default search action
Search dblp for Publications
export results for "toc:db/journals/ijisp/ijisp14.bht:"
@article{DBLP:journals/ijisp/AgarwalRPA20, author = {Neha Agarwal and Ajay Rana and Jai Prakash Pandey and Amit Agarwal}, title = {Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and {CPABE}}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {1}, pages = {44--66}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020010104}, doi = {10.4018/IJISP.2020010104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/AgarwalRPA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/AribiL20, author = {Noureddine Aribi and Yahia Lebbah}, title = {A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {1--21}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100101}, doi = {10.4018/IJISP.2020100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/AribiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/BesmerWB20, author = {Andrew Besmer and Jason Watson and M. Shane Banks}, title = {Investigating User Perceptions of Mobile App Privacy: An Analysis of User-Submitted App Reviews}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {74--91}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100105}, doi = {10.4018/IJISP.2020100105}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/BesmerWB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/BeulahP20, author = {J. Rene Beulah and D. Shalini Punithavathani}, title = {An Efficient Mixed Attribute Outlier Detection Method for Identifying Network Intrusions}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {115--133}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070107}, doi = {10.4018/IJISP.2020070107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/BeulahP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Chatterjee20, author = {Sheshadri Chatterjee}, title = {Factors Impacting Behavioral Intention of Users to Adopt IoT In India: From Security and Privacy Perspective}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {92--112}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100106}, doi = {10.4018/IJISP.2020100106}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Chatterjee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GadoucheZT20, author = {Hania Gadouche and Farah Zoubeyr and Abdelkamel Tari}, title = {A Valid and Correct-by-Construction Formal Specification of {RBAC}}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {41--61}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040103}, doi = {10.4018/IJISP.2020040103}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/GadoucheZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GhoshBSP20, author = {Partha Ghosh and Sumit Biswas and Shivam Shakti and Santanu Phadikar}, title = {An Improved Intrusion Detection System to Preserve Security in Cloud Environment}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {1}, pages = {67--80}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020010105}, doi = {10.4018/IJISP.2020010105}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/GhoshBSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GuptaSBM20, author = {Charu Gupta and Rakesh Kumar Singh and Simran Kaur Bhatia and Amar Kumar Mohapatra}, title = {DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {57--73}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100104}, doi = {10.4018/IJISP.2020100104}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/GuptaSBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/HaddadiB20, author = {Mohamed Haddadi and Rachid Beghdad}, title = {A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: {A} Confidence Interval Against DDoS Attack in the Cloud}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {42--56}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100103}, doi = {10.4018/IJISP.2020100103}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/HaddadiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/HannacheB20, author = {Oussama Hannache and Mohamed Chaouki Batouche}, title = {Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in {SDN} Environments}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {50--71}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070104}, doi = {10.4018/IJISP.2020070104}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/HannacheB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/HasanVMSC20, author = {Mainul Hasan and Amogh Venkatanarayan and Inder Mohan and Ninni Singh and Gunjan Chhabra}, title = {Comparison of Various DoS Algorithm}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {1}, pages = {27--43}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020010103}, doi = {10.4018/IJISP.2020010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/HasanVMSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/JainK20, author = {Shelendra Kumar Jain and Nishtha Kesswani}, title = {IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {116--142}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040107}, doi = {10.4018/IJISP.2020040107}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/JainK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/KaurKG20, author = {Amanpreet Kaur and Padam Kumar and Govind P. Gupta}, title = {Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {1}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020010101}, doi = {10.4018/IJISP.2020010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/KaurKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LZKV20, author = {Mary Shamala L. and G. Zayaraz and Vivekanandan K. and V. Vijayalakshmi}, title = {A Tweakable Key Alternating Lightweight Cipher for Internet of Things}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {113--133}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100107}, doi = {10.4018/IJISP.2020100107}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LZKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/MajiMS20, author = {Giridhar Maji and Sharmistha Mandal and Soumya Sen}, title = {Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {83--101}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040105}, doi = {10.4018/IJISP.2020040105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/MajiMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Parameshwarappa20, author = {Pooja Parameshwarappa and Zhiyuan Chen and Akif G{\"{u}}nes Koru}, title = {An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {72--94}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070105}, doi = {10.4018/IJISP.2020070105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Parameshwarappa20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/PenmatsaKM20, author = {Ravi Kiran Varma Penmatsa and Akhila Kalidindi and S. Kumar Reddy Mallidi}, title = {Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {95--114}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070106}, doi = {10.4018/IJISP.2020070106}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/PenmatsaKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/RathPP20, author = {Mamata Rath and Bibudhendu Pati and Binod Kumar Pattanayak}, title = {Manifold Surveillance Issues in Wireless Network and the Secured Protocol}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {1}, pages = {16--26}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020010102}, doi = {10.4018/IJISP.2020010102}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/RathPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SarnaB20, author = {Geetika Sarna and Mahinder Pal Singh Bhatia}, title = {Structure-Based Analysis of Different Categories of Cyberbullying in Dynamic Social Network}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {1--17}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070101}, doi = {10.4018/IJISP.2020070101}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/SarnaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SharmaJ20, author = {Dhruti Sharma and Devesh C. Jinwala}, title = {Aggregate Searchable Encryption With Result Privacy}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {62--82}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040104}, doi = {10.4018/IJISP.2020040104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/SharmaJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/ShylaS20, author = {S. Immaculate Shyla and S. S. Sujatha}, title = {An Efficient Automatic Intrusion Detection in Cloud Using Optimized Fuzzy Inference System}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {4}, pages = {22--41}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020100102}, doi = {10.4018/IJISP.2020100102}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/ShylaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SilvaBB20, author = {Rui Silva and Raul Barbosa and Jorge Bernardino}, title = {Intrusion Detection Systems for Mitigating {SQL} Injection Attacks: Review and State-of-Practice}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {20--40}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040102}, doi = {10.4018/IJISP.2020040102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/SilvaBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SinghHC20, author = {Khundrakpam Johnson Singh and Janggunlun Haokip and Usham Sanjota Chanu}, title = {A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040101}, doi = {10.4018/IJISP.2020040101}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/SinghHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/SubudhiP20, author = {Sharmila Subudhi and Suvasini Panigrahi}, title = {Two-Stage Automobile Insurance Fraud Detection by Using Optimized Fuzzy C-Means Clustering and Supervised Learning}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {18--37}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070102}, doi = {10.4018/IJISP.2020070102}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/SubudhiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/VyasT20, author = {Pranav Vyas and Bhushan Trivedi}, title = {Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {3}, pages = {38--49}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020070103}, doi = {10.4018/IJISP.2020070103}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/VyasT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/YacoubaOE20, author = {Kouraogo Yacouba and Ghizlane Orhanou and Said Elhajji}, title = {Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of {QC-MDPC-} Mceliece Cryptosystem}, journal = {Int. J. Inf. Secur. Priv.}, volume = {14}, number = {2}, pages = {102--115}, year = {2020}, url = {https://doi.org/10.4018/IJISP.2020040106}, doi = {10.4018/IJISP.2020040106}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/YacoubaOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.