default search action
Search dblp for Publications
export results for "stream:journals/jcsm:"
@article{DBLP:journals/jcsm/AbedA24, author = {Qutaiba Kadhim Abed and Waleed Ameen Mahmoud Al{-}Jawher}, title = {A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {983--1006}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1358}, doi = {10.13052/JCSM2245-1439.1358}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbedA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbedA24a, author = {Qutaiba Kadhim Abed and Waleed Ameen Mahmoud Al{-}Jawher}, title = {Enhanced Hyperchaotic Image Encryption with {CAW} Transform and Sea-Lion Optimizer}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1207--1238}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13517}, doi = {10.13052/JCSM2245-1439.13517}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbedA24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DawsonTHM24, author = {John Kwao Dawson and Frimpong Twum and James Benjamin Hayfron{-}Acquah and Yaw Marfo Missah}, title = {Cryptographic Solutions for Data Security in Cloud Computing: {A} Run Time Trend-based Comparison of NCS, ERSA, and {EHS}}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {265--282}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1324}, doi = {10.13052/JCSM2245-1439.1324}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DawsonTHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DeiSLSK24, author = {Herasym Dei and Dmytro Shvets and Nataliia Lytvyn and Olena Sytnichenko and Olena Kobus}, title = {Legal Challenges and Perspectives of Cybersecurity in the System of State Governance of Educational Institutions in Ukraine}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {963--982}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1357}, doi = {10.13052/JCSM2245-1439.1357}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DeiSLSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Deng24, author = {Yongsheng Deng}, title = {Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {327--348}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1327}, doi = {10.13052/JCSM2245-1439.1327}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Deng24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DikoS24, author = {Zambia Diko and Khulumani Sibanda}, title = {Comparative Analysis of Popular Supervised Machine Learning Algorithms for Detecting Malicious Universal Resource Locators}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1105--1128}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13513}, doi = {10.13052/JCSM2245-1439.13513}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DikoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HaddadMSJA24, author = {Nabeel Mahdy Haddad and Mustafa sabah Mustafa and Hayder Sabah Salih and Mustafa Musa Jaber and Mohammed Hasan Ali}, title = {Analysis of the Security of Internet of Multimedia Things in Wireless Environment}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {161--192}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1316}, doi = {10.13052/JCSM2245-1439.1316}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HaddadMSJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HamzaYB24, author = {Lamia Hamza and Mayliss Yousfi and Lynda Bounehar}, title = {Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1039--1060}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13510}, doi = {10.13052/JCSM2245-1439.13510}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HamzaYB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HanZZ24, author = {Guoying Han and Bin Zhou and Yazi Zhang}, title = {Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {941--962}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1356}, doi = {10.13052/JCSM2245-1439.1356}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HanZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/He24, author = {Li He}, title = {Design of a Lightweight Network Intrusion Detection System Based on Artificial Intelligence Technology}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1129--1148}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13514}, doi = {10.13052/JCSM2245-1439.13514}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/He24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HouLZGZ24, author = {Botao Hou and Zhefeng Li and Xiaojun Zuo and Yuling Guo and Jianchun Zhou}, title = {Application of Intelligent Cloud Computing Technology in Optical Communication Network Security of Smart Grid}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {605--632}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1342}, doi = {10.13052/JCSM2245-1439.1342}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HouLZGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HuangS24, author = {Liusuo Huang and Yan Song}, title = {Update Algorithm of Secure Computer Database Based on Deep Belief Network}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {1--26}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1311}, doi = {10.13052/JCSM2245-1439.1311}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HuangS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HussainRF24, author = {Syed Shuja Hussain and Mohd Faizal Ab Razak and Ahmad Firdaus}, title = {Deep Learning Based Hybrid Analysis of Malware Detection and Classification: {A} Recent Review}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {91--134}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1314}, doi = {10.13052/JCSM2245-1439.1314}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HussainRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/IgnaimF24, author = {Karam Mustafa Ignaim and Jo{\~{a}}o M. Fernandes}, title = {Improving Incident Management Processes with Feature Models}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {701--724}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1346}, doi = {10.13052/JCSM2245-1439.1346}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/IgnaimF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/IsmailTHHMBS24, author = {Tayssir Ismail and Haifa Touati and Nasreddine Hajlaoui and Mohamed Hadded and Paul Muhlethaler and Samia Bouzefrane and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, title = {A Comprehensive Survey on Vehicular Communication Security}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1007--1038}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1359}, doi = {10.13052/JCSM2245-1439.1359}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/IsmailTHHMBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JiangHFZ24, author = {Yan Jiang and Jing Huang and Yunsong Fan and Xiaobin Zhu}, title = {Design and Implementation of IPsec {VPN} IoT Gateway System in National Secret Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {677--700}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1345}, doi = {10.13052/JCSM2245-1439.1345}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/JiangHFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li24, author = {Wentao Li}, title = {Construction and Analysis of {QPSO-LSTM} Model in Network Security Situation Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {417--438}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1334}, doi = {10.13052/JCSM2245-1439.1334}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li24a, author = {Jiabin Li}, title = {Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {517--540}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1338}, doi = {10.13052/JCSM2245-1439.1338}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li24b, author = {Xiaowu Li}, title = {Network Security Behavior Anomaly Detection Based on Improved Empirical Mode Decomposition}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {917--940}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1355}, doi = {10.13052/JCSM2245-1439.1355}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiH24, author = {Jun Li and Weijun Huang}, title = {A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {489--516}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1337}, doi = {10.13052/JCSM2245-1439.1337}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/LiH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiXZLZ24, author = {Biaoqi Li and Min Xu and Yuan Zhou and Haibin Liu and Renlong Zhang}, title = {Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {239--264}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1323}, doi = {10.13052/JCSM2245-1439.1323}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LiXZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiuCXD24, author = {Cheng Liu and Xuanxuan Che and Jianshe Xie and Yumin Dong}, title = {A Multi-Path {QKD} Algorithm with Multiple Segments}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {193--214}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1321}, doi = {10.13052/JCSM2245-1439.1321}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LiuCXD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Luo24, author = {Xiaoyan Luo}, title = {Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1085--1104}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13512}, doi = {10.13052/JCSM2245-1439.13512}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Luo24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LvW24, author = {Zhimin Lv and Jun Wan}, title = {Intrusion Detection in Wireless Sensor Networks Based on {IPSO-SVM} Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {803--822}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13410}, doi = {10.13052/JCSM2245-1439.13410}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/LvW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Nie24, author = {Yanliu Nie}, title = {Analysis and Research on Secure Access Control Technology of Industrial Internet of Things Based on {ZTM} Model}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {585--604}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1341}, doi = {10.13052/JCSM2245-1439.1341}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Nie24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ReisingTFHL24, author = {Donald R. Reising and Joshua H. Tyler and Mohamed K. M. Fadul and Matthew R. Hilling and T. Daniel Loveless}, title = {Improved {RF} Fingerprint-based Identity Verification in the Presence of an {SEI} Mimicking Adversary}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {887--916}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1354}, doi = {10.13052/JCSM2245-1439.1354}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ReisingTFHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SinghSKK24, author = {Vikash Kumar Singh and Durga Sivashankar and Kishlay Kundan and Sushmita Kumari}, title = {An Efficient Intrusion Detection and Prevention System for {DDOS} Attack in {WSN} Using {SS-LSACNN} and {TCSLR}}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {135--160}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1315}, doi = {10.13052/JCSM2245-1439.1315}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SinghSKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Song24, author = {Xiaobo Song}, title = {Analysis and Application of Chaotic Genetic Algorithm Based on Network Security in The Research of Resilience of Cluster Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {657--676}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1344}, doi = {10.13052/JCSM2245-1439.1344}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Song24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Steinebach24, author = {Martin Steinebach}, title = {Robustness and Collision-Resistance of PhotoDNA}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {541--564}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1339}, doi = {10.13052/JCSM2245-1439.1339}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Steinebach24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Wang24, author = {Jianhua Wang}, title = {Industrial Internet of Things {ARP} Virus Attack Detection Method Based on Improved {CNN} BiLSTM}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1173--1206}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13516}, doi = {10.13052/JCSM2245-1439.13516}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Wang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangL24, author = {Huan Wang and Xin Li}, title = {Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {461--488}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1336}, doi = {10.13052/JCSM2245-1439.1336}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangY24, author = {Yanling Wang and Yong Yang}, title = {A Novel Secure and Energy-efficient Routing Method for the Agricultural Internet of Things Using Whale Optimization Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {725--750}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1347}, doi = {10.13052/JCSM2245-1439.1347}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WangY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangZGLZ24, author = {Ying Wang and Xiaojun Zuo and Yuling Guo and Huiying Liu and Jianchun Zhou}, title = {Encryption Technology of Optical Communication Network Based on Artificial Intelligence Technology}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {633--656}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1343}, doi = {10.13052/JCSM2245-1439.1343}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WangZGLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WenLL24, author = {Jing Wen and Haifeng Li and Caihui Lan}, title = {On the Security of Key-Aggregate Searchable Encryption}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {565--584}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13310}, doi = {10.13052/JCSM2245-1439.13310}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WenLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Wu24, author = {Yubao Wu}, title = {Construction and Application of Internet of Things Network Security Situation Prediction Model Based on BiLSTM Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {843--862}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1352}, doi = {10.13052/JCSM2245-1439.1352}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Wu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xiao24, author = {Peng Xiao}, title = {Network Malware Detection Using Deep Learning Network Analysis}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {27--52}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1312}, doi = {10.13052/JCSM2245-1439.1312}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Xiao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xiao24a, author = {Peng Xiao}, title = {Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {1}, pages = {53--90}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1313}, doi = {10.13052/JCSM2245-1439.1313}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Xiao24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xu24, author = {Liwen Xu}, title = {Adaptive Incremental Modeling Combined with Hidden Markov Modeling in Cyber Security}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1149--1172}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13515}, doi = {10.13052/JCSM2245-1439.13515}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Xu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/XuDSMCY24, author = {Rui{-}chao Xu and Yue{-}bin Di and Zeng Shou and Xiao Ma and Heqiu Chai and Long Yin}, title = {The Homology Determination System for {APT} Samples Based on Gene Maps}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {4}, pages = {751--774}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1348}, doi = {10.13052/JCSM2245-1439.1348}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/XuDSMCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YangCXL24, author = {Yong Yang and Xuan Chen and Jiaying Xu and Yuxia Li}, title = {Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {215--238}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1322}, doi = {10.13052/JCSM2245-1439.1322}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YangCXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Yin24, author = {Yimin Yin}, title = {Information Security and Risk Control Model Based on Plan-Do-Check-Action for Digital Libraries}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {305--326}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1326}, doi = {10.13052/JCSM2245-1439.1326}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Yin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YunhongG24, author = {Guo Yunhong and Tang Guoping}, title = {Intelligent Analysis and Dynamic Security of Network Traffic in Context of Big Data}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {823--842}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1351}, doi = {10.13052/JCSM2245-1439.1351}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/YunhongG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangXS24, author = {Yunfei Zhang and Xingzhi Xu and Yayuan Shi}, title = {Construction and Analysis of Network Cloud Security Situation Awareness System Based on {DBN-DE} Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {439--460}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1335}, doi = {10.13052/JCSM2245-1439.1335}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangXS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangZZXJ24, author = {Jiafa Zhang and Hong Zou and Zifeng Zeng and Weijie Xu and Jiawei Jiang}, title = {Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {393--416}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1333}, doi = {10.13052/JCSM2245-1439.1333}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangZZXJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhengXLDSL24, author = {Lv Zheng and Fang Xi and Huang Lei and Jiang Dan and Ran Shuang and Liang Lei}, title = {Optimization of Information Security Management Mechanism for Distribution Network Information Storage Based on {RBAC} and Development of Visual Operation and Maintenance Platform}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {5}, pages = {1061--1084}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.13511}, doi = {10.13052/JCSM2245-1439.13511}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhengXLDSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZyaraMS24, author = {Atheer Hussein Zyara and Hakeem Imad Mhaibes and Qahtan Makki Shallal}, title = {Enhancement of Tiny Encryption Algorithm for Resource-Constrained WSNs Using Four Connected Additive Fibonacci Generators}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {3}, pages = {349--368}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1331}, doi = {10.13052/JCSM2245-1439.1331}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZyaraMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbdulKareemA23, author = {Ali Akram Abdul{-}Kareem and Waleed Ameen Mahmoud Al{-}Jawher}, title = {A Hybrid Domain Medical Image Encryption Scheme Using {URUK} and {WAM} Chaotic Maps with Wavelet - Fourier Transforms}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {435--464}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1241}, doi = {10.13052/JCSM2245-1439.1241}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbdulKareemA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlbahraniLG23, author = {Ekhlas Abbas Albahrani and Sadeq H. Lafta and Naeem Howrie Ghayad}, title = {A Chaos-Based Encryption Algorithm for Database System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {25--54}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1212}, doi = {10.13052/JCSM2245-1439.1212}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AlbahraniLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Alouneh23, author = {Sahel Alouneh}, title = {A Multi-Path Approach to Protect {DNS} Against DDoS Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {569--588}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1246}, doi = {10.13052/JCSM2245-1439.1246}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Alouneh23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AmroSM23, author = {Belal M. Amro and Saeed Salah and Mohammed Moreb}, title = {A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {605--628}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1248}, doi = {10.13052/JCSM2245-1439.1248}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AmroSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Chen23, author = {Min Chen}, title = {Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {733--756}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1256}, doi = {10.13052/JCSM2245-1439.1256}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Du23, author = {Gaili Du}, title = {Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {675--696}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1253}, doi = {10.13052/JCSM2245-1439.1253}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Du23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23, author = {Julija Gavenaite{-}Sirvydiene and Algita Miecinskiene}, title = {The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {497--518}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1243}, doi = {10.13052/JCSM2245-1439.1243}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GorevGKS23, author = {Vyacheslav Gorev and Alexander Gusev and Valerii Korniienko and Yana I. Shedlovska}, title = {On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {315--338}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.4}, doi = {10.13052/JCSM2245-1439.123.4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GorevGKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HassanMN23, author = {Khaled Mohammed Ali Hassan and Mohamed Ashraf Madkour and Sayed Abd El Hady Nouh}, title = {A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {519--546}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1244}, doi = {10.13052/JCSM2245-1439.1244}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HassanMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HilgurtDMP23, author = {Serhii Ya. Hilgurt and Anatolii Davydenko and Tetyana V. Matovka and Mykhailo P. Prygara}, title = {Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {339--366}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.5}, doi = {10.13052/JCSM2245-1439.123.5}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HilgurtDMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HovorushchenkoHOKB23, author = {Tetiana Hovorushchenko and Yelyzaveta Hnatchuk and Vitaliy Osyadlyi and Mariia Kapustian and Artem Boyarchuk}, title = {Blockchain-Based Medical Decision Support System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {253--274}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.1}, doi = {10.13052/JCSM2245-1439.123.1}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HovorushchenkoHOKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HovorushchenkoPK23, author = {Tetiana Hovorushchenko and Olga Pavlova and Mariia Kostiuk}, title = {Method of Increasing the Security of Smart Parking System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {297--314}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.3}, doi = {10.13052/JCSM2245-1439.123.3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HovorushchenkoPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/IzoninHP23, author = {Ivan Izonin and Tetiana Hovorushchenko and Peter T. Popov}, title = {Editorial}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {v--x}, year = {2023}, url = {https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22717}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/IzoninHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JiangHP23, author = {Xin Jiang and Huawei Huang and Geyang Pan}, title = {Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {205--220}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1224}, doi = {10.13052/JCSM2245-1439.1224}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/JiangHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KanZYZ23, author = {Xiaopeng Kan and Zhihong Zhou and Lihong Yao and Yuxin Zuo}, title = {Research on Anomaly Detection in Vehicular {CAN} Based on Bi-LSTM}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {629--652}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1251}, doi = {10.13052/JCSM2245-1439.1251}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KanZYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KolliparaKCRMK23, author = {V. N. Hemanth Kollipara and Sai Koushik Kalakota and Sujith Chamarthi and S. Ramani and Preeti Malik and Marimuthu Karuppiah}, title = {Timestamp Based {OTP} and Enhanced {RSA} Key Exchange Scheme with {SIT} Encryption to Secure IoT Devices}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {77--102}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1214}, doi = {10.13052/JCSM2245-1439.1214}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KolliparaKCRMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li23, author = {Xingfeng Li}, title = {An Evaluation Model for Network Security Based on an Optimized Circular Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {711--732}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1255}, doi = {10.13052/JCSM2245-1439.1255}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Lu23, author = {Yujing Lu}, title = {Security and Privacy of Internet of Things: {A} Review of Challenges and Solutions}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {813--844}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1261}, doi = {10.13052/JCSM2245-1439.1261}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Lu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OrlovskyiKSUI23, author = {Ruslan Orlovskyi and Sergiy Kharytonov and Igor Samoshchenko and Olha Us and Volodymyr Iemelianenko}, title = {Countering Cybercrime Under Martial Law}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {893--910}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1264}, doi = {10.13052/JCSM2245-1439.1264}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/OrlovskyiKSUI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PlatzerL23, author = {Florian Platzer and Alexandra Lux}, title = {Inconsistencies in Darknet Researches}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {187--204}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1223}, doi = {10.13052/JCSM2245-1439.1223}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PlatzerL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Pravorska23, author = {Nataliia I. Pravorska}, title = {Additional Detection of Clones Using Locally Sensitive Hashing}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {367--388}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.6}, doi = {10.13052/JCSM2245-1439.123.6}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Pravorska23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RaufMW23, author = {Usman Rauf and Fadi Mohsen and Zhiyuan Wei}, title = {A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions {\&} Recommendations}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {221--252}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1225}, doi = {10.13052/JCSM2245-1439.1225}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RaufMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SalmanMJ23, author = {Fadhil Mohammed Salman and Ahssan Ahmmed Mohammed and Fanar Ali Joda}, title = {Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {785--812}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1258}, doi = {10.13052/JCSM2245-1439.1258}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SalmanMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SalmanMM23, author = {Fadhil Mohammed Salman and Ahssan Ahmmed Mohammed and Ahmed Fakhir Mutar}, title = {Optimization of {LEACH} Protocol for WSNs in Terms of Energy Efficient and Network Lifetime}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {275--296}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.2}, doi = {10.13052/JCSM2245-1439.123.2}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SalmanMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShepitaTS23, author = {Petro Shepita and Lyubov Tupychak and Julia Shepita}, title = {Analysis of Cyber Security Threats of the Printing Enterprise}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {415--434}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.8}, doi = {10.13052/JCSM2245-1439.123.8}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShepitaTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShettyMPD23, author = {Nisha P. Shetty and Balachandra Muniyal and Aman Priyanshu and Vedant Rishi Das}, title = {FedBully: {A} Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {465--496}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1242}, doi = {10.13052/JCSM2245-1439.1242}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShettyMPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SikoraLTF23, author = {Liubomyr S. Sikora and Nataliia Lysa and Yevhen I. Tsikalo and Olga Fedevych}, title = {System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {389--414}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.7}, doi = {10.13052/JCSM2245-1439.123.7}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SikoraLTF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachBL23, author = {Martin Steinebach and Tiberius Berwanger and Huajian Liu}, title = {Image Hashing Robust Against Cropping and Rotation}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {129--160}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1221}, doi = {10.13052/JCSM2245-1439.1221}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/UllaS23, author = {Mohammed Mujeer Ulla and Deepak S. Sakkari}, title = {Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and {LLL}}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {103--128}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1215}, doi = {10.13052/JCSM2245-1439.1215}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/UllaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xue23, author = {Ying Xue}, title = {Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {697--710}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1254}, doi = {10.13052/JCSM2245-1439.1254}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Xue23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/XueZL23, author = {Xiao Xue and Yangbing Zheng and Chao Lu}, title = {Wireless Network Safety Status Prediction Based on Fuzzy Logic}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {589--604}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1247}, doi = {10.13052/JCSM2245-1439.1247}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/XueZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YannikosHS23, author = {York Yannikos and Julian Heeger and Martin Steinebach}, title = {Scraping and Analyzing Data of a Large Darknet Marketplace}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {161--186}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1222}, doi = {10.13052/JCSM2245-1439.1222}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/YannikosHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23, author = {Zhihong Zhang}, title = {Analysis of Network Security Countermeasures From the Perspective of Improved {FS} Algorithm and {ICT} Convergence}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1211}, doi = {10.13052/JCSM2245-1439.1211}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23a, author = {Junlin Zhang}, title = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation Score}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {55--76}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1213}, doi = {10.13052/JCSM2245-1439.1213}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangL23, author = {Liu Zhang and Yanyu Liu}, title = {Network Security Prediction and Situational Assessment Using Neural Network-based Method}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {547--568}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1245}, doi = {10.13052/JCSM2245-1439.1245}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangL23a, author = {Hong Zhang and Pei Li}, title = {Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {845--868}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1262}, doi = {10.13052/JCSM2245-1439.1262}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhouH23, author = {Xv Zhou and Jinwen He}, title = {Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {757--784}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1257}, doi = {10.13052/JCSM2245-1439.1257}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhouH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Bai22, author = {Bing Bai}, title = {Monitoring and Identification of Abnormal Network Traffic by Different Mathematical Models}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {5}, pages = {695--712}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1153}, doi = {10.13052/JCSM2245-1439.1153}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Bai22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BianPW22, author = {Dongliang Bian and Jun Pan and Yanhui Wang}, title = {Study of Encrypted Transmission of Private Data During Network Communication: Performance Comparison of Advanced Encryption Standard and Data Encryption Standard Algorithms}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {5}, pages = {713--726}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1154}, doi = {10.13052/JCSM2245-1439.1154}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BianPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChaithanyaB22, author = {B. N. Chaithanya and S. H. Brahmananda}, title = {AI-enhanced Defense Against Ransomware Within the Organization's Architecture}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {621--654}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1146}, doi = {10.13052/JCSM2245-1439.1146}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ChaithanyaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/FalchOSTW22, author = {Morten Falch and Henning Olesen and Knud Erik Skouby and Reza Tadayoni and Idongesit Williams}, title = {Cybersecurity Strategies for SMEs in the Nordic Baltic Region}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {6}, pages = {727--754}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1161}, doi = {10.13052/JCSM2245-1439.1161}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/FalchOSTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LaajiA22, author = {El Hassane Laaji and Abdelmalek Azizi}, title = {A Combination of {BB84} Quantum Key Distribution and An Improved Scheme of {NTRU} Post-Quantum Cryptosystem}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {5}, pages = {673--694}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1152}, doi = {10.13052/JCSM2245-1439.1152}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LaajiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li22, author = {Xiang Li}, title = {Construction of a Smart City Network Information Security Evaluation Model Based on {GRA-BPNN}}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {6}, pages = {755--776}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1162}, doi = {10.13052/JCSM2245-1439.1162}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiuGJ22, author = {Zehui Liu and Min Guo and Yun Ju}, title = {Physical Layer Key Generation Method Based on {SVD} Pre-processing}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {6}, pages = {777--794}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1163}, doi = {10.13052/JCSM2245-1439.1163}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LiuGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MP22, author = {Somesha M. and Alwyn R. Pais}, title = {Classification of Phishing Email Using Word Embedding and Machine Learning Techniques}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {3}, pages = {279--320}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1131}, doi = {10.13052/JCSM2245-1439.1131}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NandaGI22, author = {Sunpreet Kaur Nanda and Deepika Ghai and Prashant Ingole}, title = {Analysis of Video Forensics System for Detection of Gun, Mask and Anomaly Using Soft Computing Techniques}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {549--574}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1143}, doi = {10.13052/JCSM2245-1439.1143}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/NandaGI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NdambukiA22, author = {Daniel Kyalo Ndambuki and Hitmi Khalifa Alhitmi}, title = {Attack Mitigation and Security for Vehicle Platoon}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {497--530}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1141}, doi = {10.13052/JCSM2245-1439.1141}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/NdambukiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NilizadehNMZL22, author = {Amirfarhad Nilizadeh and Shirin Nilizadeh and Wojciech Mazurczyk and Cliff C. Zou and Gary T. Leavens}, title = {Adaptive Matrix Pattern Steganography on {RGB} Images}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {1}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1111}, doi = {10.13052/JCSM2245-1439.1111}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NilizadehNMZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RaoKPZ22, author = {K. Rajesh Rao and Aditya Kolpe and Tribikram Pradhan and Bruno Bogaz Zarpel{\~{a}}o}, title = {An Efficient Solution to User Authorization Query Problem in {RBAC} Systems Using Hierarchical Clustering}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {531--548}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1142}, doi = {10.13052/JCSM2245-1439.1142}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RaoKPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Shandilya22, author = {Shishir Kumar Shandilya}, title = {Design and Deployment of Network Testbed for Web Data Security}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {2}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1121}, doi = {10.13052/JCSM2245-1439.1121}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Shandilya22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShettyMYBS22, author = {Nisha P. Shetty and Balachandra Muniyal and Niraj Yagnik and Tulika Banerjee and Angad Singh}, title = {A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {575--600}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1144}, doi = {10.13052/JCSM2245-1439.1144}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ShettyMYBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SunardiHA22, author = {Sunardi and Herman and Syifa Riski Ardiningtias}, title = {A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {5}, pages = {655--672}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1151}, doi = {10.13052/JCSM2245-1439.1151}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SunardiHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Tekleselassie22, author = {Hailyie Tekleselassie}, title = {Two-Dimensional Projection Based Wireless Intrusion Classification Using Lightweight EfficientNet}, journal = {J. Cyber Secur. Mobil.}, volume = {11}, number = {4}, pages = {601--620}, year = {2022}, url = {https://doi.org/10.13052/jcsm2245-1439.1145}, doi = {10.13052/JCSM2245-1439.1145}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Tekleselassie22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlkindiSA21, author = {Zainab Rashid Alkindi and Mohamed Sarrab and Nasser Alzeidi}, title = {User Privacy and Data Flow Control for Android Apps: Systematic Literature Review}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {261--304}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1019}, doi = {10.13052/JCSM2245-1439.1019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AlkindiSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AnandBKT21, author = {Adarsh Anand and Navneet Bhatt and Jasmine Kaur and Yoshinobu Tamura}, title = {Time Lag-Based Modelling for Software Vulnerability Exploitation Process}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {4}, pages = {663--678}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1042}, doi = {10.13052/JCSM2245-1439.1042}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AnandBKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BaccariHTM21, author = {Sihem Baccari and Mohamed Hadded and Haifa Touati and Paul M{\"{u}}hlethaler}, title = {A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {377--402}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1023}, doi = {10.13052/JCSM2245-1439.1023}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BaccariHTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BreidenbachSL21, author = {Uwe Breidenbach and Martin Steinebach and Huajian Liu}, title = {Privacy-Enhanced Robust Image Hashing with Bloom Filters}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {97--132}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1014}, doi = {10.13052/JCSM2245-1439.1014}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BreidenbachSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BunzelSL21, author = {Niklas Bunzel and Martin Steinebach and Huajian Liu}, title = {Cover-aware Steganalysis}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {1--26}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1011}, doi = {10.13052/JCSM2245-1439.1011}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BunzelSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChoS21, author = {Joo Yeon Cho and Andrew Sergeev}, title = {Post-quantum MACsec in Ethernet Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {161--176}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1016}, doi = {10.13052/JCSM2245-1439.1016}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ChoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChopadeP21, author = {Rupali M. Chopade and Vinod Keshaorao Pachghare}, title = {Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {403--420}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1024}, doi = {10.13052/JCSM2245-1439.1024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ChopadeP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChopadeP21a, author = {Rupali M. Chopade and Vinod Keshaorao Pachghare}, title = {Data Tamper Detection from NoSQL Database in Forensic Environment}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {421--450}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1025}, doi = {10.13052/JCSM2245-1439.1025}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ChopadeP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/EnglbrechtP21, author = {Ludwig Englbrecht and G{\"{u}}nther Pernul}, title = {A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {27--64}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1012}, doi = {10.13052/JCSM2245-1439.1012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/EnglbrechtP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GoyalJR21, author = {Nupur Goyal and Tanuja Joshi and Mangey Ram}, title = {Evaluating and Improving a Content Delivery Network {(CDN)} Workflow using Stochastic Modelling}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {4}, pages = {679--698}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1043}, doi = {10.13052/JCSM2245-1439.1043}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GoyalJR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HollaPD21, author = {M. Raviraja Holla and Alwyn R. Pais and Suma D.}, title = {An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {3}, pages = {487--510}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1031}, doi = {10.13052/JCSM2245-1439.1031}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HollaPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiL21, author = {Zhen Li and Qi Liao}, title = {Game Theory of Data-selling Ransomware}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {65--96}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1013}, doi = {10.13052/JCSM2245-1439.1013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/LiL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MamadeD21, author = {Bayisa Kune Mamade and Diriba Mangasha Dabala}, title = {Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University's Academic Staffs}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {4}, pages = {699--724}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1044}, doi = {10.13052/JCSM2245-1439.1044}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MamadeD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MarechalD21, author = {Emeline Marechal and Benoit Donnet}, title = {Targeted Attack through Network Fingerprinting}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {347--376}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1022}, doi = {10.13052/JCSM2245-1439.1022}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MarechalD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MocanuT21, author = {St{\'{e}}phane Mocanu and Jean{-}Marc Thiriet}, title = {Real-Time Performance and Security of {IEC} 61850 Process Bus Communications}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {305--346}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1021}, doi = {10.13052/JCSM2245-1439.1021}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MocanuT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NegiMCV21, author = {Charu Negi and Preeti Mishra and Pooja Chaudhary and Harsh Vardhan}, title = {A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {231--260}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1018}, doi = {10.13052/JCSM2245-1439.1018}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NegiMCV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PlatzerSS21, author = {Florian Platzer and Marcel Sch{\"{a}}fer and Martin Steinebach}, title = {Critical Traffic Analysis on the Tor Network}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {133--160}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1015}, doi = {10.13052/JCSM2245-1439.1015}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PlatzerSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SakuraiWOAM21, author = {Yuji Sakurai and Takuya Watanabe and Tetsuya Okuda and Mitsuaki Akiyama and Tatsuya Mori}, title = {Identifying the Phishing Websites Using the Patterns of {TLS} Certificates}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {2}, pages = {451--486}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1026}, doi = {10.13052/JCSM2245-1439.1026}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SakuraiWOAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SelvaganapathyS21, author = {Shymalagowri Selvaganapathy and G. Sudha Sadasivam and Vinayakumar Ravi}, title = {A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {1}, pages = {177--230}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1017}, doi = {10.13052/JCSM2245-1439.1017}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SelvaganapathyS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SinghS21, author = {Rajeev Singh and Sukhwinder Singh}, title = {A Lightweight Security Scheme {(LSS)} for Wireless Node Communication for Border Surveillance System}, journal = {J. Cyber Secur. Mobil.}, volume = {10}, number = {4}, pages = {641--662}, year = {2021}, url = {https://doi.org/10.13052/jcsm2245-1439.1041}, doi = {10.13052/JCSM2245-1439.1041}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SinghS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbaneDBBM20, author = {Amar Abane and Mehammed Daoui and Samia Bouzefrane and Soumya Banerjee and Paul M{\"{u}}hlethaler}, title = {A Realistic Deployment of Named Data Networking in the Internet of Things}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {1--46}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.911}, doi = {10.13052/JCSM2245-1439.911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbaneDBBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbdelwahabEZ20, author = {Zakaria Hassan Abdelwahab and Talaat A. Elgarf and Abdelhalim Zekry}, title = {Analyzing {SNOW} and {ZUC} Security Algorithms Using {NIST} {SP} 800-22 and Enhancing their Randomness}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {535--576}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.943}, doi = {10.13052/JCSM2245-1439.943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbdelwahabEZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlwazzehKS20, author = {Muneer Alwazzeh and Sameer Karaman and Mohammad Nur Shamma}, title = {Man in The Middle Attacks Against {SSL/TLS:} Mitigation and Defeat}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {449--468}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.933}, doi = {10.13052/JCSM2245-1439.933}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AlwazzehKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Aseeri20, author = {Ahmad O. Aseeri}, title = {Noise-Resilient Neural Network-Based Adversarial Attack Modeling for {XOR} Physical Unclonable Functions}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {331--354}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.926}, doi = {10.13052/JCSM2245-1439.926}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Aseeri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BejoyJ20, author = {B. J. Bejoy and S. Janakiraman}, title = {Enhanced {AIS} Based Intrusion Detection System Using Natural Killer Cells}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {515--534}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.942}, doi = {10.13052/JCSM2245-1439.942}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BejoyJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChoSZ20, author = {Joo Yeon Cho and Andrew Sergeev and Jim Zou}, title = {Securing Ethernet-based Optical Fronthaul for 5G Network}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {91--110}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.913}, doi = {10.13052/JCSM2245-1439.913}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ChoSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DamKS20, author = {Tobias Dam and Lukas Daniel Klausner and Sebastian Schrittwieser}, title = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {265--300}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.924}, doi = {10.13052/JCSM2245-1439.924}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DamKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DariBE20, author = {El Yazid Dari and Ahmed Bendahmane and Mohamed Essaaidi}, title = {Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {237--264}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.923}, doi = {10.13052/JCSM2245-1439.923}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DariBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DoynikovaFK20, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {A Semantic Model for Security Evaluation of Information Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {301--330}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.925}, doi = {10.13052/JCSM2245-1439.925}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KourTK20, author = {Ravdeep Kour and Adithya Thaduri and Ramin Karim}, title = {Railway Defender Kill Chain to Predict and Detect Cyber-Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {47--90}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.912}, doi = {10.13052/JCSM2245-1439.912}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KourTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NagaRajuR20, author = {Pamarthi NagaRaju and Nallamothu Nagamalleswara Rao}, title = {{OB-MECC:} An Efficient Confidentiality and Security Enhancement for Cloud Storage System}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {577--600}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.944}, doi = {10.13052/JCSM2245-1439.944}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NagaRajuR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OdumuyiwaC20, author = {Victor Odumuyiwa and Analogbei Chibueze}, title = {Automatic Detection of {HTTP} Injection Attacks using Convolutional Neural Network and Deep Neural Network}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {489--514}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.941}, doi = {10.13052/JCSM2245-1439.941}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OdumuyiwaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PorwalM20, author = {Shardha Porwal and Sangeeta Mittal}, title = {A Privacy Preserving and Efficient Multi Authority - {CP-ABE} Scheme for Secure Cloud Communication}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {601--626}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.945}, doi = {10.13052/JCSM2245-1439.945}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PorwalM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SaadehSSA20, author = {Maha Saadeh and Azzam Sleit and Khair Eddin Sabri and Wesam Almobaideen}, title = {Object Authentication in the Context of the Internet of Things: {A} Survey}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {385--448}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.932}, doi = {10.13052/JCSM2245-1439.932}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SaadehSSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachLG20, author = {Martin Steinebach and Huajian Liu and Karol Gotkowski}, title = {Fake News Detection by Image Montage Recognition}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {175--202}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.921}, doi = {10.13052/JCSM2245-1439.921}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachLL20, author = {Martin Steinebach and Sebastian Lutz and Huajian Liu}, title = {Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {111--140}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.914}, doi = {10.13052/JCSM2245-1439.914}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachSKB20, author = {Martin Steinebach and Marcel Sch{\"{a}}fer and Alexander Karakuz and Katharina Brandl}, title = {Detection and Analysis of Tor Onion Services}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {141--174}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.915}, doi = {10.13052/JCSM2245-1439.915}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachSKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TundisBSM20, author = {Andrea Tundis and Leon B{\"{o}}ck and Victoria Stanilescu and Max M{\"{u}}hlh{\"{a}}user}, title = {Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {203--236}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.922}, doi = {10.13052/JCSM2245-1439.922}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TundisBSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Tweneboah-Koduah20, author = {Samuel Tweneboah{-}Koduah and Francis Atsu and Ramjee Prasad}, title = {Reaction of Stock Volatility to Data Breach: an Event Study}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {355--384}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.931}, doi = {10.13052/JCSM2245-1439.931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Tweneboah-Koduah20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Amritha0KP19, author = {P. P. Amritha and M. Sethumadhavan and Ramakrishnan Krishnan and Saibal Kumar Pal}, title = {Anti-forensic Approach to Remove StegoContent from Images and Videos}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {3}, pages = {295--320}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.831}, doi = {10.13052/JCSM2245-1439.831}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Amritha0KP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ArunS19, author = {V. Arun and R. Sudhakar}, title = {User Behavioral Analysis Using MarkovChain and Steady-State in Tracer andChecker Model}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {277--294}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.826}, doi = {10.13052/JCSM2245-1439.826}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ArunS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BahashwanM19, author = {Abdullah Ahmed Bahashwan and Selvakumar Manickam}, title = {A Brief Review of Messaging Protocol Standards for Internet of Things (IoT)}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {1}, pages = {1--14}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.811}, doi = {10.13052/JCSM2245-1439.811}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BahashwanM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BelloM19, author = {Abubakar Bello and Venkatesh Mahadevan}, title = {A Cloud Based Conceptual IdentityManagement Model for Secured Internetof Things Operation}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {1}, pages = {53--74}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.813}, doi = {10.13052/JCSM2245-1439.813}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BelloM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BhattGM19, author = {Arpita Jadhav Bhatt and Chetna Gupta and Sangeeta Mittal}, title = {iShield: {A} Framework for Preserving Privacyof iOS App User}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {4}, pages = {493--536}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.845}, doi = {10.13052/JCSM2245-1439.845}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BhattGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BodapatiV19, author = {Jyostna Devi Bodapati and Veeranjaneyulu Naralasetti}, title = {Feature Extraction and Classification UsingDeep Convolutional Neural Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {261--276}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.825}, doi = {10.13052/JCSM2245-1439.825}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/BodapatiV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DeviC019, author = {D. Indhumathi Devi and S. Chithra and M. Sethumadhavan}, title = {Hardware Random Number GeneratorUsing {FPGA}}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {4}, pages = {409--418}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.841}, doi = {10.13052/JCSM2245-1439.841}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DeviC019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DolezalT19, author = {Ondrej Dolezal and Hana Tom{\'{a}}skov{\'{a}}}, title = {Czech Cyber Security Systemfrom a view of System Dynamics}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {241--260}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.824}, doi = {10.13052/JCSM2245-1439.824}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DolezalT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/FujsMV19, author = {Damjan Fujs and Anze Mihelic and Simon Vrhovec}, title = {Social Network Self-Protection Model: What Motivates Users to Self-Protect?}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {4}, pages = {467--492}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.844}, doi = {10.13052/JCSM2245-1439.844}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/FujsMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GhourabSAEA19, author = {Esraa M. Ghourab and Effat Samir and Mohamed Azab and Mohamed Eltoweissy}, title = {Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {133--164}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.821}, doi = {10.13052/JCSM2245-1439.821}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GhourabSAEA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HasumiST19, author = {Daichi Hasumi and Shigeyoshi Shima and Hiroki Takakura}, title = {{SPINZ:} {A} Speculating Incident Zone Systemfor Incident Handling}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {3}, pages = {341--364}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.833}, doi = {10.13052/JCSM2245-1439.833}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HasumiST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LashkariCG19, author = {Arash Habibi Lashkari and Min Chen and Ali A. Ghorbani}, title = {A Survey on User Profiling Model forAnomaly Detection in Cyberspace}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {1}, pages = {75--112}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.814}, doi = {10.13052/JCSM2245-1439.814}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/LashkariCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LeZH19, author = {Duc C. Le and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing Maps}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {1}, pages = {15--52}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.812}, doi = {10.13052/JCSM2245-1439.812}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LeZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MetongnonSM19, author = {Lionel Metongnon and Ramin Sadre}, title = {Prevalence of IoT Protocols in Telescopeand Honeypot Measurements}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {3}, pages = {321--340}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.832}, doi = {10.13052/JCSM2245-1439.832}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MetongnonSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RevathyBL19, author = {R. Revathy and Saminathan Balamurali and R. Lawrance}, title = {Classifying Agricultural Crop PestData Using Hadoop MapReduceBased {C5.0} Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {3}, pages = {393--408}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.835}, doi = {10.13052/JCSM2245-1439.835}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RevathyBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RoudiereO19, author = {Gilles Roudi{\`{e}}re and Philippe Owezarski}, title = {Evaluating the Impact of Traffic Sampling onAATAC's DDoS Detection}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {4}, pages = {419--438}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.842}, doi = {10.13052/JCSM2245-1439.842}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RoudiereO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RychlyR19, author = {Marek Rychl{\'{y}} and Ondrej Rysav{\'{y}}}, title = {Big Data Security Analysis withTARZAN Platform}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {165--188}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.822}, doi = {10.13052/JCSM2245-1439.822}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RychlyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachLE19, author = {Martin Steinebach and Huajian Liu and Andre Ester}, title = {The Need for Steganalysis in ImageDistribution Channels}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {3}, pages = {365--392}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.834}, doi = {10.13052/JCSM2245-1439.834}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachLE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SuarezGF19, author = {Gonzalo P. Su{\'{a}}rez and Lazaros K. Gallos and Nina H. Fefferman}, title = {A Case Study in Tailoring a Bio-InspiredCyber-Security Algorithm: DesigningAnomaly Detection for Multilayer Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {1}, pages = {113--132}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.815}, doi = {10.13052/JCSM2245-1439.815}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SuarezGF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/VinayakumarSPMK19, author = {R. Vinayakumar and K. P. Soman and Prabaharan Poornachandran and Vysakh S. Mohan and Amara Dinesh Kumar}, title = {ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis}, journal = {J. Cyber Secur. Mobil.}, volume = {8}, number = {2}, pages = {189--240}, year = {2019}, url = {https://doi.org/10.13052/jcsm2245-1439.823}, doi = {10.13052/JCSM2245-1439.823}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/VinayakumarSPMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChattopadhyayST18, author = {Ankur Chattopadhyay and Michael J. Schulz and Katie Turkiewicz and Eli Hughes}, title = {A Novel Visual Recognition-basedAuthentication Model Using a Hybrid TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein Online Healthcare}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--46}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.733}, doi = {10.13052/JCSM2245-1439.733}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ChattopadhyayST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/FathimaM18, author = {A. Jainul Fathima and G. Murugaboopathi}, title = {A Novel Customized Big Data Analytics Framework for Drug Discovery}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {145--160}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7111}, doi = {10.13052/JCSM2245-1439.7111}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/FathimaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GeorgeD18, author = {Sam George and K. David}, title = {Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {87--94}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.717}, doi = {10.13052/JCSM2245-1439.717}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GeorgeD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GopalakrishnanV18, author = {Aswin Gopalakrishnan and Emanuele Vineti and Ashok Kumar Mohan and M. Sethumadhavan}, title = {The Art of Piecewise Hashing: {A} StepToward Better Evidence Provability}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {109--130}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.719}, doi = {10.13052/JCSM2245-1439.719}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GopalakrishnanV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GuptaSK18, author = {Sanchit Gupta and Harshit Sharma and Sarvjeet Kaur}, title = {Malware Characterization Using WindowsAPI Call Sequences}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {363--378}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.741}, doi = {10.13052/JCSM2245-1439.741}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GuptaSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KadirSG18, author = {Andi Fitriah Abdul Kadir and Natalia Stakhanova and Ali A. Ghorbani}, title = {Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--52}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.732}, doi = {10.13052/JCSM2245-1439.732}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KadirSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaratasA18, author = {G{\"{o}}zde Karatas and Akhan Akbulut}, title = {Survey on Access Control Mechanisms in Cloud Computing}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--36}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.731}, doi = {10.13052/JCSM2245-1439.731}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KaratasA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaruppasamyB18, author = {M. Karuppasamy and S. P. Balakannan}, title = {Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {95--108}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.718}, doi = {10.13052/JCSM2245-1439.718}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KaruppasamyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LeSD18, author = {Dac{-}Nhuong Le and Bijeta Seth and Surjeet Dalal}, title = {A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: {A} Revolutionary Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {379--408}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.742}, doi = {10.13052/JCSM2245-1439.742}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LeSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MaragatharajanB18, author = {M. Maragatharajan and S. P. Balakannan}, title = {A Secured {MANET} Using Multicast Routing Protocols and Semi Markov Process}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {53--68}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.715}, doi = {10.13052/JCSM2245-1439.715}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MaragatharajanB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RajeswariS18, author = {S. Rajeswari and K. Suthendran}, title = {Chi-Square MapReduce Model for Agricultural Data}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {13--24}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.712}, doi = {10.13052/JCSM2245-1439.712}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RajeswariS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RevathyS18, author = {C. Revathy and G. Sekar}, title = {Analytic Hierarchy Process for ResourceAllocation in Cloud Environment}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {25--38}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.713}, doi = {10.13052/JCSM2245-1439.713}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RevathyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SebastianS18, author = {A. Sebastian and Shanmugam Sivagurunathan}, title = {Multi DODAGs in {RPL} for Reliable Smart City IoT}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {69--86}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.716}, doi = {10.13052/JCSM2245-1439.716}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SebastianS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SubburajS18, author = {T. Subburaj and K. Suthendran}, title = {DigitalWatering Hole Attack DetectionUsing Sequential Pattern}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {1--12}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.711}, doi = {10.13052/JCSM2245-1439.711}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SubburajS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SureshAMK18, author = {Meenakshi Suresh and P. P. Amritha and Ashok Kumar Mohan and V. Anil Kumar}, title = {An Investigation on {HTTP/2} Security}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {161--189}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7112}, doi = {10.13052/JCSM2245-1439.7112}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SureshAMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SuvarnaP18, author = {B. Suvarna and T. Maruthi Padmaja}, title = {Enhanced Matrix Chain Multiplication}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {409--420}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.743}, doi = {10.13052/JCSM2245-1439.743}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SuvarnaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ThilagavathiS18, author = {B. Thilagavathi and K. Suthendran}, title = {Boosting Based Implementationof Biometric Authentication in IoT}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {131--144}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7110}, doi = {10.13052/JCSM2245-1439.7110}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ThilagavathiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YaminiKT18, author = {K. Anish Pon Yamini and Suthendran Kannan and Arivoli Thangadurai}, title = {Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {39--52}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.714}, doi = {10.13052/JCSM2245-1439.714}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YaminiKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0001CM17, author = {Paolo Palmieri and Luca Calderoni and Dario Maio}, title = {An Anonymous Inter-Network RoutingProtocol for the Internet of Things}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {127--146}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.622}, doi = {10.13052/JCSM2245-1439.622}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/0001CM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0001SW17, author = {J{\"{o}}rg Keller and Gabriele Spenger and Steffen Wendzel}, title = {Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {147--170}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.623}, doi = {10.13052/JCSM2245-1439.623}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/0001SW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BarmawiP17, author = {Ari Moesriami Barmawi and Deden Pradeka}, title = {Information Hiding Based on Histogramand Pixel Pattern}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {4}, pages = {397--426}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.642}, doi = {10.13052/JCSM2245-1439.642}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BarmawiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ElmangoushM17, author = {Asma Elmangoush and Thomas Magedanz}, title = {Adaptable Protocol Selection for Reliable Smart City Services}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {1}, pages = {57--76}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.613}, doi = {10.13052/JCSM2245-1439.613}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ElmangoushM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GasserSRDSC17, author = {Oliver Gasser and Quirin Scheitle and Benedikt Rudolph and Carl Denis and Nadja Schricker and Georg Carle}, title = {The Amplification Threat Posed by PubliclyReachable BACnet Devices}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {1}, pages = {77--104}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.614}, doi = {10.13052/JCSM2245-1439.614}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GasserSRDSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HodoBIHTA17, author = {Elike Hodo and Xavier J. A. Bellekens and Ephraim Iorkyase and Andrew W. Hamilton and Christos Tachtatzis and Robert C. Atkinson}, title = {Machine Learning Approach for Detectionof nonTor Traffic}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {171--194}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.624}, doi = {10.13052/JCSM2245-1439.624}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HodoBIHTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LiuZYZW17, author = {Zhenyan Liu and Yifei Zeng and Yida Yan and Pengfei Zhang and Yong Wang}, title = {Machine Learning for Analyzing Malware}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {227--244}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.631}, doi = {10.13052/JCSM2245-1439.631}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LiuZYZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NasserMM17, author = {Ahmad M. K. Nasser and Di Ma and Priya Muralidharan}, title = {An Approach for Building Security Resilience in {AUTOSAR} Based Safety Critical Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {271--304}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.633}, doi = {10.13052/JCSM2245-1439.633}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/NasserMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NguyenTM017, author = {Dang Nguyen and Dat Tran and Wanli Ma and Dharmendra Sharma}, title = {Random Number Generators Basedon {EEG} Non-linear and ChaoticCharacteristics}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {305--338}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.634}, doi = {10.13052/JCSM2245-1439.634}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/NguyenTM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PartibaneKK17, author = {B. Partibane and Rajakani Kalidoss and R. Karthipan}, title = {Security Improvement in Next GenerationWireless System by Interleaverin Transceiver Structures}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {4}, pages = {379--396}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.641}, doi = {10.13052/JCSM2245-1439.641}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PartibaneKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RoseLA17, author = {Jamison Rose and Yudong Liu and Ahmed Awad}, title = {Biometric Authentication Using Mouseand Eye Movement Data}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {1}, pages = {1--16}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.611}, doi = {10.13052/JCSM2245-1439.611}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RoseLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SepehriTS17, author = {Masoomeh Sepehri and Alberto Trombetta and Maryam Sepehri}, title = {Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption Scheme}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {339--378}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.635}, doi = {10.13052/JCSM2245-1439.635}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SepehriTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShahbarZ17, author = {Khalid Shahbar and Nur Zincir{-}Heywood}, title = {Packet Momentum for Identificationof Anonymity Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {1}, pages = {27--56}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.612}, doi = {10.13052/JCSM2245-1439.612}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ShahbarZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShiVRM17, author = {Xue Ying Shi and Natalija Vlajic and Hamzeh Roumani and Pooria Madani}, title = {Rethinking the Use of Resource Hints in {HTML5:} Is Faster Always Better!?}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {195--226}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.625}, doi = {10.13052/JCSM2245-1439.625}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ShiVRM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SrinivasanD17, author = {Avinash Srinivasan and Hunter Dong}, title = {{SURE-FIT} - SecURE and AdaptiveFramework for Information Hidingwith Fault-Tolerance}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {4}, pages = {427--456}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.643}, doi = {10.13052/JCSM2245-1439.643}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SrinivasanD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/VazquezAZ17, author = {F{\'{e}}lix Iglesias V{\'{a}}zquez and Robert Annessi and Tanja Zseby}, title = {Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {3}, pages = {225--270}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.632}, doi = {10.13052/JCSM2245-1439.632}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/VazquezAZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WendzelMH17, author = {Steffen Wendzel and Wojciech Mazurczyk and Georg Haas}, title = {Steganography for Cyber-physicalSystems}, journal = {J. Cyber Secur. Mobil.}, volume = {6}, number = {2}, pages = {105--126}, year = {2017}, url = {https://doi.org/10.13052/jcsm2245-1439.621}, doi = {10.13052/JCSM2245-1439.621}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WendzelMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlzahraniG16, author = {Abdullah J. Alzahrani and Ali A. Ghorbani}, title = {SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {2}, pages = {47--74}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.523}, doi = {10.13052/JCSM2245-1439.523}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/AlzahraniG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Bottinger16, author = {Konstantin B{\"{o}}ttinger}, title = {Chemotactic Test Case Recombinationfor Large-Scale Fuzzing}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {4}, pages = {269--286}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.542}, doi = {10.13052/JCSM2245-1439.542}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Bottinger16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DarwishIS16, author = {Ihab Darwish and Obinna Igbe and Tarek N. Saadawi}, title = {Vulnerability Assessment and Experimentation of Smart Grid {DNP3}}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {1}, pages = {23--54}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.513}, doi = {10.13052/JCSM2245-1439.513}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DarwishIS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HamR16, author = {Jeroen van der Ham and Roland van Rijswijk{-}Deij}, title = {Ethics and Internet Measurements}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {4}, pages = {287--308}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.543}, doi = {10.13052/JCSM2245-1439.543}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HamR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KamyodNPPA16, author = {Chayapol Kamyod and Rasmus Hjorth Nielsen and Neeli Rashmi Prasad and Ramjee Prasad and Nattapol Aunsri}, title = {End-to-End Reliability and Optimization of Intra and Inter-Domain IMS-based Communication Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {3}, pages = {233--256}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.533}, doi = {10.13052/JCSM2245-1439.533}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KamyodNPPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaymakR16, author = {Yagiz Kaymak and Roberto Rojas{-}Cessa}, title = {Packet-Based Load Balancing in Data Center Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {1}, pages = {1--18}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.511}, doi = {10.13052/JCSM2245-1439.511}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KaymakR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MstafaE16, author = {Ramadhan J. Mstafa and Khaled M. Elleithy}, title = {An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {3}, pages = {167--194}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.531}, doi = {10.13052/JCSM2245-1439.531}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MstafaE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MuthalaguJ16, author = {Raja Muthalagu and Subeen Jain}, title = {Modifying {LFSR} of {ZUC} to Reduce Time for Key-Stream Generation}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {4}, pages = {257--268}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.541}, doi = {10.13052/JCSM2245-1439.541}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MuthalaguJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Rameshwar16, author = {Pranela Rameshwar}, title = {The Economic Impact in Biosecurity Breach - The Perspective of a Translational Scientist}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {1}, pages = {19--22}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.512}, doi = {10.13052/JCSM2245-1439.512}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Rameshwar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokaleP16, author = {Vandana Milind Rohokale and Ramjee Prasad}, title = {Cyber Security for Smart Grid - The Backbone of Social Economy}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {1}, pages = {55--76}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.514}, doi = {10.13052/JCSM2245-1439.514}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokaleP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RuizW16, author = {Rodrigo Ruiz and Rog{\'{e}}rio Winter}, title = {Lazarus: Data Leakage with {PGP} and Resurrection of the Revoked User}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {2}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.521}, doi = {10.13052/JCSM2245-1439.521}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RuizW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SpiekermannE16, author = {Daniel Spiekermann and Tobias Eggendorfer}, title = {Challenges of Network Forensic Investigation in Virtual Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {2}, pages = {15--46}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.522}, doi = {10.13052/JCSM2245-1439.522}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SpiekermannE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/VeshchikovML16, author = {Nikita Veshchikov and Stephane Fernandes Medeiros and Liran Lerman}, title = {Variety of Scalable Shuffling Countermeasures against Side Channel Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {5}, number = {3}, pages = {195--232}, year = {2016}, url = {https://doi.org/10.13052/jcsm2245-1439.532}, doi = {10.13052/JCSM2245-1439.532}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/VeshchikovML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0001BM15, author = {Shweta Jain and Christian Barona and Nicholas Madamopoulos}, title = {Modelling Wireless Propagation for Indoor Localization}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {279--304}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.443}, doi = {10.13052/JCSM2245-1439.443}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0001BM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbomharaK15, author = {Mohamed Abomhara and Geir M. K{\o}ien}, title = {Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {65--88}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.414}, doi = {10.13052/JCSM2245-1439.414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DongWXELR15, author = {Ziqian Dong and Zheng Wang and Wen Xie and Obinna Emelumadu and Chuan{-}Bi Lin and Roberto Rojas{-}Cessa}, title = {An Experimental Study of SmallWorld Network Models for Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {259--278}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.442}, doi = {10.13052/JCSM2245-1439.442}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DongWXELR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HerlandHK15, author = {Kristian Herland and Heikki H{\"{a}}mm{\"{a}}inen and Pekka Kekolahti}, title = {Information Security Risk Assessment of Smartphones using Bayesian Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {65--86}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.424}, doi = {10.13052/JCSM2245-1439.424}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HerlandHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JoshiDD15, author = {Harshvardhan P. Joshi and Aravindhan Dhanasekaran and Rudra Dutta}, title = {Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of {ROP} Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {305--324}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.444}, doi = {10.13052/JCSM2245-1439.444}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/JoshiDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaurM15, author = {Goldendeep Kaur and Jyoteesh Malhotra}, title = {Comparative Investigation of {ARP} Poisoning mitigation techniques using Standard Testbed for Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {53--64}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.423}, doi = {10.13052/JCSM2245-1439.423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KaurM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ManousakisESNKR15, author = {Kyriakos Manousakis and Sharanya Eswaran and David Shur and Gaurav Naik and Pavan Kantharaju and William C. Regli and Brian Adamson}, title = {Torrent-Based Dissemination in Infrastructure-Less Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {1--22}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.411}, doi = {10.13052/JCSM2245-1439.411}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ManousakisESNKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MeskanenNN15, author = {Tommi Meskanen and Valtteri Niemi and Noora Nieminen}, title = {How to Use Garbling for Privacy Preserving Electronic Surveillance Services}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {41--64}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.413}, doi = {10.13052/JCSM2245-1439.413}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MeskanenNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OforiLFGY15, author = {Kwame Simpe Ofori and Otu Larbi{-}Siaw and Eli Emmanuel Fianu and Richard Eddie Gladjah and Ezer Osei Yeboah{-}Boateng}, title = {Factors Influencing the Continuance Use of Mobile Social Media: The effect of Privacy Concerns}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {105--124}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.426}, doi = {10.13052/JCSM2245-1439.426}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OforiLFGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PaulI15, author = {Greig Paul and James Irvine}, title = {Practical Attacks on Security and Privacy Through a Low-Cost Android Device}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {33--52}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.422}, doi = {10.13052/JCSM2245-1439.422}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PaulI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokaleP15, author = {Vandana Milind Rohokale and Ramjee Prasad}, title = {Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {23--40}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.412}, doi = {10.13052/JCSM2245-1439.412}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokaleP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SayeedMS15, author = {Rayyan Sayeed and Ray Miller and Zulfiquar Sayeed}, title = {Throughput Prediction Across Heterogeneous Boundaries in Wireless Communications}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {233--258}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.441}, doi = {10.13052/JCSM2245-1439.441}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SayeedMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/StevanovicP15, author = {Matija Stevanovic and Jens Myrup Pedersen}, title = {On the use of machine learning for identifying botnet network traffic}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {1--32}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.421}, doi = {10.13052/JCSM2245-1439.421}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/StevanovicP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TakalkarM15, author = {Vedashree Takalkar and Parikshit N. Mahalle}, title = {Confidentiality in Online Social Networks; ATrust-based Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {125--144}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.427}, doi = {10.13052/JCSM2245-1439.427}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Yeboah-BoatengA15, author = {Ezer Osei Yeboah{-}Boateng and Elvis Akwa{-}Bonsu}, title = {Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {87--104}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.425}, doi = {10.13052/JCSM2245-1439.425}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Yeboah-BoatengA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0014YXZS014, author = {Yue Zhao and Kenji Yoshigoe and Mengjun Xie and Suijian Zhou and Remzi Seker and Jiang Bian}, title = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {289--316}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.333}, doi = {10.13052/JCSM2245-1439.333}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Al-DoskiM14, author = {Lava Al{-}Doski and Seshadri Mohan}, title = {A Cached Registration Scheme for {IP} Multimedia Subsystem {(IMS)}}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {317--338}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.334}, doi = {10.13052/JCSM2245-1439.334}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Al-DoskiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlzahraniSAG14, author = {Abdullah J. Alzahrani and Nataliav Stakhanoa and Hugo Gonzalez and Ali A. Ghorbani}, title = {Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {89--132}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.321}, doi = {10.13052/JCSM2245-1439.321}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/AlzahraniSAG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BaligaBD14, author = {Arati Baliga and Jeffrey Bickford and Neil Daswani}, title = {Triton: {A} Carrier-based Approach for Detecting and Mitigating Mobile Malware}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {181--212}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.324}, doi = {10.13052/JCSM2245-1439.324}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BaligaBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Balogh14, author = {Stefan Balogh}, title = {Memory Acquisition by Using Network Card}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {65--76}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.314}, doi = {10.13052/JCSM2245-1439.314}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Balogh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JermynSZ14, author = {Jill Jermyn and Gabriel Salles{-}Loustau and Saman A. Zonouz}, title = {An Analysis of DoS Attack Strategies Against the {LTE} {RAN}}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {159--180}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.323}, doi = {10.13052/JCSM2245-1439.323}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/JermynSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JurneckaHK14, author = {Peter Jurnecka and Petr Han{\'{a}}cek and Matej Kacic}, title = {Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {47--66}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.313}, doi = {10.13052/JCSM2245-1439.313}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/JurneckaHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Knudsen14, author = {Lars R. Knudsen}, title = {Dynamic Encryption}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {357--370}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.341}, doi = {10.13052/JCSM2245-1439.341}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KornemannOLF14, author = {Stephan Kornemann and Steffen Ortmann and Peter Langend{\"{o}}rfer and Alexandros G. Fragkiadakis}, title = {Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {133--158}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.322}, doi = {10.13052/JCSM2245-1439.322}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KornemannOLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KotenkoC14, author = {Igor V. Kotenko and Andrey Chechulin}, title = {Fast Network Attack Modeling and Security Evaluation based on Attack Graphs}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {27--46}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.312}, doi = {10.13052/JCSM2245-1439.312}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LichtmanR14, author = {Marc Lichtman and Jeffrey H. Reed}, title = {Reinforcement Learning for Reactive Jamming Mitigation}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {213--230}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.325}, doi = {10.13052/JCSM2245-1439.325}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LichtmanR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Lokshina14, author = {Izabella Lokshina}, title = {Study on Estimating Buffer Overflow Probabilities in High-Speed Communication Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {399--426}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.343}, doi = {10.13052/JCSM2245-1439.343}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Lokshina14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Markowsky14, author = {George Markowsky}, title = {The Sad History of Random Bits}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {1--24}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.311}, doi = {10.13052/JCSM2245-1439.311}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Markowsky14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MillerGDB14, author = {Cody Miller and Dae Glendowne and David A. Dampier and Kendall Blaylock}, title = {Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {231--262}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.331}, doi = {10.13052/JCSM2245-1439.331}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MillerGDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NollGFAA14, author = {Josef Noll and I{\~{n}}aki Garitano and Seraj Fayyad and Erik {\AA}sberg and Habtamu Abie}, title = {Measurable Security, Privacy and Dependability in Smart Grids}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {371--398}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.342}, doi = {10.13052/JCSM2245-1439.342}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NollGFAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PodhradskyLB14, author = {Ashley L. Podhradsky and Larry J. LeBlanc and Michael R. Bartolacci}, title = {Personal Denial of Service Attacks {(PDOS)} and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {339--356}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.335}, doi = {10.13052/JCSM2245-1439.335}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PodhradskyLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PomorovaI14, author = {Oksana V. Pomorova and Dmytro O. Ivanchyshyn}, title = {Making Static Code Analysis More Efficient}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {77--88}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.315}, doi = {10.13052/JCSM2245-1439.315}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PomorovaI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShenYTPH14, author = {Ju Shen and Jianjun Yang and Sami Taha{-}abusneineh and Bryson Payne and Markus A. Hitz}, title = {Structure Preserving Large Imagery Reconstruction}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {263--288}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.332}, doi = {10.13052/JCSM2245-1439.332}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShenYTPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AnggorojatiPP13, author = {Bayu Anggorojati and Neeli Rashmi Prasad and Ramjee Prasad}, title = {Efficient Fine Grained Access Control for {RFID} Inter-Enterprise System}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {221--242}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.232}, doi = {10.13052/JCSM2245-1439.232}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/AnggorojatiPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BabarRP13, author = {Sachin D. Babar and Neeli R. Neeli R. and Ramjee Prasad}, title = {Activity Modelling and Countermeasures on Jamming Attack}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {1--23}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.211}, doi = {10.13052/JCSM2245-1439.211}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BabarRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BalogunOM13, author = {Muyiwa B. Balogun and Olutayo O. Oyerinde and Stanley H. Mneney}, title = {Adaptive Correction Algorithm for {OFDM-IDMA} Systems With Carrier Frequency {OFFSET} in {A} Fast Fading Multipath Channel}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {201--220}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.231}, doi = {10.13052/JCSM2245-1439.231}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BalogunOM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Henry-Labordre13, author = {Arnaud Henry{-}Labord{\`{e}}re}, title = {The Number Continuity Service: Part {II} {GSM} {CDMA} Seamless Technology Change}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {83--103}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.214}, doi = {10.13052/JCSM2245-1439.214}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Henry-Labordre13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KusykGSm13, author = {Janusz Kusyk and Stephen Gundry and Cem Safak Sahin and M. mituyar}, title = {Performance metrics for self-positioning autonomous {MANET} nodes}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {151--173}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.223}, doi = {10.13052/JCSM2245-1439.223}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KusykGSm13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MaliatsosVK13, author = {Konstantinos N. Maliatsos and Panagiotis N. Vasileiou and Athanasios G. Kanatas}, title = {Performance Evaluation of Beamspace {MIMO} Systems with Channel Estimation in Realistic Environments}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {265--290}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.234}, doi = {10.13052/JCSM2245-1439.234}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MaliatsosVK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MishraM13, author = {Amitabh Mishra and Gerald Masson}, title = {MoCCA: {A} Mobile Cellular Cloud Architecture}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {105--125}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.221}, doi = {10.13052/JCSM2245-1439.221}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MishraM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OhbaC13, author = {Yoshihiro Ohba and Stephen Chasko}, title = {Performance Evaluation on 6LoWPANand {PANA} in {IEEE} 802.15.4gMesh Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {329--350}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.237}, doi = {10.13052/JCSM2245-1439.237}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OhbaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PantHSM13, author = {Rabin Bilas Pant and Hans{-}Petter Halvorsen and Frode Skulbru and Saba Mylvaganam}, title = {Intermediate measurement node for extension of {WSN} coverage}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {29--61}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.212}, doi = {10.13052/JCSM2245-1439.212}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PantHSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RathkanthiwarG13, author = {Anagha. P. Rathkanthiwar and Abhay S. Gandhi}, title = {New Efficient Timing and Frequency Error Estimation In {OFDM}}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {291--306}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.235}, doi = {10.13052/JCSM2245-1439.235}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RathkanthiwarG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokalePP13, author = {Vandana Milind Rohokale and Neeli Rashmi Prasad and Ramjee Prasad}, title = {Green Cooperative Web of Trust for Securityin Cognitive Radio Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {307--328}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.236}, doi = {10.13052/JCSM2245-1439.236}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokalePP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Schrage13, author = {Reinhard Schrage}, title = {{NGSON} Service Composition Ontology}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {351--358}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.238}, doi = {10.13052/JCSM2245-1439.238}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Schrage13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TangeA13, author = {Henrik Tange and Birger Andersen}, title = {Dynamic {AES} Extending the Lifetime?}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {243--164}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.233}, doi = {10.13052/JCSM2245-1439.233}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TangeA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangBMSS13, author = {Wei Wang and Jeffrey Bickford and Ilona Murynets and Ramesh Subbaraman and Gokul Singaraju}, title = {Detecting Targeted Attacks By Multilayer Deception}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {175--199}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.224}, doi = {10.13052/JCSM2245-1439.224}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YanW13, author = {Tan Yan and Guiling Wang}, title = {Ivy: Interest-based Data Delivery in {VANET} through Neighbor Caching}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {127--149}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.222}, doi = {10.13052/JCSM2245-1439.222}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YanW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YaqubBQ13, author = {Raziq Yaqub and Fahad Butt and Umair Ahmed Qazi}, title = {Prevention of Unauthorized Unplugging of Un-attendant Recharging EVs}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {63--81}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.213}, doi = {10.13052/JCSM2245-1439.213}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YaqubBQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/0005S12, author = {Yi Deng and Sandeep K. Shukla}, title = {Vulnerabilities and Countermeasures - {A} Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0005S12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/CaiR12, author = {Lin Cai and Roberto Rojas{-}Cessa}, title = {Mitigation of Malware Proliferation in {P2P} Networks using Double-Layer Dynamic Trust {(DDT)} Management Scheme}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Fri, 10 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/CaiR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChenW12, author = {Jing Chen and Marcus Wong}, title = {Security Implications and Considerations for Femtocells}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ChenW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Comaniciu12, author = {Cristina Comaniciu}, title = {On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Comaniciu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/CrescenzoL0P12, author = {Giovanni Di Crescenzo and Yibei Ling and Tao Zhang and Stanley Pietrowicz}, title = {Non-Interactive Detection of Malicious Vehicular Network Data}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/CrescenzoL0P12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DeyRB12, author = {Arnab Dey and Balaji Rajappa and Lakshman Bana}, title = {Realization of Interworking in {LTE} Roaming Using a Diameter-Based Interworking Function}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {4}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DeyRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Henry-Labordere12, author = {Arnaud Henry{-}Labord{\`{e}}re}, title = {The Number continuity service, Part {I} {GSM} {\textless}-{\textgreater} Satellite phone}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {4}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Henry-Labordere12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KhajuriaA12, author = {Samant Khajuria and Birger Andersen}, title = {Authenticated Encryption for Low-Power Reconfigurable Wireless Devices}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KhajuriaA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Koien12, author = {Geir M. K{\o}ien}, title = {Mobility and Spatio-Temporal Exposure Control Exposure Control as a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy and Home Control}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {4}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Koien12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MahalleAPP12, author = {Parikshit N. Mahalle and Bayu Anggorojati and Neeli R. Prasad and Ramjee Prasad}, title = {Identity Authentication and Capability Based Access Control {(IACAC)} for the Internet of Things}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {4}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MahalleAPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MathurHSC12, author = {Chetan Nanjunda Mathur and Mohamed A. Haleem and K. P. Subbalakshmi and Rajarathnam Chandramouli}, title = {Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/MathurHSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Nayak12, author = {Debabrata Nayak}, title = {Understanding the Security, Privacy and Trust Challenges of Cloud Computing}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Nayak12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PawarNPOP12, author = {Pranav M. Pawar and Rasmus H. Nielsen and Neeli R. Prasad and Shingo Ohmori and Ramjee Prasad}, title = {Behavioural Modelling of {WSN} {MAC} Layer Security Attacks: {A} Sequential {UML} Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PawarNPOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PawarNPOP12a, author = {Pranav M. Pawar and Rasmus H. Nielsen and Neeli R. Prasad and Shingo Ohmori and Ramjee Prasad}, title = {Activity Modelling and Comparative Evaluation of {WSN} {MAC} Security Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PawarNPOP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Rajkumar12, author = {Ajay Rajkumar}, title = {Evolution of Mobility in Future Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Rajkumar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokalePP12, author = {Vandana Milind Rohokale and Neeli Rashmi Prasad and Ramjee Prasad}, title = {Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokalePP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TangeA12, author = {Henrik Tange and Birger Andersen}, title = {{SPDH} - {A} Secure Plain Diffie-Hellman Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {2-3}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TangeA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ThuemmlerFBLEK12, author = {Christoph Thuemmler and Lu Fan and William J. Buchanan and Owen Lo and Elias Ekonomou and Abou Sofyane Khedim}, title = {E-Health: Chances and Challenges of Distributed, Service oriented Architectures}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ThuemmlerFBLEK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangFP12, author = {Zhenxing Wang and Mable P. Fok and Paul R. Prucnal}, title = {Physical Encoding in Optical Layer Security}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {1}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/WangFP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.