Search dblp for Publications

export results for "stream:journals/jcsm:"

 download as .bib file

@article{DBLP:journals/jcsm/AbedA24,
  author       = {Qutaiba Kadhim Abed and
                  Waleed Ameen Mahmoud Al{-}Jawher},
  title        = {A Secure and Efficient Optimized Image Encryption Using Block Compressive
                  Sensing and Logistic Map Method},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {983--1006},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1358},
  doi          = {10.13052/JCSM2245-1439.1358},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbedA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbedA24a,
  author       = {Qutaiba Kadhim Abed and
                  Waleed Ameen Mahmoud Al{-}Jawher},
  title        = {Enhanced Hyperchaotic Image Encryption with {CAW} Transform and Sea-Lion
                  Optimizer},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1207--1238},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13517},
  doi          = {10.13052/JCSM2245-1439.13517},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbedA24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DawsonTHM24,
  author       = {John Kwao Dawson and
                  Frimpong Twum and
                  James Benjamin Hayfron{-}Acquah and
                  Yaw Marfo Missah},
  title        = {Cryptographic Solutions for Data Security in Cloud Computing: {A}
                  Run Time Trend-based Comparison of NCS, ERSA, and {EHS}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {265--282},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1324},
  doi          = {10.13052/JCSM2245-1439.1324},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DawsonTHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DeiSLSK24,
  author       = {Herasym Dei and
                  Dmytro Shvets and
                  Nataliia Lytvyn and
                  Olena Sytnichenko and
                  Olena Kobus},
  title        = {Legal Challenges and Perspectives of Cybersecurity in the System of
                  State Governance of Educational Institutions in Ukraine},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {963--982},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1357},
  doi          = {10.13052/JCSM2245-1439.1357},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DeiSLSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Deng24,
  author       = {Yongsheng Deng},
  title        = {Design of Industrial IoT Intrusion Security Detection System Based
                  on LightGBM Feature Algorithm and Multi-layer Perception Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {327--348},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1327},
  doi          = {10.13052/JCSM2245-1439.1327},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Deng24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DikoS24,
  author       = {Zambia Diko and
                  Khulumani Sibanda},
  title        = {Comparative Analysis of Popular Supervised Machine Learning Algorithms
                  for Detecting Malicious Universal Resource Locators},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1105--1128},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13513},
  doi          = {10.13052/JCSM2245-1439.13513},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DikoS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HaddadMSJA24,
  author       = {Nabeel Mahdy Haddad and
                  Mustafa sabah Mustafa and
                  Hayder Sabah Salih and
                  Mustafa Musa Jaber and
                  Mohammed Hasan Ali},
  title        = {Analysis of the Security of Internet of Multimedia Things in Wireless
                  Environment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {161--192},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1316},
  doi          = {10.13052/JCSM2245-1439.1316},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HaddadMSJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HamzaYB24,
  author       = {Lamia Hamza and
                  Mayliss Yousfi and
                  Lynda Bounehar},
  title        = {Partially Observable Stochastic Game for Analysing Complex Attacks
                  in IoT Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1039--1060},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13510},
  doi          = {10.13052/JCSM2245-1439.13510},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HamzaYB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HanZZ24,
  author       = {Guoying Han and
                  Bin Zhou and
                  Yazi Zhang},
  title        = {Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector
                  Machine Algorithm in Network Security Services Assessment and Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {941--962},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1356},
  doi          = {10.13052/JCSM2245-1439.1356},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HanZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/He24,
  author       = {Li He},
  title        = {Design of a Lightweight Network Intrusion Detection System Based on
                  Artificial Intelligence Technology},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1129--1148},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13514},
  doi          = {10.13052/JCSM2245-1439.13514},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/He24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HouLZGZ24,
  author       = {Botao Hou and
                  Zhefeng Li and
                  Xiaojun Zuo and
                  Yuling Guo and
                  Jianchun Zhou},
  title        = {Application of Intelligent Cloud Computing Technology in Optical Communication
                  Network Security of Smart Grid},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {605--632},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1342},
  doi          = {10.13052/JCSM2245-1439.1342},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HouLZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HuangS24,
  author       = {Liusuo Huang and
                  Yan Song},
  title        = {Update Algorithm of Secure Computer Database Based on Deep Belief
                  Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {1--26},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1311},
  doi          = {10.13052/JCSM2245-1439.1311},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HuangS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HussainRF24,
  author       = {Syed Shuja Hussain and
                  Mohd Faizal Ab Razak and
                  Ahmad Firdaus},
  title        = {Deep Learning Based Hybrid Analysis of Malware Detection and Classification:
                  {A} Recent Review},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {91--134},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1314},
  doi          = {10.13052/JCSM2245-1439.1314},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HussainRF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/IgnaimF24,
  author       = {Karam Mustafa Ignaim and
                  Jo{\~{a}}o M. Fernandes},
  title        = {Improving Incident Management Processes with Feature Models},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {701--724},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1346},
  doi          = {10.13052/JCSM2245-1439.1346},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/IgnaimF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/IsmailTHHMBS24,
  author       = {Tayssir Ismail and
                  Haifa Touati and
                  Nasreddine Hajlaoui and
                  Mohamed Hadded and
                  Paul Muhlethaler and
                  Samia Bouzefrane and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {A Comprehensive Survey on Vehicular Communication Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1007--1038},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1359},
  doi          = {10.13052/JCSM2245-1439.1359},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/IsmailTHHMBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JiangHFZ24,
  author       = {Yan Jiang and
                  Jing Huang and
                  Yunsong Fan and
                  Xiaobin Zhu},
  title        = {Design and Implementation of IPsec {VPN} IoT Gateway System in National
                  Secret Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {677--700},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1345},
  doi          = {10.13052/JCSM2245-1439.1345},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/JiangHFZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li24,
  author       = {Wentao Li},
  title        = {Construction and Analysis of {QPSO-LSTM} Model in Network Security
                  Situation Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {417--438},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1334},
  doi          = {10.13052/JCSM2245-1439.1334},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li24a,
  author       = {Jiabin Li},
  title        = {Attribute Based Signature Encryption Scheme Based on Cloud Computing
                  in Medical Social Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {517--540},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1338},
  doi          = {10.13052/JCSM2245-1439.1338},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li24b,
  author       = {Xiaowu Li},
  title        = {Network Security Behavior Anomaly Detection Based on Improved Empirical
                  Mode Decomposition},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {917--940},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1355},
  doi          = {10.13052/JCSM2245-1439.1355},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiH24,
  author       = {Jun Li and
                  Weijun Huang},
  title        = {A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic
                  Fusion},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {489--516},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1337},
  doi          = {10.13052/JCSM2245-1439.1337},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiXZLZ24,
  author       = {Biaoqi Li and
                  Min Xu and
                  Yuan Zhou and
                  Haibin Liu and
                  Renlong Zhang},
  title        = {Optimization of Security Identification in Power Grid Data through
                  Advanced Encryption Standard Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {239--264},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1323},
  doi          = {10.13052/JCSM2245-1439.1323},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiXZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiuCXD24,
  author       = {Cheng Liu and
                  Xuanxuan Che and
                  Jianshe Xie and
                  Yumin Dong},
  title        = {A Multi-Path {QKD} Algorithm with Multiple Segments},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {193--214},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1321},
  doi          = {10.13052/JCSM2245-1439.1321},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiuCXD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Luo24,
  author       = {Xiaoyan Luo},
  title        = {Wireless Sensor Networks Security Enhancement Approach Based on Single
                  Path Secure Routing Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1085--1104},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13512},
  doi          = {10.13052/JCSM2245-1439.13512},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Luo24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LvW24,
  author       = {Zhimin Lv and
                  Jun Wan},
  title        = {Intrusion Detection in Wireless Sensor Networks Based on {IPSO-SVM}
                  Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {803--822},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13410},
  doi          = {10.13052/JCSM2245-1439.13410},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/LvW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Nie24,
  author       = {Yanliu Nie},
  title        = {Analysis and Research on Secure Access Control Technology of Industrial
                  Internet of Things Based on {ZTM} Model},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {585--604},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1341},
  doi          = {10.13052/JCSM2245-1439.1341},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Nie24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ReisingTFHL24,
  author       = {Donald R. Reising and
                  Joshua H. Tyler and
                  Mohamed K. M. Fadul and
                  Matthew R. Hilling and
                  T. Daniel Loveless},
  title        = {Improved {RF} Fingerprint-based Identity Verification in the Presence
                  of an {SEI} Mimicking Adversary},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {887--916},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1354},
  doi          = {10.13052/JCSM2245-1439.1354},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ReisingTFHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SinghSKK24,
  author       = {Vikash Kumar Singh and
                  Durga Sivashankar and
                  Kishlay Kundan and
                  Sushmita Kumari},
  title        = {An Efficient Intrusion Detection and Prevention System for {DDOS}
                  Attack in {WSN} Using {SS-LSACNN} and {TCSLR}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {135--160},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1315},
  doi          = {10.13052/JCSM2245-1439.1315},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SinghSKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Song24,
  author       = {Xiaobo Song},
  title        = {Analysis and Application of Chaotic Genetic Algorithm Based on Network
                  Security in The Research of Resilience of Cluster Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {657--676},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1344},
  doi          = {10.13052/JCSM2245-1439.1344},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Song24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Steinebach24,
  author       = {Martin Steinebach},
  title        = {Robustness and Collision-Resistance of PhotoDNA},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {541--564},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1339},
  doi          = {10.13052/JCSM2245-1439.1339},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Steinebach24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Wang24,
  author       = {Jianhua Wang},
  title        = {Industrial Internet of Things {ARP} Virus Attack Detection Method
                  Based on Improved {CNN} BiLSTM},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1173--1206},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13516},
  doi          = {10.13052/JCSM2245-1439.13516},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Wang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangL24,
  author       = {Huan Wang and
                  Xin Li},
  title        = {Optimization of Network Security Intelligent Early Warning System
                  Based on Image Matching Technology of Partial Differential Equation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {461--488},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1336},
  doi          = {10.13052/JCSM2245-1439.1336},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangY24,
  author       = {Yanling Wang and
                  Yong Yang},
  title        = {A Novel Secure and Energy-efficient Routing Method for the Agricultural
                  Internet of Things Using Whale Optimization Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {725--750},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1347},
  doi          = {10.13052/JCSM2245-1439.1347},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangZGLZ24,
  author       = {Ying Wang and
                  Xiaojun Zuo and
                  Yuling Guo and
                  Huiying Liu and
                  Jianchun Zhou},
  title        = {Encryption Technology of Optical Communication Network Based on Artificial
                  Intelligence Technology},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {633--656},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1343},
  doi          = {10.13052/JCSM2245-1439.1343},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangZGLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WenLL24,
  author       = {Jing Wen and
                  Haifeng Li and
                  Caihui Lan},
  title        = {On the Security of Key-Aggregate Searchable Encryption},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {565--584},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13310},
  doi          = {10.13052/JCSM2245-1439.13310},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WenLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Wu24,
  author       = {Yubao Wu},
  title        = {Construction and Application of Internet of Things Network Security
                  Situation Prediction Model Based on BiLSTM Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {843--862},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1352},
  doi          = {10.13052/JCSM2245-1439.1352},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Wu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xiao24,
  author       = {Peng Xiao},
  title        = {Network Malware Detection Using Deep Learning Network Analysis},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {27--52},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1312},
  doi          = {10.13052/JCSM2245-1439.1312},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xiao24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xiao24a,
  author       = {Peng Xiao},
  title        = {Malware Cyber Threat Intelligence System for Internet of Things (IoT)
                  Using Machine Learning},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {1},
  pages        = {53--90},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1313},
  doi          = {10.13052/JCSM2245-1439.1313},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xiao24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xu24,
  author       = {Liwen Xu},
  title        = {Adaptive Incremental Modeling Combined with Hidden Markov Modeling
                  in Cyber Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1149--1172},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13515},
  doi          = {10.13052/JCSM2245-1439.13515},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/XuDSMCY24,
  author       = {Rui{-}chao Xu and
                  Yue{-}bin Di and
                  Zeng Shou and
                  Xiao Ma and
                  Heqiu Chai and
                  Long Yin},
  title        = {The Homology Determination System for {APT} Samples Based on Gene
                  Maps},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {4},
  pages        = {751--774},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1348},
  doi          = {10.13052/JCSM2245-1439.1348},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/XuDSMCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YangCXL24,
  author       = {Yong Yang and
                  Xuan Chen and
                  Jiaying Xu and
                  Yuxia Li},
  title        = {Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {215--238},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1322},
  doi          = {10.13052/JCSM2245-1439.1322},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YangCXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Yin24,
  author       = {Yimin Yin},
  title        = {Information Security and Risk Control Model Based on Plan-Do-Check-Action
                  for Digital Libraries},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {305--326},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1326},
  doi          = {10.13052/JCSM2245-1439.1326},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Yin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YunhongG24,
  author       = {Guo Yunhong and
                  Tang Guoping},
  title        = {Intelligent Analysis and Dynamic Security of Network Traffic in Context
                  of Big Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {823--842},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1351},
  doi          = {10.13052/JCSM2245-1439.1351},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/YunhongG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangXS24,
  author       = {Yunfei Zhang and
                  Xingzhi Xu and
                  Yayuan Shi},
  title        = {Construction and Analysis of Network Cloud Security Situation Awareness
                  System Based on {DBN-DE} Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {439--460},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1335},
  doi          = {10.13052/JCSM2245-1439.1335},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangXS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangZZXJ24,
  author       = {Jiafa Zhang and
                  Hong Zou and
                  Zifeng Zeng and
                  Weijie Xu and
                  Jiawei Jiang},
  title        = {Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial
                  Control Protocols},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {393--416},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1333},
  doi          = {10.13052/JCSM2245-1439.1333},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangZZXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhengXLDSL24,
  author       = {Lv Zheng and
                  Fang Xi and
                  Huang Lei and
                  Jiang Dan and
                  Ran Shuang and
                  Liang Lei},
  title        = {Optimization of Information Security Management Mechanism for Distribution
                  Network Information Storage Based on {RBAC} and Development of Visual
                  Operation and Maintenance Platform},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {5},
  pages        = {1061--1084},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.13511},
  doi          = {10.13052/JCSM2245-1439.13511},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhengXLDSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZyaraMS24,
  author       = {Atheer Hussein Zyara and
                  Hakeem Imad Mhaibes and
                  Qahtan Makki Shallal},
  title        = {Enhancement of Tiny Encryption Algorithm for Resource-Constrained
                  WSNs Using Four Connected Additive Fibonacci Generators},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {3},
  pages        = {349--368},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1331},
  doi          = {10.13052/JCSM2245-1439.1331},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZyaraMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbdulKareemA23,
  author       = {Ali Akram Abdul{-}Kareem and
                  Waleed Ameen Mahmoud Al{-}Jawher},
  title        = {A Hybrid Domain Medical Image Encryption Scheme Using {URUK} and {WAM}
                  Chaotic Maps with Wavelet - Fourier Transforms},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {435--464},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1241},
  doi          = {10.13052/JCSM2245-1439.1241},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbdulKareemA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlbahraniLG23,
  author       = {Ekhlas Abbas Albahrani and
                  Sadeq H. Lafta and
                  Naeem Howrie Ghayad},
  title        = {A Chaos-Based Encryption Algorithm for Database System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {25--54},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1212},
  doi          = {10.13052/JCSM2245-1439.1212},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlbahraniLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Alouneh23,
  author       = {Sahel Alouneh},
  title        = {A Multi-Path Approach to Protect {DNS} Against DDoS Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {569--588},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1246},
  doi          = {10.13052/JCSM2245-1439.1246},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Alouneh23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AmroSM23,
  author       = {Belal M. Amro and
                  Saeed Salah and
                  Mohammed Moreb},
  title        = {A Comprehensive Architectural Framework of Moving Target Defenses
                  Against DDoS Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {605--628},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1248},
  doi          = {10.13052/JCSM2245-1439.1248},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AmroSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Chen23,
  author       = {Min Chen},
  title        = {Camera Network Topology Mapping Based on the Integration of Network
                  Information and Physical Distribution Under the Background of Communication
                  Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {733--756},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1256},
  doi          = {10.13052/JCSM2245-1439.1256},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Du23,
  author       = {Gaili Du},
  title        = {Security of Encrypted Images in Network Transmission Based on an Improved
                  Chaos Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {675--696},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1253},
  doi          = {10.13052/JCSM2245-1439.1253},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Du23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23,
  author       = {Julija Gavenaite{-}Sirvydiene and
                  Algita Miecinskiene},
  title        = {The Assessment of Cyber Security's Significance in the Financial Sector
                  of Lithuania},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {497--518},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1243},
  doi          = {10.13052/JCSM2245-1439.1243},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GorevGKS23,
  author       = {Vyacheslav Gorev and
                  Alexander Gusev and
                  Valerii Korniienko and
                  Yana I. Shedlovska},
  title        = {On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process
                  Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {315--338},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.4},
  doi          = {10.13052/JCSM2245-1439.123.4},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GorevGKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HassanMN23,
  author       = {Khaled Mohammed Ali Hassan and
                  Mohamed Ashraf Madkour and
                  Sayed Abd El Hady Nouh},
  title        = {A Realtime Adaptive Trust Model Based on Artificial Neural Networks
                  for Wireless Sensor Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {519--546},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1244},
  doi          = {10.13052/JCSM2245-1439.1244},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HassanMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HilgurtDMP23,
  author       = {Serhii Ya. Hilgurt and
                  Anatolii Davydenko and
                  Tetyana V. Matovka and
                  Mykhailo P. Prygara},
  title        = {Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security
                  Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {339--366},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.5},
  doi          = {10.13052/JCSM2245-1439.123.5},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HilgurtDMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HovorushchenkoHOKB23,
  author       = {Tetiana Hovorushchenko and
                  Yelyzaveta Hnatchuk and
                  Vitaliy Osyadlyi and
                  Mariia Kapustian and
                  Artem Boyarchuk},
  title        = {Blockchain-Based Medical Decision Support System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {253--274},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.1},
  doi          = {10.13052/JCSM2245-1439.123.1},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HovorushchenkoHOKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HovorushchenkoPK23,
  author       = {Tetiana Hovorushchenko and
                  Olga Pavlova and
                  Mariia Kostiuk},
  title        = {Method of Increasing the Security of Smart Parking System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {297--314},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.3},
  doi          = {10.13052/JCSM2245-1439.123.3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HovorushchenkoPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/IzoninHP23,
  author       = {Ivan Izonin and
                  Tetiana Hovorushchenko and
                  Peter T. Popov},
  title        = {Editorial},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {v--x},
  year         = {2023},
  url          = {https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22717},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/IzoninHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JiangHP23,
  author       = {Xin Jiang and
                  Huawei Huang and
                  Geyang Pan},
  title        = {Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {205--220},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1224},
  doi          = {10.13052/JCSM2245-1439.1224},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/JiangHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KanZYZ23,
  author       = {Xiaopeng Kan and
                  Zhihong Zhou and
                  Lihong Yao and
                  Yuxin Zuo},
  title        = {Research on Anomaly Detection in Vehicular {CAN} Based on Bi-LSTM},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {629--652},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1251},
  doi          = {10.13052/JCSM2245-1439.1251},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KanZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KolliparaKCRMK23,
  author       = {V. N. Hemanth Kollipara and
                  Sai Koushik Kalakota and
                  Sujith Chamarthi and
                  S. Ramani and
                  Preeti Malik and
                  Marimuthu Karuppiah},
  title        = {Timestamp Based {OTP} and Enhanced {RSA} Key Exchange Scheme with
                  {SIT} Encryption to Secure IoT Devices},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {77--102},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1214},
  doi          = {10.13052/JCSM2245-1439.1214},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KolliparaKCRMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li23,
  author       = {Xingfeng Li},
  title        = {An Evaluation Model for Network Security Based on an Optimized Circular
                  Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {711--732},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1255},
  doi          = {10.13052/JCSM2245-1439.1255},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Lu23,
  author       = {Yujing Lu},
  title        = {Security and Privacy of Internet of Things: {A} Review of Challenges
                  and Solutions},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {813--844},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1261},
  doi          = {10.13052/JCSM2245-1439.1261},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Lu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OrlovskyiKSUI23,
  author       = {Ruslan Orlovskyi and
                  Sergiy Kharytonov and
                  Igor Samoshchenko and
                  Olha Us and
                  Volodymyr Iemelianenko},
  title        = {Countering Cybercrime Under Martial Law},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {893--910},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1264},
  doi          = {10.13052/JCSM2245-1439.1264},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/OrlovskyiKSUI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PlatzerL23,
  author       = {Florian Platzer and
                  Alexandra Lux},
  title        = {Inconsistencies in Darknet Researches},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {187--204},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1223},
  doi          = {10.13052/JCSM2245-1439.1223},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PlatzerL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Pravorska23,
  author       = {Nataliia I. Pravorska},
  title        = {Additional Detection of Clones Using Locally Sensitive Hashing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {367--388},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.6},
  doi          = {10.13052/JCSM2245-1439.123.6},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Pravorska23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RaufMW23,
  author       = {Usman Rauf and
                  Fadi Mohsen and
                  Zhiyuan Wei},
  title        = {A Taxonomic Classification of Insider Threats: Existing Techniques,
                  Future Directions {\&} Recommendations},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {221--252},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1225},
  doi          = {10.13052/JCSM2245-1439.1225},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RaufMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SalmanMJ23,
  author       = {Fadhil Mohammed Salman and
                  Ahssan Ahmmed Mohammed and
                  Fanar Ali Joda},
  title        = {Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless
                  Mesh Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {785--812},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1258},
  doi          = {10.13052/JCSM2245-1439.1258},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SalmanMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SalmanMM23,
  author       = {Fadhil Mohammed Salman and
                  Ahssan Ahmmed Mohammed and
                  Ahmed Fakhir Mutar},
  title        = {Optimization of {LEACH} Protocol for WSNs in Terms of Energy Efficient
                  and Network Lifetime},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {275--296},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.2},
  doi          = {10.13052/JCSM2245-1439.123.2},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SalmanMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShepitaTS23,
  author       = {Petro Shepita and
                  Lyubov Tupychak and
                  Julia Shepita},
  title        = {Analysis of Cyber Security Threats of the Printing Enterprise},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {415--434},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.8},
  doi          = {10.13052/JCSM2245-1439.123.8},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShepitaTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShettyMPD23,
  author       = {Nisha P. Shetty and
                  Balachandra Muniyal and
                  Aman Priyanshu and
                  Vedant Rishi Das},
  title        = {FedBully: {A} Cross-Device Federated Approach for Privacy Enabled
                  Cyber Bullying Detection using Sentence Encoders},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {465--496},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1242},
  doi          = {10.13052/JCSM2245-1439.1242},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShettyMPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SikoraLTF23,
  author       = {Liubomyr S. Sikora and
                  Nataliia Lysa and
                  Yevhen I. Tsikalo and
                  Olga Fedevych},
  title        = {System-Information and Cognitive Technologies of Man-Made Infrastructure
                  Cyber Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {389--414},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.7},
  doi          = {10.13052/JCSM2245-1439.123.7},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SikoraLTF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachBL23,
  author       = {Martin Steinebach and
                  Tiberius Berwanger and
                  Huajian Liu},
  title        = {Image Hashing Robust Against Cropping and Rotation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {129--160},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1221},
  doi          = {10.13052/JCSM2245-1439.1221},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/UllaS23,
  author       = {Mohammed Mujeer Ulla and
                  Deepak S. Sakkari},
  title        = {Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1,
                  NIST256p, NIST521p and {LLL}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {103--128},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1215},
  doi          = {10.13052/JCSM2245-1439.1215},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/UllaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xue23,
  author       = {Ying Xue},
  title        = {Machine Learning: Research on Detection of Network Security Vulnerabilities
                  by Extracting and Matching Features},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {697--710},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1254},
  doi          = {10.13052/JCSM2245-1439.1254},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xue23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/XueZL23,
  author       = {Xiao Xue and
                  Yangbing Zheng and
                  Chao Lu},
  title        = {Wireless Network Safety Status Prediction Based on Fuzzy Logic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {589--604},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1247},
  doi          = {10.13052/JCSM2245-1439.1247},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/XueZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YannikosHS23,
  author       = {York Yannikos and
                  Julian Heeger and
                  Martin Steinebach},
  title        = {Scraping and Analyzing Data of a Large Darknet Marketplace},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {161--186},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1222},
  doi          = {10.13052/JCSM2245-1439.1222},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/YannikosHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23,
  author       = {Zhihong Zhang},
  title        = {Analysis of Network Security Countermeasures From the Perspective
                  of Improved {FS} Algorithm and {ICT} Convergence},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1211},
  doi          = {10.13052/JCSM2245-1439.1211},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23a,
  author       = {Junlin Zhang},
  title        = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation
                  Score},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {55--76},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1213},
  doi          = {10.13052/JCSM2245-1439.1213},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangL23,
  author       = {Liu Zhang and
                  Yanyu Liu},
  title        = {Network Security Prediction and Situational Assessment Using Neural
                  Network-based Method},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {547--568},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1245},
  doi          = {10.13052/JCSM2245-1439.1245},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangL23a,
  author       = {Hong Zhang and
                  Pei Li},
  title        = {Research on Location Privacy Protection Technology in Wireless Sensor
                  Networks Based on Big Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {845--868},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1262},
  doi          = {10.13052/JCSM2245-1439.1262},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhouH23,
  author       = {Xv Zhou and
                  Jinwen He},
  title        = {Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation
                  and Real Ket Model},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {757--784},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1257},
  doi          = {10.13052/JCSM2245-1439.1257},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhouH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Bai22,
  author       = {Bing Bai},
  title        = {Monitoring and Identification of Abnormal Network Traffic by Different
                  Mathematical Models},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {5},
  pages        = {695--712},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1153},
  doi          = {10.13052/JCSM2245-1439.1153},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Bai22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BianPW22,
  author       = {Dongliang Bian and
                  Jun Pan and
                  Yanhui Wang},
  title        = {Study of Encrypted Transmission of Private Data During Network Communication:
                  Performance Comparison of Advanced Encryption Standard and Data Encryption
                  Standard Algorithms},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {5},
  pages        = {713--726},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1154},
  doi          = {10.13052/JCSM2245-1439.1154},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BianPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChaithanyaB22,
  author       = {B. N. Chaithanya and
                  S. H. Brahmananda},
  title        = {AI-enhanced Defense Against Ransomware Within the Organization's Architecture},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {621--654},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1146},
  doi          = {10.13052/JCSM2245-1439.1146},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChaithanyaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/FalchOSTW22,
  author       = {Morten Falch and
                  Henning Olesen and
                  Knud Erik Skouby and
                  Reza Tadayoni and
                  Idongesit Williams},
  title        = {Cybersecurity Strategies for SMEs in the Nordic Baltic Region},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {6},
  pages        = {727--754},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1161},
  doi          = {10.13052/JCSM2245-1439.1161},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/FalchOSTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LaajiA22,
  author       = {El Hassane Laaji and
                  Abdelmalek Azizi},
  title        = {A Combination of {BB84} Quantum Key Distribution and An Improved Scheme
                  of {NTRU} Post-Quantum Cryptosystem},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {5},
  pages        = {673--694},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1152},
  doi          = {10.13052/JCSM2245-1439.1152},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LaajiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li22,
  author       = {Xiang Li},
  title        = {Construction of a Smart City Network Information Security Evaluation
                  Model Based on {GRA-BPNN}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {6},
  pages        = {755--776},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1162},
  doi          = {10.13052/JCSM2245-1439.1162},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiuGJ22,
  author       = {Zehui Liu and
                  Min Guo and
                  Yun Ju},
  title        = {Physical Layer Key Generation Method Based on {SVD} Pre-processing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {6},
  pages        = {777--794},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1163},
  doi          = {10.13052/JCSM2245-1439.1163},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiuGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MP22,
  author       = {Somesha M. and
                  Alwyn R. Pais},
  title        = {Classification of Phishing Email Using Word Embedding and Machine
                  Learning Techniques},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {3},
  pages        = {279--320},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1131},
  doi          = {10.13052/JCSM2245-1439.1131},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NandaGI22,
  author       = {Sunpreet Kaur Nanda and
                  Deepika Ghai and
                  Prashant Ingole},
  title        = {Analysis of Video Forensics System for Detection of Gun, Mask and
                  Anomaly Using Soft Computing Techniques},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {549--574},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1143},
  doi          = {10.13052/JCSM2245-1439.1143},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/NandaGI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NdambukiA22,
  author       = {Daniel Kyalo Ndambuki and
                  Hitmi Khalifa Alhitmi},
  title        = {Attack Mitigation and Security for Vehicle Platoon},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {497--530},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1141},
  doi          = {10.13052/JCSM2245-1439.1141},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/NdambukiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NilizadehNMZL22,
  author       = {Amirfarhad Nilizadeh and
                  Shirin Nilizadeh and
                  Wojciech Mazurczyk and
                  Cliff C. Zou and
                  Gary T. Leavens},
  title        = {Adaptive Matrix Pattern Steganography on {RGB} Images},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1111},
  doi          = {10.13052/JCSM2245-1439.1111},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NilizadehNMZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RaoKPZ22,
  author       = {K. Rajesh Rao and
                  Aditya Kolpe and
                  Tribikram Pradhan and
                  Bruno Bogaz Zarpel{\~{a}}o},
  title        = {An Efficient Solution to User Authorization Query Problem in {RBAC}
                  Systems Using Hierarchical Clustering},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {531--548},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1142},
  doi          = {10.13052/JCSM2245-1439.1142},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RaoKPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Shandilya22,
  author       = {Shishir Kumar Shandilya},
  title        = {Design and Deployment of Network Testbed for Web Data Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1121},
  doi          = {10.13052/JCSM2245-1439.1121},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Shandilya22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShettyMYBS22,
  author       = {Nisha P. Shetty and
                  Balachandra Muniyal and
                  Niraj Yagnik and
                  Tulika Banerjee and
                  Angad Singh},
  title        = {A Privacy Preserving Framework to Protect Sensitive Data in Online
                  Social Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {575--600},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1144},
  doi          = {10.13052/JCSM2245-1439.1144},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShettyMYBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SunardiHA22,
  author       = {Sunardi and
                  Herman and
                  Syifa Riski Ardiningtias},
  title        = {A Comparative Analysis of Digital Forensic Investigation Tools on
                  Facebook Messenger Applications},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {5},
  pages        = {655--672},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1151},
  doi          = {10.13052/JCSM2245-1439.1151},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SunardiHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Tekleselassie22,
  author       = {Hailyie Tekleselassie},
  title        = {Two-Dimensional Projection Based Wireless Intrusion Classification
                  Using Lightweight EfficientNet},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {11},
  number       = {4},
  pages        = {601--620},
  year         = {2022},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1145},
  doi          = {10.13052/JCSM2245-1439.1145},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Tekleselassie22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlkindiSA21,
  author       = {Zainab Rashid Alkindi and
                  Mohamed Sarrab and
                  Nasser Alzeidi},
  title        = {User Privacy and Data Flow Control for Android Apps: Systematic Literature
                  Review},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {261--304},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1019},
  doi          = {10.13052/JCSM2245-1439.1019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlkindiSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AnandBKT21,
  author       = {Adarsh Anand and
                  Navneet Bhatt and
                  Jasmine Kaur and
                  Yoshinobu Tamura},
  title        = {Time Lag-Based Modelling for Software Vulnerability Exploitation Process},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {4},
  pages        = {663--678},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1042},
  doi          = {10.13052/JCSM2245-1439.1042},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AnandBKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BaccariHTM21,
  author       = {Sihem Baccari and
                  Mohamed Hadded and
                  Haifa Touati and
                  Paul M{\"{u}}hlethaler},
  title        = {A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad
                  hoc Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {377--402},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1023},
  doi          = {10.13052/JCSM2245-1439.1023},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BaccariHTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BreidenbachSL21,
  author       = {Uwe Breidenbach and
                  Martin Steinebach and
                  Huajian Liu},
  title        = {Privacy-Enhanced Robust Image Hashing with Bloom Filters},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {97--132},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1014},
  doi          = {10.13052/JCSM2245-1439.1014},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BreidenbachSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BunzelSL21,
  author       = {Niklas Bunzel and
                  Martin Steinebach and
                  Huajian Liu},
  title        = {Cover-aware Steganalysis},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {1--26},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1011},
  doi          = {10.13052/JCSM2245-1439.1011},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BunzelSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChoS21,
  author       = {Joo Yeon Cho and
                  Andrew Sergeev},
  title        = {Post-quantum MACsec in Ethernet Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {161--176},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1016},
  doi          = {10.13052/JCSM2245-1439.1016},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChopadeP21,
  author       = {Rupali M. Chopade and
                  Vinod Keshaorao Pachghare},
  title        = {Database Security Enhancement by Eliminating the Redundant and Incorrect
                  Spelled Data Entries},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {403--420},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1024},
  doi          = {10.13052/JCSM2245-1439.1024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChopadeP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChopadeP21a,
  author       = {Rupali M. Chopade and
                  Vinod Keshaorao Pachghare},
  title        = {Data Tamper Detection from NoSQL Database in Forensic Environment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {421--450},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1025},
  doi          = {10.13052/JCSM2245-1439.1025},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChopadeP21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/EnglbrechtP21,
  author       = {Ludwig Englbrecht and
                  G{\"{u}}nther Pernul},
  title        = {A Combined Approach for a Privacy-Aware Digital Forensic Investigation
                  in Enterprises},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {27--64},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1012},
  doi          = {10.13052/JCSM2245-1439.1012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/EnglbrechtP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GoyalJR21,
  author       = {Nupur Goyal and
                  Tanuja Joshi and
                  Mangey Ram},
  title        = {Evaluating and Improving a Content Delivery Network {(CDN)} Workflow
                  using Stochastic Modelling},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {4},
  pages        = {679--698},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1043},
  doi          = {10.13052/JCSM2245-1439.1043},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GoyalJR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HollaPD21,
  author       = {M. Raviraja Holla and
                  Alwyn R. Pais and
                  Suma D.},
  title        = {An Accelerator-based Logistic Map Image Cryptosystems for Grayscale
                  Images},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {3},
  pages        = {487--510},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1031},
  doi          = {10.13052/JCSM2245-1439.1031},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HollaPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiL21,
  author       = {Zhen Li and
                  Qi Liao},
  title        = {Game Theory of Data-selling Ransomware},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {65--96},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1013},
  doi          = {10.13052/JCSM2245-1439.1013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MamadeD21,
  author       = {Bayisa Kune Mamade and
                  Diriba Mangasha Dabala},
  title        = {Exploring The Correlation between Cyber Security Awareness, Protection
                  Measures and the State of Victimhood: The Case Study of Ambo University's
                  Academic Staffs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {4},
  pages        = {699--724},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1044},
  doi          = {10.13052/JCSM2245-1439.1044},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MamadeD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MarechalD21,
  author       = {Emeline Marechal and
                  Benoit Donnet},
  title        = {Targeted Attack through Network Fingerprinting},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {347--376},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1022},
  doi          = {10.13052/JCSM2245-1439.1022},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MarechalD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MocanuT21,
  author       = {St{\'{e}}phane Mocanu and
                  Jean{-}Marc Thiriet},
  title        = {Real-Time Performance and Security of {IEC} 61850 Process Bus Communications},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {305--346},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1021},
  doi          = {10.13052/JCSM2245-1439.1021},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MocanuT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NegiMCV21,
  author       = {Charu Negi and
                  Preeti Mishra and
                  Pooja Chaudhary and
                  Harsh Vardhan},
  title        = {A Review and Case Study on Android Malware: Threat Model, Attacks,
                  Techniques and Tools},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {231--260},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1018},
  doi          = {10.13052/JCSM2245-1439.1018},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NegiMCV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PlatzerSS21,
  author       = {Florian Platzer and
                  Marcel Sch{\"{a}}fer and
                  Martin Steinebach},
  title        = {Critical Traffic Analysis on the Tor Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {133--160},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1015},
  doi          = {10.13052/JCSM2245-1439.1015},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PlatzerSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SakuraiWOAM21,
  author       = {Yuji Sakurai and
                  Takuya Watanabe and
                  Tetsuya Okuda and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  title        = {Identifying the Phishing Websites Using the Patterns of {TLS} Certificates},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {2},
  pages        = {451--486},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1026},
  doi          = {10.13052/JCSM2245-1439.1026},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SakuraiWOAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SelvaganapathyS21,
  author       = {Shymalagowri Selvaganapathy and
                  G. Sudha Sadasivam and
                  Vinayakumar Ravi},
  title        = {A Review on Android Malware: Attacks, Countermeasures and Challenges
                  Ahead},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {1},
  pages        = {177--230},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1017},
  doi          = {10.13052/JCSM2245-1439.1017},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SelvaganapathyS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SinghS21,
  author       = {Rajeev Singh and
                  Sukhwinder Singh},
  title        = {A Lightweight Security Scheme {(LSS)} for Wireless Node Communication
                  for Border Surveillance System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {10},
  number       = {4},
  pages        = {641--662},
  year         = {2021},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1041},
  doi          = {10.13052/JCSM2245-1439.1041},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SinghS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbaneDBBM20,
  author       = {Amar Abane and
                  Mehammed Daoui and
                  Samia Bouzefrane and
                  Soumya Banerjee and
                  Paul M{\"{u}}hlethaler},
  title        = {A Realistic Deployment of Named Data Networking in the Internet of
                  Things},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {1--46},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.911},
  doi          = {10.13052/JCSM2245-1439.911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbaneDBBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbdelwahabEZ20,
  author       = {Zakaria Hassan Abdelwahab and
                  Talaat A. Elgarf and
                  Abdelhalim Zekry},
  title        = {Analyzing {SNOW} and {ZUC} Security Algorithms Using {NIST} {SP} 800-22
                  and Enhancing their Randomness},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {535--576},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.943},
  doi          = {10.13052/JCSM2245-1439.943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbdelwahabEZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlwazzehKS20,
  author       = {Muneer Alwazzeh and
                  Sameer Karaman and
                  Mohammad Nur Shamma},
  title        = {Man in The Middle Attacks Against {SSL/TLS:} Mitigation and Defeat},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {449--468},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.933},
  doi          = {10.13052/JCSM2245-1439.933},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlwazzehKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Aseeri20,
  author       = {Ahmad O. Aseeri},
  title        = {Noise-Resilient Neural Network-Based Adversarial Attack Modeling for
                  {XOR} Physical Unclonable Functions},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {331--354},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.926},
  doi          = {10.13052/JCSM2245-1439.926},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Aseeri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BejoyJ20,
  author       = {B. J. Bejoy and
                  S. Janakiraman},
  title        = {Enhanced {AIS} Based Intrusion Detection System Using Natural Killer
                  Cells},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {515--534},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.942},
  doi          = {10.13052/JCSM2245-1439.942},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BejoyJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChoSZ20,
  author       = {Joo Yeon Cho and
                  Andrew Sergeev and
                  Jim Zou},
  title        = {Securing Ethernet-based Optical Fronthaul for 5G Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {91--110},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.913},
  doi          = {10.13052/JCSM2245-1439.913},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChoSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DamKS20,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Sebastian Schrittwieser},
  title        = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up
                  Scam},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {265--300},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.924},
  doi          = {10.13052/JCSM2245-1439.924},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DamKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DariBE20,
  author       = {El Yazid Dari and
                  Ahmed Bendahmane and
                  Mohamed Essaaidi},
  title        = {Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart
                  Grid},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {237--264},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.923},
  doi          = {10.13052/JCSM2245-1439.923},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DariBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DoynikovaFK20,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {A Semantic Model for Security Evaluation of Information Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {301--330},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.925},
  doi          = {10.13052/JCSM2245-1439.925},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KourTK20,
  author       = {Ravdeep Kour and
                  Adithya Thaduri and
                  Ramin Karim},
  title        = {Railway Defender Kill Chain to Predict and Detect Cyber-Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {47--90},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.912},
  doi          = {10.13052/JCSM2245-1439.912},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KourTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NagaRajuR20,
  author       = {Pamarthi NagaRaju and
                  Nallamothu Nagamalleswara Rao},
  title        = {{OB-MECC:} An Efficient Confidentiality and Security Enhancement for
                  Cloud Storage System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {577--600},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.944},
  doi          = {10.13052/JCSM2245-1439.944},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NagaRajuR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OdumuyiwaC20,
  author       = {Victor Odumuyiwa and
                  Analogbei Chibueze},
  title        = {Automatic Detection of {HTTP} Injection Attacks using Convolutional
                  Neural Network and Deep Neural Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {489--514},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.941},
  doi          = {10.13052/JCSM2245-1439.941},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OdumuyiwaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PorwalM20,
  author       = {Shardha Porwal and
                  Sangeeta Mittal},
  title        = {A Privacy Preserving and Efficient Multi Authority - {CP-ABE} Scheme
                  for Secure Cloud Communication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {601--626},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.945},
  doi          = {10.13052/JCSM2245-1439.945},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PorwalM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SaadehSSA20,
  author       = {Maha Saadeh and
                  Azzam Sleit and
                  Khair Eddin Sabri and
                  Wesam Almobaideen},
  title        = {Object Authentication in the Context of the Internet of Things: {A}
                  Survey},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {385--448},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.932},
  doi          = {10.13052/JCSM2245-1439.932},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SaadehSSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachLG20,
  author       = {Martin Steinebach and
                  Huajian Liu and
                  Karol Gotkowski},
  title        = {Fake News Detection by Image Montage Recognition},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {175--202},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.921},
  doi          = {10.13052/JCSM2245-1439.921},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachLL20,
  author       = {Martin Steinebach and
                  Sebastian Lutz and
                  Huajian Liu},
  title        = {Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {111--140},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.914},
  doi          = {10.13052/JCSM2245-1439.914},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachSKB20,
  author       = {Martin Steinebach and
                  Marcel Sch{\"{a}}fer and
                  Alexander Karakuz and
                  Katharina Brandl},
  title        = {Detection and Analysis of Tor Onion Services},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {141--174},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.915},
  doi          = {10.13052/JCSM2245-1439.915},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachSKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TundisBSM20,
  author       = {Andrea Tundis and
                  Leon B{\"{o}}ck and
                  Victoria Stanilescu and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Experiencing the Detection of Radicalized Criminals on Facebook Social
                  Network and Data-related Issues},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {203--236},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.922},
  doi          = {10.13052/JCSM2245-1439.922},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TundisBSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Tweneboah-Koduah20,
  author       = {Samuel Tweneboah{-}Koduah and
                  Francis Atsu and
                  Ramjee Prasad},
  title        = {Reaction of Stock Volatility to Data Breach: an Event Study},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {355--384},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.931},
  doi          = {10.13052/JCSM2245-1439.931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Tweneboah-Koduah20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Amritha0KP19,
  author       = {P. P. Amritha and
                  M. Sethumadhavan and
                  Ramakrishnan Krishnan and
                  Saibal Kumar Pal},
  title        = {Anti-forensic Approach to Remove StegoContent from Images and Videos},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {3},
  pages        = {295--320},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.831},
  doi          = {10.13052/JCSM2245-1439.831},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Amritha0KP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ArunS19,
  author       = {V. Arun and
                  R. Sudhakar},
  title        = {User Behavioral Analysis Using MarkovChain and Steady-State in Tracer
                  andChecker Model},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {277--294},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.826},
  doi          = {10.13052/JCSM2245-1439.826},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ArunS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BahashwanM19,
  author       = {Abdullah Ahmed Bahashwan and
                  Selvakumar Manickam},
  title        = {A Brief Review of Messaging Protocol Standards for Internet of Things
                  (IoT)},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {1},
  pages        = {1--14},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.811},
  doi          = {10.13052/JCSM2245-1439.811},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BahashwanM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BelloM19,
  author       = {Abubakar Bello and
                  Venkatesh Mahadevan},
  title        = {A Cloud Based Conceptual IdentityManagement Model for Secured Internetof
                  Things Operation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {1},
  pages        = {53--74},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.813},
  doi          = {10.13052/JCSM2245-1439.813},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BelloM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BhattGM19,
  author       = {Arpita Jadhav Bhatt and
                  Chetna Gupta and
                  Sangeeta Mittal},
  title        = {iShield: {A} Framework for Preserving Privacyof iOS App User},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {4},
  pages        = {493--536},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.845},
  doi          = {10.13052/JCSM2245-1439.845},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BhattGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BodapatiV19,
  author       = {Jyostna Devi Bodapati and
                  Veeranjaneyulu Naralasetti},
  title        = {Feature Extraction and Classification UsingDeep Convolutional Neural
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {261--276},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.825},
  doi          = {10.13052/JCSM2245-1439.825},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/BodapatiV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DeviC019,
  author       = {D. Indhumathi Devi and
                  S. Chithra and
                  M. Sethumadhavan},
  title        = {Hardware Random Number GeneratorUsing {FPGA}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {4},
  pages        = {409--418},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.841},
  doi          = {10.13052/JCSM2245-1439.841},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DeviC019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DolezalT19,
  author       = {Ondrej Dolezal and
                  Hana Tom{\'{a}}skov{\'{a}}},
  title        = {Czech Cyber Security Systemfrom a view of System Dynamics},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {241--260},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.824},
  doi          = {10.13052/JCSM2245-1439.824},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DolezalT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/FujsMV19,
  author       = {Damjan Fujs and
                  Anze Mihelic and
                  Simon Vrhovec},
  title        = {Social Network Self-Protection Model: What Motivates Users to Self-Protect?},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {4},
  pages        = {467--492},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.844},
  doi          = {10.13052/JCSM2245-1439.844},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/FujsMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GhourabSAEA19,
  author       = {Esraa M. Ghourab and
                  Effat Samir and
                  Mohamed Azab and
                  Mohamed Eltoweissy},
  title        = {Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor
                  Moving-target Defense},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {133--164},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.821},
  doi          = {10.13052/JCSM2245-1439.821},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GhourabSAEA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HasumiST19,
  author       = {Daichi Hasumi and
                  Shigeyoshi Shima and
                  Hiroki Takakura},
  title        = {{SPINZ:} {A} Speculating Incident Zone Systemfor Incident Handling},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {3},
  pages        = {341--364},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.833},
  doi          = {10.13052/JCSM2245-1439.833},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HasumiST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LashkariCG19,
  author       = {Arash Habibi Lashkari and
                  Min Chen and
                  Ali A. Ghorbani},
  title        = {A Survey on User Profiling Model forAnomaly Detection in Cyberspace},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {1},
  pages        = {75--112},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.814},
  doi          = {10.13052/JCSM2245-1439.814},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/LashkariCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LeZH19,
  author       = {Duc C. Le and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing
                  Maps},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {1},
  pages        = {15--52},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.812},
  doi          = {10.13052/JCSM2245-1439.812},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LeZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MetongnonSM19,
  author       = {Lionel Metongnon and
                  Ramin Sadre},
  title        = {Prevalence of IoT Protocols in Telescopeand Honeypot Measurements},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {3},
  pages        = {321--340},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.832},
  doi          = {10.13052/JCSM2245-1439.832},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MetongnonSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RevathyBL19,
  author       = {R. Revathy and
                  Saminathan Balamurali and
                  R. Lawrance},
  title        = {Classifying Agricultural Crop PestData Using Hadoop MapReduceBased
                  {C5.0} Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {3},
  pages        = {393--408},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.835},
  doi          = {10.13052/JCSM2245-1439.835},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RevathyBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RoudiereO19,
  author       = {Gilles Roudi{\`{e}}re and
                  Philippe Owezarski},
  title        = {Evaluating the Impact of Traffic Sampling onAATAC's DDoS Detection},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {4},
  pages        = {419--438},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.842},
  doi          = {10.13052/JCSM2245-1439.842},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RoudiereO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RychlyR19,
  author       = {Marek Rychl{\'{y}} and
                  Ondrej Rysav{\'{y}}},
  title        = {Big Data Security Analysis withTARZAN Platform},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {165--188},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.822},
  doi          = {10.13052/JCSM2245-1439.822},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RychlyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachLE19,
  author       = {Martin Steinebach and
                  Huajian Liu and
                  Andre Ester},
  title        = {The Need for Steganalysis in ImageDistribution Channels},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {3},
  pages        = {365--392},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.834},
  doi          = {10.13052/JCSM2245-1439.834},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachLE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SuarezGF19,
  author       = {Gonzalo P. Su{\'{a}}rez and
                  Lazaros K. Gallos and
                  Nina H. Fefferman},
  title        = {A Case Study in Tailoring a Bio-InspiredCyber-Security Algorithm:
                  DesigningAnomaly Detection for Multilayer Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {1},
  pages        = {113--132},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.815},
  doi          = {10.13052/JCSM2245-1439.815},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SuarezGF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/VinayakumarSPMK19,
  author       = {R. Vinayakumar and
                  K. P. Soman and
                  Prabaharan Poornachandran and
                  Vysakh S. Mohan and
                  Amara Dinesh Kumar},
  title        = {ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational
                  AwarenessBased on DNS, URL, and Email Data Analysis},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {8},
  number       = {2},
  pages        = {189--240},
  year         = {2019},
  url          = {https://doi.org/10.13052/jcsm2245-1439.823},
  doi          = {10.13052/JCSM2245-1439.823},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/VinayakumarSPMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChattopadhyayST18,
  author       = {Ankur Chattopadhyay and
                  Michael J. Schulz and
                  Katie Turkiewicz and
                  Eli Hughes},
  title        = {A Novel Visual Recognition-basedAuthentication Model Using a Hybrid
                  TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein
                  Online Healthcare},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--46},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.733},
  doi          = {10.13052/JCSM2245-1439.733},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChattopadhyayST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/FathimaM18,
  author       = {A. Jainul Fathima and
                  G. Murugaboopathi},
  title        = {A Novel Customized Big Data Analytics Framework for Drug Discovery},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {145--160},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7111},
  doi          = {10.13052/JCSM2245-1439.7111},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/FathimaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GeorgeD18,
  author       = {Sam George and
                  K. David},
  title        = {Security Strategies for Safe Dataand Content Access in OperationalModules
                  of Product DataManagement Software},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {87--94},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.717},
  doi          = {10.13052/JCSM2245-1439.717},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GeorgeD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GopalakrishnanV18,
  author       = {Aswin Gopalakrishnan and
                  Emanuele Vineti and
                  Ashok Kumar Mohan and
                  M. Sethumadhavan},
  title        = {The Art of Piecewise Hashing: {A} StepToward Better Evidence Provability},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {109--130},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.719},
  doi          = {10.13052/JCSM2245-1439.719},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GopalakrishnanV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GuptaSK18,
  author       = {Sanchit Gupta and
                  Harshit Sharma and
                  Sarvjeet Kaur},
  title        = {Malware Characterization Using WindowsAPI Call Sequences},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {363--378},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.741},
  doi          = {10.13052/JCSM2245-1439.741},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GuptaSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KadirSG18,
  author       = {Andi Fitriah Abdul Kadir and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Understanding Android Financial MalwareAttacks: Taxonomy, Characterization,
                  and Challenges},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--52},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.732},
  doi          = {10.13052/JCSM2245-1439.732},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KadirSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaratasA18,
  author       = {G{\"{o}}zde Karatas and
                  Akhan Akbulut},
  title        = {Survey on Access Control Mechanisms in Cloud Computing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--36},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.731},
  doi          = {10.13052/JCSM2245-1439.731},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaratasA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaruppasamyB18,
  author       = {M. Karuppasamy and
                  S. P. Balakannan},
  title        = {Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {95--108},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.718},
  doi          = {10.13052/JCSM2245-1439.718},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaruppasamyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LeSD18,
  author       = {Dac{-}Nhuong Le and
                  Bijeta Seth and
                  Surjeet Dalal},
  title        = {A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin
                  Cloud Environment for SecuringOutsourced Medical Database: {A} Revolutionary
                  Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {379--408},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.742},
  doi          = {10.13052/JCSM2245-1439.742},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LeSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MaragatharajanB18,
  author       = {M. Maragatharajan and
                  S. P. Balakannan},
  title        = {A Secured {MANET} Using Multicast Routing Protocols and Semi Markov
                  Process},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {53--68},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.715},
  doi          = {10.13052/JCSM2245-1439.715},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MaragatharajanB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RajeswariS18,
  author       = {S. Rajeswari and
                  K. Suthendran},
  title        = {Chi-Square MapReduce Model for Agricultural Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {13--24},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.712},
  doi          = {10.13052/JCSM2245-1439.712},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RajeswariS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RevathyS18,
  author       = {C. Revathy and
                  G. Sekar},
  title        = {Analytic Hierarchy Process for ResourceAllocation in Cloud Environment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {25--38},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.713},
  doi          = {10.13052/JCSM2245-1439.713},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RevathyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SebastianS18,
  author       = {A. Sebastian and
                  Shanmugam Sivagurunathan},
  title        = {Multi DODAGs in {RPL} for Reliable Smart City IoT},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {69--86},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.716},
  doi          = {10.13052/JCSM2245-1439.716},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SebastianS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SubburajS18,
  author       = {T. Subburaj and
                  K. Suthendran},
  title        = {DigitalWatering Hole Attack DetectionUsing Sequential Pattern},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {1--12},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.711},
  doi          = {10.13052/JCSM2245-1439.711},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SubburajS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SureshAMK18,
  author       = {Meenakshi Suresh and
                  P. P. Amritha and
                  Ashok Kumar Mohan and
                  V. Anil Kumar},
  title        = {An Investigation on {HTTP/2} Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {161--189},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7112},
  doi          = {10.13052/JCSM2245-1439.7112},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SureshAMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SuvarnaP18,
  author       = {B. Suvarna and
                  T. Maruthi Padmaja},
  title        = {Enhanced Matrix Chain Multiplication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {409--420},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.743},
  doi          = {10.13052/JCSM2245-1439.743},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SuvarnaP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ThilagavathiS18,
  author       = {B. Thilagavathi and
                  K. Suthendran},
  title        = {Boosting Based Implementationof Biometric Authentication in IoT},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {131--144},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7110},
  doi          = {10.13052/JCSM2245-1439.7110},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ThilagavathiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YaminiKT18,
  author       = {K. Anish Pon Yamini and
                  Suthendran Kannan and
                  Arivoli Thangadurai},
  title        = {Handling Selfishness over Collaborative Mechanism in a MobileAd hoc
                  Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {39--52},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.714},
  doi          = {10.13052/JCSM2245-1439.714},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YaminiKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0001CM17,
  author       = {Paolo Palmieri and
                  Luca Calderoni and
                  Dario Maio},
  title        = {An Anonymous Inter-Network RoutingProtocol for the Internet of Things},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {127--146},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.622},
  doi          = {10.13052/JCSM2245-1439.622},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/0001CM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0001SW17,
  author       = {J{\"{o}}rg Keller and
                  Gabriele Spenger and
                  Steffen Wendzel},
  title        = {Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic
                  PRNGs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {147--170},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.623},
  doi          = {10.13052/JCSM2245-1439.623},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/0001SW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BarmawiP17,
  author       = {Ari Moesriami Barmawi and
                  Deden Pradeka},
  title        = {Information Hiding Based on Histogramand Pixel Pattern},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {4},
  pages        = {397--426},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.642},
  doi          = {10.13052/JCSM2245-1439.642},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BarmawiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ElmangoushM17,
  author       = {Asma Elmangoush and
                  Thomas Magedanz},
  title        = {Adaptable Protocol Selection for Reliable Smart City Services},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {1},
  pages        = {57--76},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.613},
  doi          = {10.13052/JCSM2245-1439.613},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ElmangoushM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GasserSRDSC17,
  author       = {Oliver Gasser and
                  Quirin Scheitle and
                  Benedikt Rudolph and
                  Carl Denis and
                  Nadja Schricker and
                  Georg Carle},
  title        = {The Amplification Threat Posed by PubliclyReachable BACnet Devices},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {1},
  pages        = {77--104},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.614},
  doi          = {10.13052/JCSM2245-1439.614},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GasserSRDSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HodoBIHTA17,
  author       = {Elike Hodo and
                  Xavier J. A. Bellekens and
                  Ephraim Iorkyase and
                  Andrew W. Hamilton and
                  Christos Tachtatzis and
                  Robert C. Atkinson},
  title        = {Machine Learning Approach for Detectionof nonTor Traffic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {171--194},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.624},
  doi          = {10.13052/JCSM2245-1439.624},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HodoBIHTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LiuZYZW17,
  author       = {Zhenyan Liu and
                  Yifei Zeng and
                  Yida Yan and
                  Pengfei Zhang and
                  Yong Wang},
  title        = {Machine Learning for Analyzing Malware},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {227--244},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.631},
  doi          = {10.13052/JCSM2245-1439.631},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LiuZYZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NasserMM17,
  author       = {Ahmad M. K. Nasser and
                  Di Ma and
                  Priya Muralidharan},
  title        = {An Approach for Building Security Resilience in {AUTOSAR} Based Safety
                  Critical Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {271--304},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.633},
  doi          = {10.13052/JCSM2245-1439.633},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/NasserMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NguyenTM017,
  author       = {Dang Nguyen and
                  Dat Tran and
                  Wanli Ma and
                  Dharmendra Sharma},
  title        = {Random Number Generators Basedon {EEG} Non-linear and ChaoticCharacteristics},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {305--338},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.634},
  doi          = {10.13052/JCSM2245-1439.634},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/NguyenTM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PartibaneKK17,
  author       = {B. Partibane and
                  Rajakani Kalidoss and
                  R. Karthipan},
  title        = {Security Improvement in Next GenerationWireless System by Interleaverin
                  Transceiver Structures},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {4},
  pages        = {379--396},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.641},
  doi          = {10.13052/JCSM2245-1439.641},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PartibaneKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RoseLA17,
  author       = {Jamison Rose and
                  Yudong Liu and
                  Ahmed Awad},
  title        = {Biometric Authentication Using Mouseand Eye Movement Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {1},
  pages        = {1--16},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.611},
  doi          = {10.13052/JCSM2245-1439.611},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RoseLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SepehriTS17,
  author       = {Masoomeh Sepehri and
                  Alberto Trombetta and
                  Maryam Sepehri},
  title        = {Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption
                  Scheme},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {339--378},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.635},
  doi          = {10.13052/JCSM2245-1439.635},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SepehriTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShahbarZ17,
  author       = {Khalid Shahbar and
                  Nur Zincir{-}Heywood},
  title        = {Packet Momentum for Identificationof Anonymity Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {1},
  pages        = {27--56},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.612},
  doi          = {10.13052/JCSM2245-1439.612},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShahbarZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShiVRM17,
  author       = {Xue Ying Shi and
                  Natalija Vlajic and
                  Hamzeh Roumani and
                  Pooria Madani},
  title        = {Rethinking the Use of Resource Hints in {HTML5:} Is Faster Always
                  Better!?},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {195--226},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.625},
  doi          = {10.13052/JCSM2245-1439.625},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShiVRM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SrinivasanD17,
  author       = {Avinash Srinivasan and
                  Hunter Dong},
  title        = {{SURE-FIT} - SecURE and AdaptiveFramework for Information Hidingwith
                  Fault-Tolerance},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {4},
  pages        = {427--456},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.643},
  doi          = {10.13052/JCSM2245-1439.643},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SrinivasanD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/VazquezAZ17,
  author       = {F{\'{e}}lix Iglesias V{\'{a}}zquez and
                  Robert Annessi and
                  Tanja Zseby},
  title        = {Analytic Study of Features for the Detection of Covert Timing Channels
                  in NetworkTraffic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {3},
  pages        = {225--270},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.632},
  doi          = {10.13052/JCSM2245-1439.632},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/VazquezAZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WendzelMH17,
  author       = {Steffen Wendzel and
                  Wojciech Mazurczyk and
                  Georg Haas},
  title        = {Steganography for Cyber-physicalSystems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {6},
  number       = {2},
  pages        = {105--126},
  year         = {2017},
  url          = {https://doi.org/10.13052/jcsm2245-1439.621},
  doi          = {10.13052/JCSM2245-1439.621},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WendzelMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlzahraniG16,
  author       = {Abdullah J. Alzahrani and
                  Ali A. Ghorbani},
  title        = {SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {2},
  pages        = {47--74},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.523},
  doi          = {10.13052/JCSM2245-1439.523},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlzahraniG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Bottinger16,
  author       = {Konstantin B{\"{o}}ttinger},
  title        = {Chemotactic Test Case Recombinationfor Large-Scale Fuzzing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {4},
  pages        = {269--286},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.542},
  doi          = {10.13052/JCSM2245-1439.542},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Bottinger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DarwishIS16,
  author       = {Ihab Darwish and
                  Obinna Igbe and
                  Tarek N. Saadawi},
  title        = {Vulnerability Assessment and Experimentation of Smart Grid {DNP3}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {1},
  pages        = {23--54},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.513},
  doi          = {10.13052/JCSM2245-1439.513},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DarwishIS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HamR16,
  author       = {Jeroen van der Ham and
                  Roland van Rijswijk{-}Deij},
  title        = {Ethics and Internet Measurements},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {4},
  pages        = {287--308},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.543},
  doi          = {10.13052/JCSM2245-1439.543},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HamR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KamyodNPPA16,
  author       = {Chayapol Kamyod and
                  Rasmus Hjorth Nielsen and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad and
                  Nattapol Aunsri},
  title        = {End-to-End Reliability and Optimization of Intra and Inter-Domain
                  IMS-based Communication Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {3},
  pages        = {233--256},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.533},
  doi          = {10.13052/JCSM2245-1439.533},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KamyodNPPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaymakR16,
  author       = {Yagiz Kaymak and
                  Roberto Rojas{-}Cessa},
  title        = {Packet-Based Load Balancing in Data Center Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {1},
  pages        = {1--18},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.511},
  doi          = {10.13052/JCSM2245-1439.511},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaymakR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MstafaE16,
  author       = {Ramadhan J. Mstafa and
                  Khaled M. Elleithy},
  title        = {An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data
                  Communication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {3},
  pages        = {167--194},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.531},
  doi          = {10.13052/JCSM2245-1439.531},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MstafaE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MuthalaguJ16,
  author       = {Raja Muthalagu and
                  Subeen Jain},
  title        = {Modifying {LFSR} of {ZUC} to Reduce Time for Key-Stream Generation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {4},
  pages        = {257--268},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.541},
  doi          = {10.13052/JCSM2245-1439.541},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MuthalaguJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Rameshwar16,
  author       = {Pranela Rameshwar},
  title        = {The Economic Impact in Biosecurity Breach - The Perspective of a Translational
                  Scientist},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {1},
  pages        = {19--22},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.512},
  doi          = {10.13052/JCSM2245-1439.512},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Rameshwar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokaleP16,
  author       = {Vandana Milind Rohokale and
                  Ramjee Prasad},
  title        = {Cyber Security for Smart Grid - The Backbone of Social Economy},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {1},
  pages        = {55--76},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.514},
  doi          = {10.13052/JCSM2245-1439.514},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokaleP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RuizW16,
  author       = {Rodrigo Ruiz and
                  Rog{\'{e}}rio Winter},
  title        = {Lazarus: Data Leakage with {PGP} and Resurrection of the Revoked User},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {2},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.521},
  doi          = {10.13052/JCSM2245-1439.521},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RuizW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SpiekermannE16,
  author       = {Daniel Spiekermann and
                  Tobias Eggendorfer},
  title        = {Challenges of Network Forensic Investigation in Virtual Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {2},
  pages        = {15--46},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.522},
  doi          = {10.13052/JCSM2245-1439.522},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SpiekermannE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/VeshchikovML16,
  author       = {Nikita Veshchikov and
                  Stephane Fernandes Medeiros and
                  Liran Lerman},
  title        = {Variety of Scalable Shuffling Countermeasures against Side Channel
                  Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {5},
  number       = {3},
  pages        = {195--232},
  year         = {2016},
  url          = {https://doi.org/10.13052/jcsm2245-1439.532},
  doi          = {10.13052/JCSM2245-1439.532},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/VeshchikovML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0001BM15,
  author       = {Shweta Jain and
                  Christian Barona and
                  Nicholas Madamopoulos},
  title        = {Modelling Wireless Propagation for Indoor Localization},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {279--304},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.443},
  doi          = {10.13052/JCSM2245-1439.443},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0001BM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbomharaK15,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien},
  title        = {Cyber Security and the Internet of Things: Vulnerabilities, Threats,
                  Intruders and Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {65--88},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.414},
  doi          = {10.13052/JCSM2245-1439.414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DongWXELR15,
  author       = {Ziqian Dong and
                  Zheng Wang and
                  Wen Xie and
                  Obinna Emelumadu and
                  Chuan{-}Bi Lin and
                  Roberto Rojas{-}Cessa},
  title        = {An Experimental Study of SmallWorld Network Models for Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {259--278},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.442},
  doi          = {10.13052/JCSM2245-1439.442},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DongWXELR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HerlandHK15,
  author       = {Kristian Herland and
                  Heikki H{\"{a}}mm{\"{a}}inen and
                  Pekka Kekolahti},
  title        = {Information Security Risk Assessment of Smartphones using Bayesian
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {65--86},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.424},
  doi          = {10.13052/JCSM2245-1439.424},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HerlandHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JoshiDD15,
  author       = {Harshvardhan P. Joshi and
                  Aravindhan Dhanasekaran and
                  Rudra Dutta},
  title        = {Trading Off a Vulnerability: Does Software Obfuscation Increase the
                  Risk of {ROP} Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {305--324},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.444},
  doi          = {10.13052/JCSM2245-1439.444},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/JoshiDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaurM15,
  author       = {Goldendeep Kaur and
                  Jyoteesh Malhotra},
  title        = {Comparative Investigation of {ARP} Poisoning mitigation techniques
                  using Standard Testbed for Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {53--64},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.423},
  doi          = {10.13052/JCSM2245-1439.423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaurM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ManousakisESNKR15,
  author       = {Kyriakos Manousakis and
                  Sharanya Eswaran and
                  David Shur and
                  Gaurav Naik and
                  Pavan Kantharaju and
                  William C. Regli and
                  Brian Adamson},
  title        = {Torrent-Based Dissemination in Infrastructure-Less Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {1--22},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.411},
  doi          = {10.13052/JCSM2245-1439.411},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ManousakisESNKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MeskanenNN15,
  author       = {Tommi Meskanen and
                  Valtteri Niemi and
                  Noora Nieminen},
  title        = {How to Use Garbling for Privacy Preserving Electronic Surveillance
                  Services},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {41--64},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.413},
  doi          = {10.13052/JCSM2245-1439.413},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MeskanenNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OforiLFGY15,
  author       = {Kwame Simpe Ofori and
                  Otu Larbi{-}Siaw and
                  Eli Emmanuel Fianu and
                  Richard Eddie Gladjah and
                  Ezer Osei Yeboah{-}Boateng},
  title        = {Factors Influencing the Continuance Use of Mobile Social Media: The
                  effect of Privacy Concerns},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {105--124},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.426},
  doi          = {10.13052/JCSM2245-1439.426},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OforiLFGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PaulI15,
  author       = {Greig Paul and
                  James Irvine},
  title        = {Practical Attacks on Security and Privacy Through a Low-Cost Android
                  Device},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {33--52},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.422},
  doi          = {10.13052/JCSM2245-1439.422},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PaulI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokaleP15,
  author       = {Vandana Milind Rohokale and
                  Ramjee Prasad},
  title        = {Cyber Security for IntelligentWorld with Internet of Things and Machine
                  to Machine Communication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {23--40},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.412},
  doi          = {10.13052/JCSM2245-1439.412},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokaleP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SayeedMS15,
  author       = {Rayyan Sayeed and
                  Ray Miller and
                  Zulfiquar Sayeed},
  title        = {Throughput Prediction Across Heterogeneous Boundaries in Wireless
                  Communications},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {233--258},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.441},
  doi          = {10.13052/JCSM2245-1439.441},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SayeedMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/StevanovicP15,
  author       = {Matija Stevanovic and
                  Jens Myrup Pedersen},
  title        = {On the use of machine learning for identifying botnet network traffic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {1--32},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.421},
  doi          = {10.13052/JCSM2245-1439.421},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/StevanovicP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TakalkarM15,
  author       = {Vedashree Takalkar and
                  Parikshit N. Mahalle},
  title        = {Confidentiality in Online Social Networks; ATrust-based Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {125--144},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.427},
  doi          = {10.13052/JCSM2245-1439.427},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Yeboah-BoatengA15,
  author       = {Ezer Osei Yeboah{-}Boateng and
                  Elvis Akwa{-}Bonsu},
  title        = {Digital Forensic Investigations: Issues of Intangibility, Complications
                  and Inconsistencies in Cyber-crimes},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {87--104},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.425},
  doi          = {10.13052/JCSM2245-1439.425},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Yeboah-BoatengA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0014YXZS014,
  author       = {Yue Zhao and
                  Kenji Yoshigoe and
                  Mengjun Xie and
                  Suijian Zhou and
                  Remzi Seker and
                  Jiang Bian},
  title        = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {289--316},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.333},
  doi          = {10.13052/JCSM2245-1439.333},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Al-DoskiM14,
  author       = {Lava Al{-}Doski and
                  Seshadri Mohan},
  title        = {A Cached Registration Scheme for {IP} Multimedia Subsystem {(IMS)}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {317--338},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.334},
  doi          = {10.13052/JCSM2245-1439.334},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Al-DoskiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlzahraniSAG14,
  author       = {Abdullah J. Alzahrani and
                  Nataliav Stakhanoa and
                  Hugo Gonzalez and
                  Ali A. Ghorbani},
  title        = {Characterizing Evaluation Practicesof Intrusion Detection Methodsfor
                  Smartphones},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {89--132},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.321},
  doi          = {10.13052/JCSM2245-1439.321},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlzahraniSAG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BaligaBD14,
  author       = {Arati Baliga and
                  Jeffrey Bickford and
                  Neil Daswani},
  title        = {Triton: {A} Carrier-based Approach for Detecting and Mitigating Mobile
                  Malware},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {181--212},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.324},
  doi          = {10.13052/JCSM2245-1439.324},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BaligaBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Balogh14,
  author       = {Stefan Balogh},
  title        = {Memory Acquisition by Using Network Card},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {65--76},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.314},
  doi          = {10.13052/JCSM2245-1439.314},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Balogh14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JermynSZ14,
  author       = {Jill Jermyn and
                  Gabriel Salles{-}Loustau and
                  Saman A. Zonouz},
  title        = {An Analysis of DoS Attack Strategies Against the {LTE} {RAN}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {159--180},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.323},
  doi          = {10.13052/JCSM2245-1439.323},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/JermynSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JurneckaHK14,
  author       = {Peter Jurnecka and
                  Petr Han{\'{a}}cek and
                  Matej Kacic},
  title        = {Code Search API, Base of Parallel Code Refactoring System For Safety
                  Standards Compliance},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {47--66},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.313},
  doi          = {10.13052/JCSM2245-1439.313},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/JurneckaHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Knudsen14,
  author       = {Lars R. Knudsen},
  title        = {Dynamic Encryption},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {357--370},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.341},
  doi          = {10.13052/JCSM2245-1439.341},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KornemannOLF14,
  author       = {Stephan Kornemann and
                  Steffen Ortmann and
                  Peter Langend{\"{o}}rfer and
                  Alexandros G. Fragkiadakis},
  title        = {Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {133--158},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.322},
  doi          = {10.13052/JCSM2245-1439.322},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KornemannOLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KotenkoC14,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Fast Network Attack Modeling and Security Evaluation based on Attack
                  Graphs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {27--46},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.312},
  doi          = {10.13052/JCSM2245-1439.312},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LichtmanR14,
  author       = {Marc Lichtman and
                  Jeffrey H. Reed},
  title        = {Reinforcement Learning for Reactive Jamming Mitigation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {213--230},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.325},
  doi          = {10.13052/JCSM2245-1439.325},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LichtmanR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Lokshina14,
  author       = {Izabella Lokshina},
  title        = {Study on Estimating Buffer Overflow Probabilities in High-Speed Communication
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {399--426},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.343},
  doi          = {10.13052/JCSM2245-1439.343},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Lokshina14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Markowsky14,
  author       = {George Markowsky},
  title        = {The Sad History of Random Bits},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {1--24},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.311},
  doi          = {10.13052/JCSM2245-1439.311},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Markowsky14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MillerGDB14,
  author       = {Cody Miller and
                  Dae Glendowne and
                  David A. Dampier and
                  Kendall Blaylock},
  title        = {Forensicloud: An Architecture for Digital Forensic Analysis in the
                  Cloud},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {231--262},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.331},
  doi          = {10.13052/JCSM2245-1439.331},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MillerGDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NollGFAA14,
  author       = {Josef Noll and
                  I{\~{n}}aki Garitano and
                  Seraj Fayyad and
                  Erik {\AA}sberg and
                  Habtamu Abie},
  title        = {Measurable Security, Privacy and Dependability in Smart Grids},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {371--398},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.342},
  doi          = {10.13052/JCSM2245-1439.342},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NollGFAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PodhradskyLB14,
  author       = {Ashley L. Podhradsky and
                  Larry J. LeBlanc and
                  Michael R. Bartolacci},
  title        = {Personal Denial of Service Attacks {(PDOS)} and Online Misbehavior:
                  The Need for Cyber Ethics and Information Security Education on University
                  Campuses},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {339--356},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.335},
  doi          = {10.13052/JCSM2245-1439.335},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PodhradskyLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PomorovaI14,
  author       = {Oksana V. Pomorova and
                  Dmytro O. Ivanchyshyn},
  title        = {Making Static Code Analysis More Efficient},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {77--88},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.315},
  doi          = {10.13052/JCSM2245-1439.315},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PomorovaI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShenYTPH14,
  author       = {Ju Shen and
                  Jianjun Yang and
                  Sami Taha{-}abusneineh and
                  Bryson Payne and
                  Markus A. Hitz},
  title        = {Structure Preserving Large Imagery Reconstruction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {263--288},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.332},
  doi          = {10.13052/JCSM2245-1439.332},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShenYTPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AnggorojatiPP13,
  author       = {Bayu Anggorojati and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad},
  title        = {Efficient Fine Grained Access Control for {RFID} Inter-Enterprise
                  System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {221--242},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.232},
  doi          = {10.13052/JCSM2245-1439.232},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/AnggorojatiPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BabarRP13,
  author       = {Sachin D. Babar and
                  Neeli R. Neeli R. and
                  Ramjee Prasad},
  title        = {Activity Modelling and Countermeasures on Jamming Attack},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {1--23},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.211},
  doi          = {10.13052/JCSM2245-1439.211},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BabarRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BalogunOM13,
  author       = {Muyiwa B. Balogun and
                  Olutayo O. Oyerinde and
                  Stanley H. Mneney},
  title        = {Adaptive Correction Algorithm for {OFDM-IDMA} Systems With Carrier
                  Frequency {OFFSET} in {A} Fast Fading Multipath Channel},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {201--220},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.231},
  doi          = {10.13052/JCSM2245-1439.231},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BalogunOM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Henry-Labordre13,
  author       = {Arnaud Henry{-}Labord{\`{e}}re},
  title        = {The Number Continuity Service: Part {II} {GSM} {CDMA} Seamless Technology
                  Change},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {83--103},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.214},
  doi          = {10.13052/JCSM2245-1439.214},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Henry-Labordre13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KusykGSm13,
  author       = {Janusz Kusyk and
                  Stephen Gundry and
                  Cem Safak Sahin and
                  M. mituyar},
  title        = {Performance metrics for self-positioning autonomous {MANET} nodes},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {151--173},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.223},
  doi          = {10.13052/JCSM2245-1439.223},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KusykGSm13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MaliatsosVK13,
  author       = {Konstantinos N. Maliatsos and
                  Panagiotis N. Vasileiou and
                  Athanasios G. Kanatas},
  title        = {Performance Evaluation of Beamspace {MIMO} Systems with Channel Estimation
                  in Realistic Environments},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {265--290},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.234},
  doi          = {10.13052/JCSM2245-1439.234},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MaliatsosVK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MishraM13,
  author       = {Amitabh Mishra and
                  Gerald Masson},
  title        = {MoCCA: {A} Mobile Cellular Cloud Architecture},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {105--125},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.221},
  doi          = {10.13052/JCSM2245-1439.221},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MishraM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OhbaC13,
  author       = {Yoshihiro Ohba and
                  Stephen Chasko},
  title        = {Performance Evaluation on 6LoWPANand {PANA} in {IEEE} 802.15.4gMesh
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {329--350},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.237},
  doi          = {10.13052/JCSM2245-1439.237},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OhbaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PantHSM13,
  author       = {Rabin Bilas Pant and
                  Hans{-}Petter Halvorsen and
                  Frode Skulbru and
                  Saba Mylvaganam},
  title        = {Intermediate measurement node for extension of {WSN} coverage},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {29--61},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.212},
  doi          = {10.13052/JCSM2245-1439.212},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PantHSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RathkanthiwarG13,
  author       = {Anagha. P. Rathkanthiwar and
                  Abhay S. Gandhi},
  title        = {New Efficient Timing and Frequency Error Estimation In {OFDM}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {291--306},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.235},
  doi          = {10.13052/JCSM2245-1439.235},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RathkanthiwarG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokalePP13,
  author       = {Vandana Milind Rohokale and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad},
  title        = {Green Cooperative Web of Trust for Securityin Cognitive Radio Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {307--328},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.236},
  doi          = {10.13052/JCSM2245-1439.236},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokalePP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Schrage13,
  author       = {Reinhard Schrage},
  title        = {{NGSON} Service Composition Ontology},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {351--358},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.238},
  doi          = {10.13052/JCSM2245-1439.238},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Schrage13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TangeA13,
  author       = {Henrik Tange and
                  Birger Andersen},
  title        = {Dynamic {AES} Extending the Lifetime?},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {243--164},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.233},
  doi          = {10.13052/JCSM2245-1439.233},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TangeA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangBMSS13,
  author       = {Wei Wang and
                  Jeffrey Bickford and
                  Ilona Murynets and
                  Ramesh Subbaraman and
                  Gokul Singaraju},
  title        = {Detecting Targeted Attacks By Multilayer Deception},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {175--199},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.224},
  doi          = {10.13052/JCSM2245-1439.224},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YanW13,
  author       = {Tan Yan and
                  Guiling Wang},
  title        = {Ivy: Interest-based Data Delivery in {VANET} through Neighbor Caching},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {127--149},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.222},
  doi          = {10.13052/JCSM2245-1439.222},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YanW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YaqubBQ13,
  author       = {Raziq Yaqub and
                  Fahad Butt and
                  Umair Ahmed Qazi},
  title        = {Prevention of Unauthorized Unplugging of Un-attendant Recharging EVs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {63--81},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.213},
  doi          = {10.13052/JCSM2245-1439.213},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YaqubBQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/0005S12,
  author       = {Yi Deng and
                  Sandeep K. Shukla},
  title        = {Vulnerabilities and Countermeasures - {A} Survey on the Cyber Security
                  Issues in the Transmission Subsystem of a Smart Grid},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0005S12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/CaiR12,
  author       = {Lin Cai and
                  Roberto Rojas{-}Cessa},
  title        = {Mitigation of Malware Proliferation in {P2P} Networks using Double-Layer
                  Dynamic Trust {(DDT)} Management Scheme},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Fri, 10 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/CaiR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChenW12,
  author       = {Jing Chen and
                  Marcus Wong},
  title        = {Security Implications and Considerations for Femtocells},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChenW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Comaniciu12,
  author       = {Cristina Comaniciu},
  title        = {On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Comaniciu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/CrescenzoL0P12,
  author       = {Giovanni Di Crescenzo and
                  Yibei Ling and
                  Tao Zhang and
                  Stanley Pietrowicz},
  title        = {Non-Interactive Detection of Malicious Vehicular Network Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/CrescenzoL0P12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DeyRB12,
  author       = {Arnab Dey and
                  Balaji Rajappa and
                  Lakshman Bana},
  title        = {Realization of Interworking in {LTE} Roaming Using a Diameter-Based
                  Interworking Function},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {4},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DeyRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Henry-Labordere12,
  author       = {Arnaud Henry{-}Labord{\`{e}}re},
  title        = {The Number continuity service, Part {I} {GSM} {\textless}-{\textgreater}
                  Satellite phone},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {4},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Henry-Labordere12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KhajuriaA12,
  author       = {Samant Khajuria and
                  Birger Andersen},
  title        = {Authenticated Encryption for Low-Power Reconfigurable Wireless Devices},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KhajuriaA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Koien12,
  author       = {Geir M. K{\o}ien},
  title        = {Mobility and Spatio-Temporal Exposure Control Exposure Control as
                  a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy
                  and Home Control},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {4},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Koien12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MahalleAPP12,
  author       = {Parikshit N. Mahalle and
                  Bayu Anggorojati and
                  Neeli R. Prasad and
                  Ramjee Prasad},
  title        = {Identity Authentication and Capability Based Access Control {(IACAC)}
                  for the Internet of Things},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {4},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MahalleAPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MathurHSC12,
  author       = {Chetan Nanjunda Mathur and
                  Mohamed A. Haleem and
                  K. P. Subbalakshmi and
                  Rajarathnam Chandramouli},
  title        = {Impact of Constraints on the Complexity and Performance of Channel
                  Assignment in Multi-Hop Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/MathurHSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Nayak12,
  author       = {Debabrata Nayak},
  title        = {Understanding the Security, Privacy and Trust Challenges of Cloud
                  Computing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Nayak12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PawarNPOP12,
  author       = {Pranav M. Pawar and
                  Rasmus H. Nielsen and
                  Neeli R. Prasad and
                  Shingo Ohmori and
                  Ramjee Prasad},
  title        = {Behavioural Modelling of {WSN} {MAC} Layer Security Attacks: {A} Sequential
                  {UML} Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PawarNPOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PawarNPOP12a,
  author       = {Pranav M. Pawar and
                  Rasmus H. Nielsen and
                  Neeli R. Prasad and
                  Shingo Ohmori and
                  Ramjee Prasad},
  title        = {Activity Modelling and Comparative Evaluation of {WSN} {MAC} Security
                  Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PawarNPOP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Rajkumar12,
  author       = {Ajay Rajkumar},
  title        = {Evolution of Mobility in Future Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Rajkumar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokalePP12,
  author       = {Vandana Milind Rohokale and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad},
  title        = {Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokalePP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TangeA12,
  author       = {Henrik Tange and
                  Birger Andersen},
  title        = {{SPDH} - {A} Secure Plain Diffie-Hellman Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {2-3},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TangeA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ThuemmlerFBLEK12,
  author       = {Christoph Thuemmler and
                  Lu Fan and
                  William J. Buchanan and
                  Owen Lo and
                  Elias Ekonomou and
                  Abou Sofyane Khedim},
  title        = {E-Health: Chances and Challenges of Distributed, Service oriented
                  Architectures},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ThuemmlerFBLEK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangFP12,
  author       = {Zhenxing Wang and
                  Mable P. Fok and
                  Paul R. Prucnal},
  title        = {Physical Encoding in Optical Layer Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {1},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangFP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}