Search dblp for Publications

export results for "toc:db/journals/ijisp/ijisp14.bht:"

 download as .bib file

@article{DBLP:journals/ijisp/AgarwalRPA20,
  author       = {Neha Agarwal and
                  Ajay Rana and
                  Jai Prakash Pandey and
                  Amit Agarwal},
  title        = {Secured Sharing of Data in Cloud via Dual Authentication, Dynamic
                  Unidirectional PRE, and {CPABE}},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {44--66},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020010104},
  doi          = {10.4018/IJISP.2020010104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/AgarwalRPA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/AribiL20,
  author       = {Noureddine Aribi and
                  Yahia Lebbah},
  title        = {A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic
                  Protocols},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {1--21},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100101},
  doi          = {10.4018/IJISP.2020100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/AribiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/BesmerWB20,
  author       = {Andrew Besmer and
                  Jason Watson and
                  M. Shane Banks},
  title        = {Investigating User Perceptions of Mobile App Privacy: An Analysis
                  of User-Submitted App Reviews},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {74--91},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100105},
  doi          = {10.4018/IJISP.2020100105},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/BesmerWB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/BeulahP20,
  author       = {J. Rene Beulah and
                  D. Shalini Punithavathani},
  title        = {An Efficient Mixed Attribute Outlier Detection Method for Identifying
                  Network Intrusions},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {115--133},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070107},
  doi          = {10.4018/IJISP.2020070107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/BeulahP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Chatterjee20,
  author       = {Sheshadri Chatterjee},
  title        = {Factors Impacting Behavioral Intention of Users to Adopt IoT In India:
                  From Security and Privacy Perspective},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {92--112},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100106},
  doi          = {10.4018/IJISP.2020100106},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Chatterjee20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/GadoucheZT20,
  author       = {Hania Gadouche and
                  Farah Zoubeyr and
                  Abdelkamel Tari},
  title        = {A Valid and Correct-by-Construction Formal Specification of {RBAC}},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {41--61},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040103},
  doi          = {10.4018/IJISP.2020040103},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/GadoucheZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/GhoshBSP20,
  author       = {Partha Ghosh and
                  Sumit Biswas and
                  Shivam Shakti and
                  Santanu Phadikar},
  title        = {An Improved Intrusion Detection System to Preserve Security in Cloud
                  Environment},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {67--80},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020010105},
  doi          = {10.4018/IJISP.2020010105},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/GhoshBSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/GuptaSBM20,
  author       = {Charu Gupta and
                  Rakesh Kumar Singh and
                  Simran Kaur Bhatia and
                  Amar Kumar Mohapatra},
  title        = {DecaDroid Classification and Characterization of Malicious Behaviour
                  in Android Applications},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {57--73},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100104},
  doi          = {10.4018/IJISP.2020100104},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/GuptaSBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/HaddadiB20,
  author       = {Mohamed Haddadi and
                  Rachid Beghdad},
  title        = {A Confidence Interval Based Filtering Against DDoS Attack in Cloud
                  Environment: {A} Confidence Interval Against DDoS Attack in the Cloud},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {42--56},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100103},
  doi          = {10.4018/IJISP.2020100103},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/HaddadiB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/HannacheB20,
  author       = {Oussama Hannache and
                  Mohamed Chaouki Batouche},
  title        = {Neural Network-Based Approach for Detection and Mitigation of DDoS
                  Attacks in {SDN} Environments},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {50--71},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070104},
  doi          = {10.4018/IJISP.2020070104},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/HannacheB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/HasanVMSC20,
  author       = {Mainul Hasan and
                  Amogh Venkatanarayan and
                  Inder Mohan and
                  Ninni Singh and
                  Gunjan Chhabra},
  title        = {Comparison of Various DoS Algorithm},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {27--43},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020010103},
  doi          = {10.4018/IJISP.2020010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/HasanVMSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/JainK20,
  author       = {Shelendra Kumar Jain and
                  Nishtha Kesswani},
  title        = {IoTP an Efficient Privacy Preserving Scheme for Internet of Things
                  Environment},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {116--142},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040107},
  doi          = {10.4018/IJISP.2020040107},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/JainK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/KaurKG20,
  author       = {Amanpreet Kaur and
                  Padam Kumar and
                  Govind P. Gupta},
  title        = {Improving DV-Hop-Based Localization Algorithms in Wireless Sensor
                  Networks by Considering Only Closest Anchors},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020010101},
  doi          = {10.4018/IJISP.2020010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/KaurKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LZKV20,
  author       = {Mary Shamala L. and
                  G. Zayaraz and
                  Vivekanandan K. and
                  V. Vijayalakshmi},
  title        = {A Tweakable Key Alternating Lightweight Cipher for Internet of Things},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {113--133},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100107},
  doi          = {10.4018/IJISP.2020100107},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LZKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/MajiMS20,
  author       = {Giridhar Maji and
                  Sharmistha Mandal and
                  Soumya Sen},
  title        = {Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {83--101},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040105},
  doi          = {10.4018/IJISP.2020040105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/MajiMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Parameshwarappa20,
  author       = {Pooja Parameshwarappa and
                  Zhiyuan Chen and
                  Akif G{\"{u}}nes Koru},
  title        = {An Effective and Computationally Efficient Approach for Anonymizing
                  Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {72--94},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070105},
  doi          = {10.4018/IJISP.2020070105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Parameshwarappa20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/PenmatsaKM20,
  author       = {Ravi Kiran Varma Penmatsa and
                  Akhila Kalidindi and
                  S. Kumar Reddy Mallidi},
  title        = {Feature Reduction and Optimization of Malware Detection System Using
                  Ant Colony Optimization and Rough Sets},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {95--114},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070106},
  doi          = {10.4018/IJISP.2020070106},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/PenmatsaKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/RathPP20,
  author       = {Mamata Rath and
                  Bibudhendu Pati and
                  Binod Kumar Pattanayak},
  title        = {Manifold Surveillance Issues in Wireless Network and the Secured Protocol},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {1},
  pages        = {16--26},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020010102},
  doi          = {10.4018/IJISP.2020010102},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/RathPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SarnaB20,
  author       = {Geetika Sarna and
                  Mahinder Pal Singh Bhatia},
  title        = {Structure-Based Analysis of Different Categories of Cyberbullying
                  in Dynamic Social Network},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {1--17},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070101},
  doi          = {10.4018/IJISP.2020070101},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/SarnaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SharmaJ20,
  author       = {Dhruti Sharma and
                  Devesh C. Jinwala},
  title        = {Aggregate Searchable Encryption With Result Privacy},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {62--82},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040104},
  doi          = {10.4018/IJISP.2020040104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/SharmaJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/ShylaS20,
  author       = {S. Immaculate Shyla and
                  S. S. Sujatha},
  title        = {An Efficient Automatic Intrusion Detection in Cloud Using Optimized
                  Fuzzy Inference System},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {4},
  pages        = {22--41},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020100102},
  doi          = {10.4018/IJISP.2020100102},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/ShylaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SilvaBB20,
  author       = {Rui Silva and
                  Raul Barbosa and
                  Jorge Bernardino},
  title        = {Intrusion Detection Systems for Mitigating {SQL} Injection Attacks:
                  Review and State-of-Practice},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {20--40},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040102},
  doi          = {10.4018/IJISP.2020040102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/SilvaBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SinghHC20,
  author       = {Khundrakpam Johnson Singh and
                  Janggunlun Haokip and
                  Usham Sanjota Chanu},
  title        = {A Novel Approach to Develop and Deploy Preventive Measures for Different
                  Types of DDoS Attacks},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040101},
  doi          = {10.4018/IJISP.2020040101},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/SinghHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/SubudhiP20,
  author       = {Sharmila Subudhi and
                  Suvasini Panigrahi},
  title        = {Two-Stage Automobile Insurance Fraud Detection by Using Optimized
                  Fuzzy C-Means Clustering and Supervised Learning},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {18--37},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070102},
  doi          = {10.4018/IJISP.2020070102},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/SubudhiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/VyasT20,
  author       = {Pranav Vyas and
                  Bhushan Trivedi},
  title        = {Simulation Experiment of Key Exchange Protocol in Mobile Devices With
                  E-Commerce Application},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {3},
  pages        = {38--49},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020070103},
  doi          = {10.4018/IJISP.2020070103},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/VyasT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/YacoubaOE20,
  author       = {Kouraogo Yacouba and
                  Ghizlane Orhanou and
                  Said Elhajji},
  title        = {Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of
                  {QC-MDPC-} Mceliece Cryptosystem},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {102--115},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJISP.2020040106},
  doi          = {10.4018/IJISP.2020040106},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/YacoubaOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}