbag}, title = {Entropy service for secure real-time mission critical communications}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.258}, doi = {10.1002/SPY2.258}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ZeydanTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZhangZJY22, author = {Yongbing Zhang and Qiuyu Zhang and Yilong Jiang and Yan Yan}, title = {A location privacy protection method based on cipher-text retrieval in cloud environment}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.250}, doi = {10.1002/SPY2.250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZhangZJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AgwiIO21, author = {Uche C. Agwi and Martins E. Irhebhude and Francisca Nonyelum Ogwueleka}, title = {Video surveillance in examination monitoring}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.144}, doi = {10.1002/SPY2.144}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AgwiIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AhmadE21, author = {Humza Ahmad and Laszlo Erdodi}, title = {Overview of phishing landscape and homographs in Arabic domain names}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.159}, doi = {10.1002/SPY2.159}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AhmadE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AjdaniG21, author = {Mahdi Ajdani and Hamid Reza Ghaffary}, title = {Introduced a new method for enhancement of intrusion detection with random forest and {PSO} algorithm}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.147}, doi = {10.1002/SPY2.147}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AjdaniG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlotaibiAH21, author = {Reem Alotaibi and Tahani Alnazzawi and Nermin Hamza}, title = {A new location-based privacy protection algorithm with deep learning}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.139}, doi = {10.1002/SPY2.139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlotaibiAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlzoubiOJA21, author = {Yehia Ibrahim Alzoubi and Valmira H. Osmanaj and Ashraf Jaradat and Ahmad Salah Al{-}Ahmad}, title = {Fog computing security and privacy for the Internet of Thing applications: State-of-the-art}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.145}, doi = {10.1002/SPY2.145}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AlzoubiOJA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AshawaM21, author = {Moses Ashawa and Sarah Morris}, title = {Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.164}, doi = {10.1002/SPY2.164}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AshawaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BahlSA21, author = {Aditya Bahl and Aastha Sharma and Muhammad Rizwan Asghar}, title = {Vulnerability disclosure and cybersecurity awareness campaigns on twitter during {COVID-19}}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.180}, doi = {10.1002/SPY2.180}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BahlSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BasicevicBO21, author = {Ilija Basicevic and Nikola Blazic and Stanislav Ocovaj}, title = {On the use of generalized entropy formulas in detection of denial-of-service attacks}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.134}, doi = {10.1002/SPY2.134}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BasicevicBO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChunkaGB21, author = {Chukhu Chunka and Rajat Subhra Goswami and Subhasish Banerjee}, title = {An efficient mechanism to generate dynamic keys based on genetic algorithm}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.37}, doi = {10.1002/SPY2.37}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ChunkaGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/CzeksterMCSPD21, author = {Ricardo M. Czekster and Charles Morisset and John A. Clark and Sadegh Soudjani and Charalampos Patsios and Peter Davison}, title = {Systematic review of features for co-simulating security incidents in Cyber-Physical Systems}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.150}, doi = {10.1002/SPY2.150}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/CzeksterMCSPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Faisal21, author = {Kamrul Faisal}, title = {Balancing between Right to Be Forgotten and Right to Freedom of Expression in Spent Criminal Convictions}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.157}, doi = {10.1002/SPY2.157}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Faisal21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FarR21, author = {Saeed Banaeian Far and Azadeh Imani Rad}, title = {Distributed auditing protocol for blockchain-based transactions using a distributed signature}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.156}, doi = {10.1002/SPY2.156}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FarR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FuL21, author = {Rui Fu and Xinyu Li}, title = {Malicious attacks on the web and crawling of information data by Python technology}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.173}, doi = {10.1002/SPY2.173}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Ghiyamipour21, author = {Fatemeh Ghiyamipour}, title = {Secure graphical password based on cued click points using fuzzy logic}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.140}, doi = {10.1002/SPY2.140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Ghiyamipour21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JustinePT21, author = {Cynara Justine and Rendhir R. Prasad and Ciza Thomas}, title = {Game theoretical analysis of usable security and privacy}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.55}, doi = {10.1002/SPY2.55}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/JustinePT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KatarahweireBMN21, author = {Marriette Katarahweire and Engineer Bainomugisha and Khalid A. Mughal and John Ngubiri}, title = {Form-based security in mobile health data collection systems}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.155}, doi = {10.1002/SPY2.155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KatarahweireBMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KebandeKCA21, author = {Victor R. Kebande and Nickson M. Karie and Kim{-}Kwang Raymond Choo and Sadi Alawadi}, title = {Digital forensic readiness intelligence crime repository}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.151}, doi = {10.1002/SPY2.151}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KebandeKCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarA21, author = {Shivansh Kumar and Ruhul Amin}, title = {Mitigating distributed denial of service attack: Blockchain and software-defined networking based approach, network model with future research challenges}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.163}, doi = {10.1002/SPY2.163}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KumarA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarBA21, author = {Shivansh Kumar and Aman Kumar Bharti and Ruhul Amin}, title = {Decentralized secure storage of medical records using Blockchain and {IPFS:} {A} comparative analysis with future directions}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.162}, doi = {10.1002/SPY2.162}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KumarBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LiJ21, author = {Zhijun Li and Xuedong Jiang}, title = {Detection and defense of network virus using data mining technology}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.179}, doi = {10.1002/SPY2.179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LiJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LiuGW21, author = {Fei Liu and Hongyan Gao and Ze{-}Gang Wei}, title = {Research on the game of network security attack-defense confrontation through the optimal defense strategy}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.136}, doi = {10.1002/SPY2.136}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LiuGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MakuraVKKIA21, author = {Sheunesu M. Makura and H. S. Venter and Victor R. Kebande and Nickson M. Karie and Richard Adeyemi Ikuesan and Sadi Alawadi}, title = {Digital forensic readiness in operational cloud leveraging {ISO/IEC} 27043 guidelines on security monitoring}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.149}, doi = {10.1002/SPY2.149}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MakuraVKKIA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MardiTH21, author = {Dhaneshwar Mardi and Surbhi Tanwar and Jaydeep Howlader}, title = {Multiparty protocol that usually shuffles}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.176}, doi = {10.1002/SPY2.176}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MardiTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MatyokurehwaRGM21, author = {Kanos Matyokurehwa and Norman Rudhumbu and Cross Gombiro and Chiedza Mlambo}, title = {Cybersecurity awareness in Zimbabwean universities: Perspectives from the students}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.141}, doi = {10.1002/SPY2.141}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MatyokurehwaRGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MehibelH21, author = {Nissa Mehibel and M'hamed Hamadouche}, title = {Authenticated secret session key using elliptic curve digital signature algorithm}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.148}, doi = {10.1002/SPY2.148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MehibelH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MercanCAATD21, author = {Suat Mercan and Mumin Cebe and Ramazan Savas Ayg{\"{u}}n and Kemal Akkaya and Elijah Toussaint and Dominik Danko}, title = {Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.143}, doi = {10.1002/SPY2.143}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MercanCAATD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MisraGTK21, author = {Sudip Misra and Sumit Goswami and Chaynika Taneja and Pushpendu Kar}, title = {Heterogeneous polydentate mobile chelating node to detect breach in surveillance sensor network}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.175}, doi = {10.1002/SPY2.175}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MisraGTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NaharGR21, author = {Kamrun Nahar and Asif Qumer Gill and Terry Roach}, title = {Developing an access control management metamodel for secure digital enterprise architecture modeling}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.160}, doi = {10.1002/SPY2.160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NaharGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OlakanmiD21, author = {Oladayo Olufemi Olakanmi and Adedamola Dada}, title = {An efficient point-to-point security solution for multihop routing in wireless sensor networks}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.58}, doi = {10.1002/SPY2.58}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/OlakanmiD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OlakanmiO21, author = {Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi}, title = {A secure and collaborative data aggregation scheme for fine-grained data distribution and management in Internet of Things}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.135}, doi = {10.1002/SPY2.135}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OlakanmiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OlakanmiO21a, author = {Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi}, title = {Throttle: An efficient approach to mitigate distributed denial of service attacks on software-defined networks}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.158}, doi = {10.1002/SPY2.158}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OlakanmiO21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PandaMMS21, author = {Sandeep Kumar Panda and Gouse Baig Mohammad and Sachi Nandan Mohanty and Sipra Sahoo}, title = {Smart contract-based land registry system to reduce frauds and time delay}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.172}, doi = {10.1002/SPY2.172}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PandaMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RanaM21, author = {Saurabh Rana and Dheerendra Mishra}, title = {Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.133}, doi = {10.1002/SPY2.133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RanaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RussoBB21, author = {Pietro Russo and Lorenzo Bracciale and Giuseppe Bianchi}, title = {Dare-to-Share: Collaborative privacy-preserving recommendations with (almost) no crypto}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.153}, doi = {10.1002/SPY2.153}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RussoBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SahraouiB21, author = {Somia Sahraoui and Azeddine Bilami}, title = {Securing human-to-thing interactions in the Internet of Things with asymmetric and selective mechanism}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.38}, doi = {10.1002/SPY2.38}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SahraouiB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SankhwarPKM21, author = {Shweta Sankhwar and Dhirendra Pandey and Raees Ahmad Khan and Sachi Nandan Mohanty}, title = {An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.132}, doi = {10.1002/SPY2.132}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SankhwarPKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SelimHSE21, author = {Gamal Eldin I. Selim and Ezz El{-}Din Hemdan and Ahmed M. Shehata and Nawal A. El{-}Fishawy}, title = {An efficient machine learning model for malicious activities recognition in water-based industrial internet of things}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.154}, doi = {10.1002/SPY2.154}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SelimHSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ShamsuzzohaR21, author = {Ahm Shamsuzzoha and Heli Raappana}, title = {Perspectives of business process ethics in data-driven marketing management}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.177}, doi = {10.1002/SPY2.177}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ShamsuzzohaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ShashidharaALAD21, author = {R. Shashidhara and Nisha Ahuja and M. Lajuvanthi and S. Akhila and Ashok Kumar Das and Joel J. P. C. Rodrigues}, title = {SDN-chain: Privacy-preserving protocol for software defined networks using blockchain}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.178}, doi = {10.1002/SPY2.178}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ShashidharaALAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SrivastavaMKJDP21, author = {Shubhi Srivastava and Mohit and Arun Kumar and Sudhanshu Kumar Jha and Pratibha Dixit and Shiv Prakash}, title = {Event-driven data alteration detection using block-chain}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.146}, doi = {10.1002/SPY2.146}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SrivastavaMKJDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/StojnicVA21, author = {Tatyana Stojnic and Dinusha Vatsalan and Nalin A. G. Arachchilage}, title = {Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails}, journal = {Secur. Priv.}, volume = {4}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/spy2.165}, doi = {10.1002/SPY2.165}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/StojnicVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/UnderwoodS21, author = {Ben Underwood and Hossein Saiedian}, title = {Mass surveillance: {A} study of past practices and technologies to predict future directions}, journal = {Secur. Priv.}, volume = {4}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/spy2.142}, doi = {10.1002/SPY2.142}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/UnderwoodS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Wang21, author = {Gang Wang}, title = {Comparative study on different neural networks for network security situation prediction}, journal = {Secur. Priv.}, volume = {4}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/spy2.138}, doi = {10.1002/SPY2.138}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/WuLSG21, author = {Haotian Wu and Xin Li and Caterina M. Scoglio and Don Gruenbacher}, title = {Security inspection resource allocation in real time using {SDN}}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.174}, doi = {10.1002/SPY2.174}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/WuLSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasinFLWAW21, author = {Affan Yasin and Rubia Fatima and Lin Liu and Jianmin Wang and Raian Ali and Ziqi Wei}, title = {Understanding and deciphering of social engineering attack scenarios}, journal = {Secur. Priv.}, volume = {4}, number = {4}, year = {2021}, url = {https://doi.org/10.1002/spy2.161}, doi = {10.1002/SPY2.161}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YasinFLWAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Yuan21, author = {Li Yuan}, title = {Prediction of network security situation awareness based on an improved model combined with neural network}, journal = {Secur. Priv.}, volume = {4}, number = {6}, year = {2021}, url = {https://doi.org/10.1002/spy2.181}, doi = {10.1002/SPY2.181}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Yuan21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZareiF21, author = {Seyed Meysam Zarei and Reza Fotohi}, title = {Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem}, journal = {Secur. Priv.}, volume = {4}, number = {3}, year = {2021}, url = {https://doi.org/10.1002/spy2.152}, doi = {10.1002/SPY2.152}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZareiF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Adams20, author = {Carlisle Adams}, title = {A privacy-preserving Blockchain with fine-grained access control}, journal = {Secur. Priv.}, volume = {3}, number = {2}, year = {2020}, url = {https://doi.org/10.1002/spy2.97}, doi = {10.1002/SPY2.97}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Adams20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AkramMSGT20, author = {Shaik Vaseem Akram and Praveen Kumar Malik and Rajesh Singh and Anita Gehlot and Sudeep Tanwar}, title = {Adoption of blockchain technology in various realms: Opportunities and challenges}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.109}, doi = {10.1002/SPY2.109}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AkramMSGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Al-GhamdiAA20, author = {Al{-}Batool Al{-}Ghamdi and Ameenah Al{-}Sulami and Asia Othman Aljahdali}, title = {On the security and confidentiality of quantum key distribution}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.111}, doi = {10.1002/SPY2.111}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Al-GhamdiAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AngaforYH20, author = {Giddeon Njamngang Angafor and Iryna Yevseyeva and Ying He}, title = {Game-based learning: {A} review of tabletop exercises for cybersecurity incident response training}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.126}, doi = {10.1002/SPY2.126}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/AngaforYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BelguithKR20, author = {Sana Belguith and Nesrine Kaaniche and Giovanni Russello}, title = {{CUPS:} Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update}, journal = {Secur. Priv.}, volume = {3}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/spy2.85}, doi = {10.1002/SPY2.85}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BelguithKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BoudjemaVMF20, author = {El Habib Boudjema and Sergey Verlan and Lynda Mokdad and Christ{\`{e}}le Faure}, title = {{VYPER:} Vulnerability detection in binary code}, journal = {Secur. Priv.}, volume = {3}, number = {2}, year = {2020}, url = {https://doi.org/10.1002/spy2.100}, doi = {10.1002/SPY2.100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BoudjemaVMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DashNNOI20, author = {Pandit Byomakesha Dash and Janmenjoy Nayak and Bighnaraj Naik and Etuari Oram and SK Hafizul Islam}, title = {Model based IoT security framework using multiclass adaptive boosting with {SMOTE}}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.112}, doi = {10.1002/SPY2.112}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DashNNOI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DeyCG20, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes}, journal = {Secur. Priv.}, volume = {3}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/spy2.90}, doi = {10.1002/SPY2.90}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DeyCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DeyCG20a, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {A new algorithm to find monic irreducible polynomials over extended Galois field GF(pq) using positional arithmetic}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.110}, doi = {10.1002/SPY2.110}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DeyCG20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DharminderM20, author = {Dharminder Dharminder and Dheerendra Mishra}, title = {Understanding signcryption security in standard model}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.105}, doi = {10.1002/SPY2.105}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DharminderM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DuarteHTG20, author = {Elias P. Duarte Jr. and Carmem S. Hara and Pedro R. Torres Jr. and Christian Gomes}, title = {BackStreamDB: {A} stream processing engine for backbone traffic monitoring with anomaly detection}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.106}, doi = {10.1002/SPY2.106}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/DuarteHTG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ElkhodrA20, author = {Mahmoud Elkhodr and Belal Alsinglawi}, title = {Data provenance and trust establishment in the Internet of Things}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.99}, doi = {10.1002/SPY2.99}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ElkhodrA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FerraWBHPS20, author = {Fenia Ferra and Isabel Wagner and Eerke A. Boiten and Lee Hadlington and Ismini Psychoula and Richard Snape}, title = {Challenges in assessing privacy impact: Tales from the front lines}, journal = {Secur. Priv.}, volume = {3}, number = {2}, year = {2020}, url = {https://doi.org/10.1002/spy2.101}, doi = {10.1002/SPY2.101}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/FerraWBHPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FiroozjaeiLG20, author = {Mahdi Daghmehchi Firoozjaei and Rongxing Lu and Ali A. Ghorbani}, title = {An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.131}, doi = {10.1002/SPY2.131}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/FiroozjaeiLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HosseinzadehSIL20, author = {Shohreh Hosseinzadeh and Bernardo Sequeiros and Pedro R. M. In{\'{a}}cio and Ville Lepp{\"{a}}nen}, title = {Recent trends in applying {TPM} to cloud computing}, journal = {Secur. Priv.}, volume = {3}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/spy2.93}, doi = {10.1002/SPY2.93}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HosseinzadehSIL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KamilO20, author = {Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin}, title = {On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.104}, doi = {10.1002/SPY2.104}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KamilO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhanasB20, author = {Yuriy Khanas and Michal Borecki}, title = {Research on the use of algorithms for matrix transformations for encrypting text information}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.108}, doi = {10.1002/SPY2.108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhanasB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KhwajaMA20, author = {Amir A. Khwaja and Muniba Murtaza and Hafiz F. Ahmed}, title = {A security feature framework for programming languages to minimize application layer vulnerabilities}, journal = {Secur. Priv.}, volume = {3}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/spy2.95}, doi = {10.1002/SPY2.95}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KhwajaMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KunalGST20, author = {Sourav Kunal and Parth Gandhi and Ronak Sutariya and Hardik Tarpara}, title = {A secure software defined networking for distributed environment}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.130}, doi = {10.1002/SPY2.130}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KunalGST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MeshramIMKB20, author = {Chandrashekhar Meshram and Rabha W. Ibrahim and Sarita Gajbhiye Meshram and Kailash Wamanrao Kalare and Sunil D. Bagde}, title = {An efficient ID-based cryptographic technique using {IFP} and {GDLP}}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.119}, doi = {10.1002/SPY2.119}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MeshramIMKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MustacogluCF20, author = {Ahmet Fatih Mustacoglu and Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak and Geoffrey C. Fox}, title = {Password-based encryption approach for securing sensitive data}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.121}, doi = {10.1002/SPY2.121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MustacogluCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NgwenyaN20, author = {Mfanasibili Ngwenya and Mpho Ngoepe}, title = {A framework for data security, privacy, and trust in "consumer internet of things" assemblages in South Africa}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.122}, doi = {10.1002/SPY2.122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NgwenyaN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NikooghadamA20, author = {Mahdi Nikooghadam and Haleh Amintoosi}, title = {A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol}, journal = {Secur. Priv.}, volume = {3}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/spy2.92}, doi = {10.1002/SPY2.92}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NikooghadamA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NodelandB20, author = {Brooke Nodeland and Scott Belshaw}, title = {Establishing a criminal justice cyber lab to develop and enhance professional and educational opportunities}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.123}, doi = {10.1002/SPY2.123}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NodelandB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NtonjaA20, author = {Morris Ntonja and Moses Ashawa}, title = {Examining artifacts generated by setting Facebook Messenger as a default {SMS} application on Android: Implication for personal data privacy}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.128}, doi = {10.1002/SPY2.128}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NtonjaA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OlorunsolaOE20, author = {Olufunso Stephen Olorunsola and Francisca Nonyelum Ogwueleka and Abraham E. Evwiekpaefe}, title = {Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.124}, doi = {10.1002/SPY2.124}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OlorunsolaOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PRSG20, author = {Akhila G. P. and Gayathri R. and Keerthana S. and Angelin Gladston}, title = {A machine learning framework for domain generating algorithm based malware detection}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.127}, doi = {10.1002/SPY2.127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PRSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SarfrazZA20, author = {Umair Sarfraz and Sherali Zeadally and Masoom Alam}, title = {Outsourcing {IOTA} proof-of-work to volunteer public devices}, journal = {Secur. Priv.}, volume = {3}, number = {2}, year = {2020}, url = {https://doi.org/10.1002/spy2.98}, doi = {10.1002/SPY2.98}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SarfrazZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SharmaN20, author = {Mohit Kumar Sharma and Manisha J. Nene}, title = {Two-factor authentication using biometric based quantum operations}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.102}, doi = {10.1002/SPY2.102}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SharmaN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SharmaN20a, author = {Mohit Kumar Sharma and Manisha J. Nene}, title = {Dual factor third-party biometric-based authentication scheme using quantum one time passwords{\textdagger}}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.129}, doi = {10.1002/SPY2.129}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SharmaN20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SiiskonenR20, author = {Tuuli Siiskonen and Mika Rantonen}, title = {Detecting Stuxnet-like data integrity attacks}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.107}, doi = {10.1002/SPY2.107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SiiskonenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SinghTS20, author = {Rajeev Singh and Sudeep Tanwar and Teek Parval Sharma}, title = {Utilization of blockchain for mitigating the distributed denial of service attacks}, journal = {Secur. Priv.}, volume = {3}, number = {3}, year = {2020}, url = {https://doi.org/10.1002/spy2.96}, doi = {10.1002/SPY2.96}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SinghTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/StergiopoulosKV20, author = {George Stergiopoulos and Nick Kapetanas and Efstratios Vasilellis and Dimitris Gritzalis}, title = {Leaking supervisory controls and data acquisition commands over unpadded {TCP/IP} encryption through differential packet size analysis}, journal = {Secur. Priv.}, volume = {3}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/spy2.82}, doi = {10.1002/SPY2.82}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/StergiopoulosKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TharaniA20, author = {Jeyakumar Samantha Tharani and Nalin A. G. Arachchilage}, title = {Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: {A} machine learning approach}, journal = {Secur. Priv.}, volume = {3}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/spy2.120}, doi = {10.1002/SPY2.120}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/TharaniA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VaddetiVPPSA20, author = {Ankitha Vaddeti and Deepthi Vidiyala and Vineetha Puritipati and Raveendra Babu Ponnuru and Ji Sun Shin and Goutham Reddy Alavalapati}, title = {Graphical passwords: Behind the attainment of goals}, journal = {Secur. Priv.}, volume = {3}, number = {6}, year = {2020}, url = {https://doi.org/10.1002/spy2.125}, doi = {10.1002/SPY2.125}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/VaddetiVPPSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YaqubKA20, author = {Waheeb Yaqub and Ibrahim Kamel and Zeyar Aung}, title = {Toward watermarking compressed data in columnar database architectures}, journal = {Secur. Priv.}, volume = {3}, number = {4}, year = {2020}, url = {https://doi.org/10.1002/spy2.84}, doi = {10.1002/SPY2.84}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YaqubKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Abbasinezhad-Mood19, author = {Dariush Abbasinezhad{-}Mood and Arezou Ostad{-}Sharif and Morteza Nikooghadam}, title = {Novel chaotic map-based privacy-preserving authenticated key agreement scheme without the electricity service provider involvement}, journal = {Secur. Priv.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/spy2.74}, doi = {10.1002/SPY2.74}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AcarLBAU19, author = {Abbas Acar and Wenyi Liu and Raheem Beyah and Kemal Akkaya and Arif Selcuk Uluagac}, title = {A privacy-preserving multifactor authentication system}, journal = {Secur. Priv.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/spy2.88}, doi = {10.1002/SPY2.88}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AcarLBAU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AcarLBAU19a, author = {Abbas Acar and Wenyi Liu and Raheem Beyah and Kemal Akkaya and Arif Selcuk Uluagac}, title = {A privacy-preserving multifactor authentication system}, journal = {Secur. Priv.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/spy2.94}, doi = {10.1002/SPY2.94}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AcarLBAU19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AgarkarA19, author = {Aarti Amod Agarkar and Himanshu Agrawal}, title = {A review and vision on authentication and privacy preservation schemes in smart grid network}, journal = {Secur. Priv.}, volume = {2}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/spy2.62}, doi = {10.1002/SPY2.62}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AgarkarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlshanketiTA19, author = {Faisal Alshanketi and Issa Traor{\'{e}} and Ahmed Awad}, title = {Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.48}, doi = {10.1002/SPY2.48}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlshanketiTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BaguiKBNP19, author = {Sikha Bagui and Ezhil Kalaimannan and Subhash C. Bagui and Debarghya Nandi and Anthony Pinto}, title = {Using machine learning techniques to identify rare cyber-attacks on the {UNSW-NB15} dataset}, journal = {Secur. Priv.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/spy2.91}, doi = {10.1002/SPY2.91}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BaguiKBNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BharadwajS19, author = {Nitesh K. Bharadwaj and Upasna Singh}, title = {An intelligent approach for examining and detecting target data fragments in suspected large storage drives}, journal = {Secur. Priv.}, volume = {2}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/spy2.71}, doi = {10.1002/SPY2.71}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BharadwajS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/EltayiebWHEL19, author = {Nabeil Eltayieb and Ping Wang and Alzubair Hassan and Rashad Elhabob and Fagen Li}, title = {{ASDS:} Attribute-based secure data sharing scheme for reliable cloud environment}, journal = {Secur. Priv.}, volume = {2}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/spy2.57}, doi = {10.1002/SPY2.57}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/EltayiebWHEL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/FengCLF19, author = {Tao Feng and Xuan Chen and Chunyan Liu and Xiaoqin Feng}, title = {Research on privacy enhancement scheme of blockchain transactions}, journal = {Secur. Priv.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/spy2.89}, doi = {10.1002/SPY2.89}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/FengCLF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HijaziO19, author = {Sherin Hijazi and Mohammad S. Obaidat}, title = {Address resolution protocol spoofing attacks and security approaches: {A} survey}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.49}, doi = {10.1002/SPY2.49}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HijaziO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Ifinedo19, author = {Princely Ifinedo}, title = {End user nonmalicious, counterproductive computer security behaviors: concept, development, and validation of an instrument}, journal = {Secur. Priv.}, volume = {2}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/spy2.66}, doi = {10.1002/SPY2.66}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Ifinedo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KaciBRY19, author = {Abdellah Kaci and Thouraya Bouabana{-}Tebibel and Abderrezak Rachedi and Chafia Yahiaoui}, title = {Toward a big data approach for indexing encrypted data in Cloud Computing}, journal = {Secur. Priv.}, volume = {2}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/spy2.65}, doi = {10.1002/SPY2.65}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KaciBRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KaruppiahOIV19, author = {Marimuthu Karuppiah and Mohammad S. Obaidat and SK Hafizul Islam and Pandi Vijayakumar}, title = {Security analysis on "mutual authentication scheme for multimedia medical information systems"}, journal = {Secur. Priv.}, volume = {2}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/spy2.67}, doi = {10.1002/SPY2.67}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KaruppiahOIV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KunalSA19, author = {Sourav Kunal and Arijit Saha and Ruhul Amin}, title = {An overview of cloud-fog computing: Architectures, applications with security challenges}, journal = {Secur. Priv.}, volume = {2}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/spy2.72}, doi = {10.1002/SPY2.72}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KunalSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LokhandeV19, author = {Vaibhav G. Lokhande and Deepti Vidyarthi}, title = {A study of hardware architecture based attacks to bypass operating system security}, journal = {Secur. Priv.}, volume = {2}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/spy2.81}, doi = {10.1002/SPY2.81}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LokhandeV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MaccariP19, author = {Leonardo Maccari and Andrea Passerini}, title = {A Big Data and machine learning approach for network monitoring and security}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.53}, doi = {10.1002/SPY2.53}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MaccariP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MisraKM19, author = {Subhas C. Misra and Ashutosh Kumar and Aswani K. Munnangi}, title = {Cloud-based healthcare management: Identifying the privacy concerns and their moderating effect on the cloud-based health-care services}, journal = {Secur. Priv.}, volume = {2}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/spy2.63}, doi = {10.1002/SPY2.63}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MisraKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PalJB19, author = {Pabitra Pal and Biswapati Jana and Jaydeb Bhaumik}, title = {Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image}, journal = {Secur. Priv.}, volume = {2}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/spy2.59}, doi = {10.1002/SPY2.59}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PalJB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Pandey19, author = {Sushant Kumar Pandey}, title = {Design and performance analysis of various feature selection methods for anomaly-based techniques in intrusion detection system}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.56}, doi = {10.1002/SPY2.56}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Pandey19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RaiRTM19, author = {Vikash Kumar Rai and Boreddy V. Reddy and Somanath Tripathy and Jimson Mathew}, title = {Correlation power analysis and effective defense approach on light encryption device block cipher}, journal = {Secur. Priv.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/spy2.87}, doi = {10.1002/SPY2.87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RaiRTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SahaAKVD19, author = {Arijit Saha and Ruhul Amin and Sourav Kunal and Satyanarayana Vollala and Sanjeev Kumar Dwivedi}, title = {Review on "Blockchain technology based medical healthcare system with privacy issues"}, journal = {Secur. Priv.}, volume = {2}, number = {5}, year = {2019}, url = {https://doi.org/10.1002/spy2.83}, doi = {10.1002/SPY2.83}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SahaAKVD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SalemO19, author = {Asma Salem and Mohammad S. Obaidat}, title = {A novel security scheme for behavioral authentication systems based on keystroke dynamics}, journal = {Secur. Priv.}, volume = {2}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/spy2.64}, doi = {10.1002/SPY2.64}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SalemO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SinhaT19, author = {Ashutosh Kumar Sinha and Somanath Tripathy}, title = {CookieArmor : Safeguarding against cross-site request forgery and session hijacking}, journal = {Secur. Priv.}, volume = {2}, number = {2}, year = {2019}, url = {https://doi.org/10.1002/spy2.60}, doi = {10.1002/SPY2.60}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SinhaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SwarnkarH19, author = {Mayank Swarnkar and Neminath Hubballi}, title = {SpamDetector : Detecting spam callers in Voice over Internet Protocol with graph anomalies}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.54}, doi = {10.1002/SPY2.54}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SwarnkarH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VidyarthiDRKC19, author = {Deepti Vidyarthi and Gaurav Damri and Subrata Rakshit and C. R. Suthikshn Kumar and Shailesh Chansarkar}, title = {Classification of malicious process using high-level activity based dynamic analysis}, journal = {Secur. Priv.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/spy2.86}, doi = {10.1002/SPY2.86}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/VidyarthiDRKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasinF0Y019, author = {Affan Yasin and Rubia Fatima and Lin Liu and Awaid Yasin and Jianmin Wang}, title = {Contemplating social engineering studies and attack scenarios: {A} review study}, journal = {Secur. Priv.}, volume = {2}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/spy2.73}, doi = {10.1002/SPY2.73}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YasinF0Y019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Abbasinezhad-Mood18, author = {Dariush Abbasinezhad{-}Mood and Morteza Nikooghadam}, title = {Efficient design and extensive hardware evaluation of an anonymous data aggregation scheme for smart grid}, journal = {Secur. Priv.}, volume = {1}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/spy2.24}, doi = {10.1002/SPY2.24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Abbasinezhad-Mood18a, author = {Dariush Abbasinezhad{-}Mood and Morteza Nikooghadam}, title = {Design and microcontroller-based hardware performance analysis of a security-enhanced lightweight communication scheme for smart grid}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.34}, doi = {10.1002/SPY2.34}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AbdAllahZH18, author = {Eslam G. AbdAllah and Mohammad Zulkernine and Hossam S. Hassanein}, title = {{DADI:} Defending against distributed denial of service in information-centric networking routing and caching}, journal = {Secur. Priv.}, volume = {1}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/spy2.16}, doi = {10.1002/SPY2.16}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AbdAllahZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AbdAllahZH18a, author = {Eslam G. AbdAllah and Mohammad Zulkernine and Hossam S. Hassanein}, title = {Preventing unauthorized access in information centric networking}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.33}, doi = {10.1002/SPY2.33}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AbdAllahZH18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AhmedTS18, author = {Hadeer Ahmed and Issa Traor{\'{e}} and Sherif Saad}, title = {Detecting opinion spams and fake news using text classification}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.9}, doi = {10.1002/SPY2.9}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AhmedTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Allam18, author = {Ali M. Allam}, title = {A secret key establishment in frequency division duplex communication systems under active attacker}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.45}, doi = {10.1002/SPY2.45}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Allam18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ArmanFLS18, author = {Ala Arman and Sara Foresti and Giovanni Livraga and Pierangela Samarati}, title = {Cloud plan selection under requirements of multiple applications}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.35}, doi = {10.1002/SPY2.35}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ArmanFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AsadianJ18, author = {Hooman Asadian and Hamid Haj Seyed Javadi}, title = {Identification of Sybil attacks on social networks using a framework based on user interactions}, journal = {Secur. Priv.}, volume = {1}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/spy2.19}, doi = {10.1002/SPY2.19}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AsadianJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BaoCO18, author = {Rongxin Bao and Zhikui Chen and Mohammad S. Obaidat}, title = {Challenges and techniques in Big data security and privacy: {A} review}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.13}, doi = {10.1002/SPY2.13}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BaoCO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BharadwajS18, author = {Nitesh K. Bharadwaj and Upasna Singh}, title = {Significant data region identification and analysis using k -means in large storage drive forensics}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.40}, doi = {10.1002/SPY2.40}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BharadwajS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BoudjemaFSM18, author = {El Habib Boudjema and Christ{\`{e}}le Faure and Mathieu Sassolas and Lynda Mokdad}, title = {Detection of security vulnerabilities in {C} language applications}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.8}, doi = {10.1002/SPY2.8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BoudjemaFSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Chen18, author = {Lei Chen}, title = {Security and privacy on physical layer for wireless sensing: {A} survey}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.22}, doi = {10.1002/SPY2.22}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Chen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DeyGJMM18, author = {Dipankar Dey and Debasis Giri and Biswapati Jana and Tanmoy Maitra and Ram N. Mohapatra}, title = {Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.52}, doi = {10.1002/SPY2.52}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DeyGJMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DhasarathanDTP18, author = {Chandramohan Dhasarathan and Rajaguru Dayalan and Vengattaraman Thirumal and Dhavachelvan Ponnurangam}, title = {A coordinator-specific privacy-preserving model for E-health monitoring using artificial bee colony approach}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.32}, doi = {10.1002/SPY2.32}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DhasarathanDTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarSK18, author = {Sanjeev Kumar and Amarpal Singh and Manoj Kumar}, title = {Covert information sharing with novel fuzzy adaptive edge detection}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.47}, doi = {10.1002/SPY2.47}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LosavioCKJ18, author = {Michael Martin Losavio and Kam{-}Pui Chow and Andras Koltay and Joshua James}, title = {The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.23}, doi = {10.1002/SPY2.23}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LosavioCKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MeshramOM18, author = {Chandrashekhar Meshram and Mohammad S. Obaidat and Sarita Gajbhiye Meshram}, title = {Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.12}, doi = {10.1002/SPY2.12}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MeshramOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MihoubiRLL18, author = {Miloud Mihoubi and Abdellatif Rahmoun and Pascal Lorenz and Noureddine Lasla}, title = {An effective Bat algorithm for node localization in distributed wireless sensor network}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.7}, doi = {10.1002/SPY2.7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MihoubiRLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MoschosPN18, author = {Achillefs Moschos and Georgios I. Papadimitriou and Petros Nicopolitidis}, title = {Proactive encryption of personal area networks and small office-home office networks under advanced encryption standard application}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.10}, doi = {10.1002/SPY2.10}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MoschosPN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Obaidat18, author = {Mohammad S. Obaidat}, title = {Inaugural Editorial: {A} Message from the Founding Editor-in-Chief}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.14}, doi = {10.1002/SPY2.14}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Obaidat18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Ogundoyin18, author = {Sunday Oyinlola Ogundoyin}, title = {An anonymous and privacy-preserving scheme for efficient traffic movement analysis in intelligent transportation system}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.50}, doi = {10.1002/SPY2.50}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Ogundoyin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OmalaAL18, author = {Anyembe Andrew Omala and Ikram Ali and Fagen Li}, title = {Heterogeneous signcryption with keyword search for wireless body area network}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.25}, doi = {10.1002/SPY2.25}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/OmalaAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OppermannTTS18, author = {Alexander Oppermann and Federico Grasso Toro and Florian Thiel and Jean{-}Pierre Seifert}, title = {Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.18}, doi = {10.1002/SPY2.18}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OppermannTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PattersonO18, author = {Jack Patterson and Mohammad S. Obaidat}, title = {Submission and citation practices and Security and Privacy's commitment to integrity and ethics}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.17}, doi = {10.1002/SPY2.17}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PattersonO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PerezZC18, author = {Alfredo J. Perez and Sherali Zeadally and Jonathan Cochran}, title = {A review and an empirical analysis of privacy policy and notices for consumer Internet of things}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.15}, doi = {10.1002/SPY2.15}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PerezZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RaniyalWDA18, author = {Maninder Singh Raniyal and Isaac Woungang and Sanjay Kumar Dhurandher and Sherif Saad Ahmed}, title = {Passphrase protected device-to-device mutual authentication schemes for smart homes}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.42}, doi = {10.1002/SPY2.42}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RaniyalWDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ResendeD18, author = {Paulo Angelo Alves Resende and Andr{\'{e}} Costa Drummond}, title = {Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling}, journal = {Secur. Priv.}, volume = {1}, number = {4}, year = {2018}, url = {https://doi.org/10.1002/spy2.36}, doi = {10.1002/SPY2.36}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ResendeD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ResendeD18a, author = {Paulo Angelo Alves Resende and Andr{\'{e}} Costa Drummond}, title = {{HTTP} and contact-based features for Botnet detection}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.41}, doi = {10.1002/SPY2.41}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ResendeD18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SamailaNFFI18, author = {Musa G. Samaila and Miguel Neto and Diogo A. B. Fernandes and M{\'{a}}rio M. Freire and Pedro R. M. In{\'{a}}cio}, title = {Challenges of securing Internet of Things devices: {A} survey}, journal = {Secur. Priv.}, volume = {1}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/spy2.20}, doi = {10.1002/SPY2.20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SamailaNFFI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SinhaIO18, author = {Shobhit Sinha and SK Hafizul Islam and Mohammad S. Obaidat}, title = {A comparative study and analysis of some pseudorandom number generator algorithms}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.46}, doi = {10.1002/SPY2.46}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SinhaIO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TanwarVT0O18, author = {Sudeep Tanwar and Jayneel Vora and Sudhanshu Tyagi and Neeraj Kumar and Mohammad S. Obaidat}, title = {A systematic review on security issues in vehicular ad hoc network}, journal = {Secur. Priv.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/spy2.39}, doi = {10.1002/SPY2.39}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/TanwarVT0O18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TeniouB18, author = {Ahcene Teniou and Boucif Amar Bensaber}, title = {Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks}, journal = {Secur. Priv.}, volume = {1}, number = {1}, year = {2018}, url = {https://doi.org/10.1002/spy2.11}, doi = {10.1002/SPY2.11}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/TeniouB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TraoreAO18, author = {Issa Traor{\'{e}} and Mohammed Alshahrani and Mohammad S. Obaidat}, title = {State of the art and perspectives on traditional and emerging biometrics: {A} survey}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.44}, doi = {10.1002/SPY2.44}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/TraoreAO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/TsengNK18, author = {Yuchia Tseng and Farid Na{\"{\i}}t{-}Abdesselam and Ashfaq A. Khokhar}, title = {A comprehensive 3-dimensional security analysis of a controller in software-defined networking}, journal = {Secur. Priv.}, volume = {1}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/spy2.21}, doi = {10.1002/SPY2.21}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/TsengNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/VenkatesanACSC18, author = {Sridhar Venkatesan and Massimiliano Albanese and Cho{-}Yu Jason Chiang and Angelo Sapello and Ritu Chadha}, title = {DeBot: {A} novel network-based mechanism to detect exfiltration by architectural stealthy botnets}, journal = {Secur. Priv.}, volume = {1}, number = {6}, year = {2018}, url = {https://doi.org/10.1002/spy2.51}, doi = {10.1002/SPY2.51}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/VenkatesanACSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/WoungangDRA18, author = {Isaac Woungang and Sanjay Kumar Dhurandher and Joel J. P. C. Rodrigues and Ahmed Awad}, title = {Special Issue on security and privacy in Internet of Things and cloud computing systems}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.43}, doi = {10.1002/SPY2.43}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/WoungangDRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.