default search action
Search dblp for Publications
export results for "toc:db/journals/isci/isci321.bht:"
@article{DBLP:journals/isci/Aggarwal15, author = {Manish Aggarwal}, title = {On learning of weights through preferences}, journal = {Inf. Sci.}, volume = {321}, pages = {90--102}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.034}, doi = {10.1016/J.INS.2015.05.034}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Aggarwal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AkramMS15, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron}, title = {A novel consumer-centric card management architecture and potential security issues}, journal = {Inf. Sci.}, volume = {321}, pages = {150--161}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2014.12.049}, doi = {10.1016/J.INS.2014.12.049}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AkramMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AndreoliniCM15, author = {Mauro Andreolini and Michele Colajanni and Mirco Marchetti}, title = {A collaborative framework for intrusion detection in mobile networks}, journal = {Inf. Sci.}, volume = {321}, pages = {179--192}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.03.025}, doi = {10.1016/J.INS.2015.03.025}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AndreoliniCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenLS15, author = {Patrick Shicheng Chen and Shu{-}Chiung Lin and Chien{-}Hsing Sun}, title = {Simple and effective method for detecting abnormal internet behaviors of mobile devices}, journal = {Inf. Sci.}, volume = {321}, pages = {193--204}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.04.035}, doi = {10.1016/J.INS.2015.04.035}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChinLT15, author = {Wen{-}Long William Chin and Trong Nghia Le and Chun{-}Lin Tseng}, title = {Authentication scheme for mobile {OFDM} based on security information technology of physical layer over time-variant and multipath fading channels}, journal = {Inf. Sci.}, volume = {321}, pages = {238--249}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.01.040}, doi = {10.1016/J.INS.2015.01.040}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChinLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CoceaM15, author = {Mihaela Cocea and George D. Magoulas}, title = {Participatory Learner Modelling Design: {A} methodology for iterative learner models development}, journal = {Inf. Sci.}, volume = {321}, pages = {48--70}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.032}, doi = {10.1016/J.INS.2015.05.032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CoceaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CuencaOSC15, author = {{\'{A}}ngel Cuenca and Unnati Ojha and Juli{\'{a}}n Salt and Mo{-}Yuen Chow}, title = {A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System}, journal = {Inf. Sci.}, volume = {321}, pages = {31--47}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.035}, doi = {10.1016/J.INS.2015.05.035}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/CuencaOSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/FortS15, author = {Marta Fort and Joan Antoni Sellar{\`{e}}s}, title = {Common influence region problems}, journal = {Inf. Sci.}, volume = {321}, pages = {116--135}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.038}, doi = {10.1016/J.INS.2015.05.038}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/FortS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GomezCHG15, author = {Rafaela Osuna G{\'{o}}mez and Yurilev Chalco{-}Cano and Beatriz Hern{\'{a}}ndez{-}Jim{\'{e}}nez and Gabriel Ruiz Garz{\'{o}}n}, title = {Optimality conditions for generalized differentiable interval-valued functions}, journal = {Inf. Sci.}, volume = {321}, pages = {136--146}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.039}, doi = {10.1016/J.INS.2015.05.039}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/GomezCHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HeKC15, author = {Debiao He and Neeraj Kumar and Naveen K. Chilamkurti}, title = {A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks}, journal = {Inf. Sci.}, volume = {321}, pages = {263--277}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.02.010}, doi = {10.1016/J.INS.2015.02.010}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HeKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LeeCC15, author = {Jen{-}Chun Lee and Chien{-}Ping Chang and Wei{-}Kuei Chen}, title = {Detection of copy-move image forgery using histogram of orientated gradients}, journal = {Inf. Sci.}, volume = {321}, pages = {250--262}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.03.009}, doi = {10.1016/J.INS.2015.03.009}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LeeCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Li15a, author = {Wenye Li}, title = {Visualizing network communities with a semi-definite programming method}, journal = {Inf. Sci.}, volume = {321}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.037}, doi = {10.1016/J.INS.2015.05.037}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Li15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZZ15, author = {Deqing Li and Wenyi Zeng and Yibin Zhao}, title = {Note on distance measure of hesitant fuzzy sets}, journal = {Inf. Sci.}, volume = {321}, pages = {103--115}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.03.076}, doi = {10.1016/J.INS.2015.03.076}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/OnievaHOPZ15, author = {Enrique Onieva and Unai Hern{\'{a}}ndez{-}Jayo and Eneko Osaba and Asier Perallos and Xiao Zhang}, title = {A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving}, journal = {Inf. Sci.}, volume = {321}, pages = {14--30}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.036}, doi = {10.1016/J.INS.2015.05.036}, timestamp = {Tue, 11 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/OnievaHOPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/RiosCL15, author = {Ruben Rios and Jorge Cu{\'{e}}llar and Javier L{\'{o}}pez}, title = {Probabilistic receiver-location privacy protection in wireless sensor networks}, journal = {Inf. Sci.}, volume = {321}, pages = {205--223}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.01.016}, doi = {10.1016/J.INS.2015.01.016}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/RiosCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SunHCWLW15, author = {Hung{-}Min Sun and Bing{-}Zhe He and Chien{-}Ming Chen and Tsu{-}Yang Wu and Chia{-}Hsien Lin and Huaxiong Wang}, title = {A provable authenticated group key agreement protocol for mobile environment}, journal = {Inf. Sci.}, volume = {321}, pages = {224--237}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.01.037}, doi = {10.1016/J.INS.2015.01.037}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SunHCWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLSVC15, author = {Shiuh{-}Jeng Wang and Jigang Liu and Taeshik Shon and Binod Vaidya and Yeong{-}Sheng Chen}, title = {Security and privacy information technologies and applications for wireless pervasive computing environments}, journal = {Inf. Sci.}, volume = {321}, pages = {147--149}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.07.037}, doi = {10.1016/J.INS.2015.07.037}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangLSVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangMS15, author = {Kefeng Wang and Yi Mu and Willy Susilo}, title = {Identity-based quotable ring signature}, journal = {Inf. Sci.}, volume = {321}, pages = {71--89}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.033}, doi = {10.1016/J.INS.2015.05.033}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangWWQ15, author = {Ding Wang and Nan Wang and Ping Wang and Sihan Qing}, title = {Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity}, journal = {Inf. Sci.}, volume = {321}, pages = {162--178}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.03.070}, doi = {10.1016/J.INS.2015.03.070}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangWWQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.