Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn17.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AgnihotriPCM22,
  author       = {Anmol Agnihotri and
                  R. Padmavathi and
                  Santanu Chatterjee and
                  Vinod Kumar Mahor},
  title        = {Privacy in content-centric networking against side channel attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {13--27},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122544},
  doi          = {10.1504/IJSN.2022.122544},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AgnihotriPCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlshayejiA22,
  author       = {Mohammad H. Alshayeji and
                  Sa'ed Abed},
  title        = {Enhanced video-on-demand security in cloud computing against insider
                  and outsider threats},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {48--55},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122550},
  doi          = {10.1504/IJSN.2022.122550},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlshayejiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AlvarezR22,
  author       = {Oscar Danilo Gavil{\'{a}}nez Alvarez and
                  Glen Dario Rodriguez Rafael},
  title        = {VoIP security auditing model based on {COBIT} 4.1},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {63--76},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123293},
  doi          = {10.1504/IJSN.2022.123293},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlvarezR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BhatiaVKA22,
  author       = {Ashutosh Bhatia and
                  Deepak Kumar Vishvakarma and
                  Rekha Kaushik and
                  Ankit Agrawal},
  title        = {Entropy and likelihood-based detection of {DGA} generated domain names
                  and their families},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {147--192},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050429},
  doi          = {10.1504/IJSN.2022.10050429},
  timestamp    = {Mon, 07 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/BhatiaVKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Boutekkouk22,
  author       = {Fateh Boutekkouk},
  title        = {A literature review on security-aware design space exploration approaches
                  for embedded systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {247--268},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052252},
  doi          = {10.1504/IJSN.2022.10052252},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Boutekkouk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GaneshPP22,
  author       = {Ponnuru Surya Ganesh and
                  R. Padmavathy and
                  Anil Pinapati},
  title        = {An efficient scalar multiplication algorithm on Koblitz curves using
                  {\(\tau\)}\({}^{\mbox{3}}\)-NAF},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {240--246},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052251},
  doi          = {10.1504/IJSN.2022.10052251},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GaneshPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HalloS22,
  author       = {Mar{\'{\i}}a Hallo and
                  Gabriela Suntaxi},
  title        = {A survey on {SQL} injection attacks, detection and prevention techniques
                  - a tertiary study},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {193--202},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050430},
  doi          = {10.1504/IJSN.2022.10050430},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HalloS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangGSCC22,
  author       = {Shizhen Huang and
                  Anhua Guo and
                  Kaikai Su and
                  Siyu Chen and
                  Ruiqi Chen},
  title        = {Implementation of quasi-Newton algorithm on {FPGA} for IoT endpoint
                  devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {124--134},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123300},
  doi          = {10.1504/IJSN.2022.123300},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangGSCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KherbacheAE22,
  author       = {Meriem Kherbache and
                  Kamal Amroun and
                  David Espes},
  title        = {A new wrapper feature selection model for anomaly-based intrusion
                  detection systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {107--123},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123298},
  doi          = {10.1504/IJSN.2022.123298},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MahorPC22,
  author       = {Vinod Kumar Mahor and
                  R. Padmavathy and
                  Santanu Chatterjee},
  title        = {Chebyshev chaotic map-based efficient authentication scheme for secure
                  access of VoIP services through {SIP}},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {39--47},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122547},
  doi          = {10.1504/IJSN.2022.122547},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MahorPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MasarwehA22,
  author       = {Ala' Masarweh and
                  Jaafer Al{-}Saraireh},
  title        = {Threat led advanced persistent threat penetration test},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {203--219},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050431},
  doi          = {10.1504/IJSN.2022.10050431},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MasarwehA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MeloSBNOR22,
  author       = {Wilson S. Melo Jr. and
                  Lucas S. dos Santos and
                  Lucila M. S. Bento and
                  Paulo R. M. Nascimento and
                  Carlos A. R. Oliveira and
                  Ramon R. Rezende},
  title        = {Using blockchains to protect critical infrastructures: a comparison
                  between Ethereum and Hyperledger Fabric},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {77--91},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123294},
  doi          = {10.1504/IJSN.2022.123294},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MeloSBNOR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NishaP22,
  author       = {T. N. Nisha and
                  Dhanya Pramod},
  title        = {Network event-based model using finite state machine to detect and
                  predict insider intrusion on enterprise networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {269--283},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10051286},
  doi          = {10.1504/IJSN.2022.10051286},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/NishaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PatilP22,
  author       = {Rachana Yogesh Patil and
                  Yogesh H. Patil},
  title        = {A provably secure signcryption with proxy re-encryption for smart
                  water grid network},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {231--239},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10045294},
  doi          = {10.1504/IJSN.2022.10045294},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PatilP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QiuB22,
  author       = {Mingyue Qiu and
                  Zhijie Bi},
  title        = {Police alarm address recognition and classification based on convolutional
                  neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {56--62},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122575},
  doi          = {10.1504/IJSN.2022.122575},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QiuB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Rababaah22,
  author       = {Aaron Rasheed Rababaah},
  title        = {Simulated study of the influence of node density on the performance
                  of wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {284--292},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10052246},
  doi          = {10.1504/IJSN.2022.10052246},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Rababaah22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RehmanWM22,
  author       = {Syed Rameez Rehman and
                  Mudassar Waheed and
                  Ammar Masood},
  title        = {Security-enhanced Android for an enterprise},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {92--106},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123296},
  doi          = {10.1504/IJSN.2022.123296},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RehmanWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SalahAZ22,
  author       = {Saeed Salah and
                  Mohammad A. AL{-}Shudeifat and
                  Raid Zaghal},
  title        = {Desktop and mobile operating system fingerprinting based on IPv6 protocol
                  using machine learning algorithms},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {1--12},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122543},
  doi          = {10.1504/IJSN.2022.122543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SalahAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanTLW22,
  author       = {Jun Yan and
                  Yupan Tian and
                  Hai Liu and
                  Zhenqiang Wu},
  title        = {Uncertain graph generating approach based on differential privacy
                  for preserving link relationship of social networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {1},
  pages        = {28--38},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.122545},
  doi          = {10.1504/IJSN.2022.122545},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanTLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YangWYU22,
  author       = {Xiaoteng Yang and
                  Zhenqiang Wu and
                  Jun Yan and
                  Mubarak Umar},
  title        = {Network tolerance optimisation to random and target attacks based
                  on percolation theory},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {135--146},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2021.10040383},
  doi          = {10.1504/IJSN.2021.10040383},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YangWYU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZuoZQY22,
  author       = {Yuan Zuo and
                  Xiaozhou Zhu and
                  Jiangyi Qin and
                  Wen Yao},
  title        = {Heterogeneous big data fusion in distributed networking systems for
                  anomaly detection and localisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {3},
  pages        = {220--229},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10050428},
  doi          = {10.1504/IJSN.2022.10050428},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZuoZQY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}