Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf14.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/CaiQLCLWYW22,
  author       = {Guiyan Cai and
                  Liang Qu and
                  Yongdong Li and
                  Guoan Cheng and
                  Xin Lu and
                  Yiqi Wang and
                  Fengqin Yao and
                  Shengke Wang},
  title        = {Semisupervised Surveillance Video Character Extraction and Recognition
                  With Attentional Learning Multiframe Fusion},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315745},
  doi          = {10.4018/IJDCF.315745},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaiQLCLWYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/CaiTZXF22,
  author       = {Zengyu Cai and
                  Chunchen Tan and
                  Jianwei Zhang and
                  Tengteng Xiao and
                  Yuan Feng},
  title        = {An Unhealthy Webpage Discovery System Based on Convolutional Neural
                  Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315614},
  doi          = {10.4018/IJDCF.315614},
  timestamp    = {Wed, 04 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/CaiTZXF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenHZXLX22,
  author       = {Wan Chen and
                  Daojun Han and
                  Lei Zhang and
                  Qi Xiao and
                  Qiuyue Li and
                  Hongzhen Xiang},
  title        = {A Model Study on Hierarchical Assisted Exploration of {RBAC}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302871},
  doi          = {10.4018/IJDCF.302871},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenHZXLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuaLJ22,
  author       = {Ye Hua and
                  Qu Xi Long and
                  Li Zhen Jin},
  title        = {Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302879},
  doi          = {10.4018/IJDCF.302879},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuaLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/JiangZLLSWQL22,
  author       = {Wenqian Jiang and
                  Ce Zhang and
                  Di Liu and
                  Kaiwei Liu and
                  Zhichao Sun and
                  Jianyuan Wang and
                  Zhongyin Qiu and
                  Weigong Lv},
  title        = {{SRGM} Decision Model Considering Cost-Reliability},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302873},
  doi          = {10.4018/IJDCF.302873},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/JiangZLLSWQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KaradshehAAAA22,
  author       = {Louay Karadsheh and
                  Haroun Alryalat and
                  Ja'far Alqatawna and
                  Samer Fawaz Alhawari and
                  Mufleh Amin Al{-}Jarrah},
  title        = {The Impact of Social Engineer Attack Phases on Improved Security Countermeasures:
                  Social Engineer Involvement as Mediating Variable},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {1},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.286762},
  doi          = {10.4018/IJDCF.286762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KaradshehAAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiangZWY22,
  author       = {Xiubo Liang and
                  Yu Zhao and
                  Junhan Wu and
                  Keting Yin},
  title        = {A Privacy Protection Scheme for Cross-Chain Transactions Based on
                  Group Signature and Relay Chain},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302876},
  doi          = {10.4018/IJDCF.302876},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiangZWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuZLXZW22,
  author       = {Shannan Liu and
                  Ronghua Zhang and
                  Changzheng Liu and
                  Chenxi Xu and
                  Jie Zhou and
                  Jiaojiao Wang},
  title        = {Improvement of the {PBFT} Algorithm Based on Grouping and Reputation
                  Value Voting},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315615},
  doi          = {10.4018/IJDCF.315615},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuZLXZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangGWZL22,
  author       = {Jing Wang and
                  Jianhou Gan and
                  Jun Wang and
                  Juxiang Zhou and
                  Zeguang Lu},
  title        = {Face Anonymity Based on Facial Pose Consistency},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--12},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302872},
  doi          = {10.4018/IJDCF.302872},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangGWZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangWPZL22,
  author       = {Junchao Wang and
                  Jin Wei and
                  Jianmin Pang and
                  Fan Zhang and
                  Shunbin Li},
  title        = {Security Enhancement Through Compiler-Assisted Software Diversity
                  With Deep Reinforcement Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302878},
  doi          = {10.4018/IJDCF.302878},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangWPZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XuCTWGY22,
  author       = {Dawei Xu and
                  Tianxin Chen and
                  Zhonghua Tan and
                  Fudong Wu and
                  Jiaqi Gao and
                  Yunfan Yang},
  title        = {Web Vulnerability Detection Analyzer Based on Python},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--17},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302875},
  doi          = {10.4018/IJDCF.302875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XuCTWGY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuZZSLM22,
  author       = {Runde Yu and
                  Xianwei Zhang and
                  Yimeng Zhang and
                  Jianfeng Song and
                  Kang Liu and
                  Qiguang Miao},
  title        = {Design and Implementation of Identity Verification Software Based
                  on Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315796},
  doi          = {10.4018/IJDCF.315796},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuZZSLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZangSWYXL22,
  author       = {Dongmei Zang and
                  Xinlei Sheng and
                  Liya Wang and
                  Aimin Yang and
                  Tao Xue and
                  Jie Li},
  title        = {Research and Application of Warship Multiattribute Threat Assessment
                  Based on Improved {TOPSIS} Gray Association Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315288},
  doi          = {10.4018/IJDCF.315288},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZangSWYXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZengYWKF22,
  author       = {Chunyan Zeng and
                  Yao Yang and
                  Zhifeng Wang and
                  Shuai Kong and
                  Shixiong Feng},
  title        = {Audio Tampering Forensics Based on Representation Learning of {ENF}
                  Phase Sequence},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {1},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302894},
  doi          = {10.4018/IJDCF.302894},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZengYWKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangCZ22,
  author       = {Fan Zhang and
                  Wei Chen and
                  Yongqiong Zhu},
  title        = {Golden Eye: An OS-Independent Algorithm for Recovering Files From
                  Hard-Disk Raw Images},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {3},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.315793},
  doi          = {10.4018/IJDCF.315793},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangLY22,
  author       = {Shaobo Zhang and
                  Yuhang Liu and
                  Dequan Yang},
  title        = {A Novel {IDS} Securing Industrial Control System of Critical Infrastructure
                  Using Deception Technology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302874},
  doi          = {10.4018/IJDCF.302874},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhangPYC22,
  author       = {Ran Zhang and
                  Zhihan Pan and
                  Yifeng Yin and
                  Zengyu Cai},
  title        = {A Model of Network Security Situation Assessment Based on {BPNN} Optimized
                  by {SAA-SSA}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {14},
  number       = {2},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijdcf.302877},
  doi          = {10.4018/IJDCF.302877},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhangPYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}