default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn17.bht:"
@article{DBLP:journals/ijsn/AgnihotriPCM22, author = {Anmol Agnihotri and R. Padmavathi and Santanu Chatterjee and Vinod Kumar Mahor}, title = {Privacy in content-centric networking against side channel attacks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {13--27}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122544}, doi = {10.1504/IJSN.2022.122544}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AgnihotriPCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlshayejiA22, author = {Mohammad H. Alshayeji and Sa'ed Abed}, title = {Enhanced video-on-demand security in cloud computing against insider and outsider threats}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {48--55}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122550}, doi = {10.1504/IJSN.2022.122550}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlshayejiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AlvarezR22, author = {Oscar Danilo Gavil{\'{a}}nez Alvarez and Glen Dario Rodriguez Rafael}, title = {VoIP security auditing model based on {COBIT} 4.1}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {63--76}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123293}, doi = {10.1504/IJSN.2022.123293}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AlvarezR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BhatiaVKA22, author = {Ashutosh Bhatia and Deepak Kumar Vishvakarma and Rekha Kaushik and Ankit Agrawal}, title = {Entropy and likelihood-based detection of {DGA} generated domain names and their families}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {147--192}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050429}, doi = {10.1504/IJSN.2022.10050429}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/BhatiaVKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Boutekkouk22, author = {Fateh Boutekkouk}, title = {A literature review on security-aware design space exploration approaches for embedded systems}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {247--268}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052252}, doi = {10.1504/IJSN.2022.10052252}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Boutekkouk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GaneshPP22, author = {Ponnuru Surya Ganesh and R. Padmavathy and Anil Pinapati}, title = {An efficient scalar multiplication algorithm on Koblitz curves using {\(\tau\)}\({}^{\mbox{3}}\)-NAF}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {240--246}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052251}, doi = {10.1504/IJSN.2022.10052251}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GaneshPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HalloS22, author = {Mar{\'{\i}}a Hallo and Gabriela Suntaxi}, title = {A survey on {SQL} injection attacks, detection and prevention techniques - a tertiary study}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {193--202}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050430}, doi = {10.1504/IJSN.2022.10050430}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HalloS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangGSCC22, author = {Shizhen Huang and Anhua Guo and Kaikai Su and Siyu Chen and Ruiqi Chen}, title = {Implementation of quasi-Newton algorithm on {FPGA} for IoT endpoint devices}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {124--134}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123300}, doi = {10.1504/IJSN.2022.123300}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuangGSCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KherbacheAE22, author = {Meriem Kherbache and Kamal Amroun and David Espes}, title = {A new wrapper feature selection model for anomaly-based intrusion detection systems}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {107--123}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123298}, doi = {10.1504/IJSN.2022.123298}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MahorPC22, author = {Vinod Kumar Mahor and R. Padmavathy and Santanu Chatterjee}, title = {Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through {SIP}}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {39--47}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122547}, doi = {10.1504/IJSN.2022.122547}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MahorPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MasarwehA22, author = {Ala' Masarweh and Jaafer Al{-}Saraireh}, title = {Threat led advanced persistent threat penetration test}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {203--219}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050431}, doi = {10.1504/IJSN.2022.10050431}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MasarwehA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MeloSBNOR22, author = {Wilson S. Melo Jr. and Lucas S. dos Santos and Lucila M. S. Bento and Paulo R. M. Nascimento and Carlos A. R. Oliveira and Ramon R. Rezende}, title = {Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {77--91}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123294}, doi = {10.1504/IJSN.2022.123294}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MeloSBNOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NishaP22, author = {T. N. Nisha and Dhanya Pramod}, title = {Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {269--283}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10051286}, doi = {10.1504/IJSN.2022.10051286}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/NishaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PatilP22, author = {Rachana Yogesh Patil and Yogesh H. Patil}, title = {A provably secure signcryption with proxy re-encryption for smart water grid network}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {231--239}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10045294}, doi = {10.1504/IJSN.2022.10045294}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PatilP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QiuB22, author = {Mingyue Qiu and Zhijie Bi}, title = {Police alarm address recognition and classification based on convolutional neural networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {56--62}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122575}, doi = {10.1504/IJSN.2022.122575}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QiuB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Rababaah22, author = {Aaron Rasheed Rababaah}, title = {Simulated study of the influence of node density on the performance of wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {284--292}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10052246}, doi = {10.1504/IJSN.2022.10052246}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Rababaah22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RehmanWM22, author = {Syed Rameez Rehman and Mudassar Waheed and Ammar Masood}, title = {Security-enhanced Android for an enterprise}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {92--106}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123296}, doi = {10.1504/IJSN.2022.123296}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RehmanWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SalahAZ22, author = {Saeed Salah and Mohammad A. AL{-}Shudeifat and Raid Zaghal}, title = {Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122543}, doi = {10.1504/IJSN.2022.122543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SalahAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanTLW22, author = {Jun Yan and Yupan Tian and Hai Liu and Zhenqiang Wu}, title = {Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {1}, pages = {28--38}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.122545}, doi = {10.1504/IJSN.2022.122545}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanTLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YangWYU22, author = {Xiaoteng Yang and Zhenqiang Wu and Jun Yan and Mubarak Umar}, title = {Network tolerance optimisation to random and target attacks based on percolation theory}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {135--146}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2021.10040383}, doi = {10.1504/IJSN.2021.10040383}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YangWYU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZuoZQY22, author = {Yuan Zuo and Xiaozhou Zhu and Jiangyi Qin and Wen Yao}, title = {Heterogeneous big data fusion in distributed networking systems for anomaly detection and localisation}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {3}, pages = {220--229}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10050428}, doi = {10.1504/IJSN.2022.10050428}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZuoZQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.