Search dblp for Publications

export results for "toc:db/journals/isci/isci321.bht:"

 download as .bib file

@article{DBLP:journals/isci/Aggarwal15,
  author       = {Manish Aggarwal},
  title        = {On learning of weights through preferences},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {90--102},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.034},
  doi          = {10.1016/J.INS.2015.05.034},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Aggarwal15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AkramMS15,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A novel consumer-centric card management architecture and potential
                  security issues},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {150--161},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2014.12.049},
  doi          = {10.1016/J.INS.2014.12.049},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AkramMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AndreoliniCM15,
  author       = {Mauro Andreolini and
                  Michele Colajanni and
                  Mirco Marchetti},
  title        = {A collaborative framework for intrusion detection in mobile networks},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {179--192},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.03.025},
  doi          = {10.1016/J.INS.2015.03.025},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AndreoliniCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenLS15,
  author       = {Patrick Shicheng Chen and
                  Shu{-}Chiung Lin and
                  Chien{-}Hsing Sun},
  title        = {Simple and effective method for detecting abnormal internet behaviors
                  of mobile devices},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {193--204},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.04.035},
  doi          = {10.1016/J.INS.2015.04.035},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChinLT15,
  author       = {Wen{-}Long William Chin and
                  Trong Nghia Le and
                  Chun{-}Lin Tseng},
  title        = {Authentication scheme for mobile {OFDM} based on security information
                  technology of physical layer over time-variant and multipath fading
                  channels},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {238--249},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.01.040},
  doi          = {10.1016/J.INS.2015.01.040},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChinLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CoceaM15,
  author       = {Mihaela Cocea and
                  George D. Magoulas},
  title        = {Participatory Learner Modelling Design: {A} methodology for iterative
                  learner models development},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {48--70},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.032},
  doi          = {10.1016/J.INS.2015.05.032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/CoceaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CuencaOSC15,
  author       = {{\'{A}}ngel Cuenca and
                  Unnati Ojha and
                  Juli{\'{a}}n Salt and
                  Mo{-}Yuen Chow},
  title        = {A non-uniform multi-rate control strategy for a Markov chain-driven
                  Networked Control System},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {31--47},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.035},
  doi          = {10.1016/J.INS.2015.05.035},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/CuencaOSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/FortS15,
  author       = {Marta Fort and
                  Joan Antoni Sellar{\`{e}}s},
  title        = {Common influence region problems},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {116--135},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.038},
  doi          = {10.1016/J.INS.2015.05.038},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/FortS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GomezCHG15,
  author       = {Rafaela Osuna G{\'{o}}mez and
                  Yurilev Chalco{-}Cano and
                  Beatriz Hern{\'{a}}ndez{-}Jim{\'{e}}nez and
                  Gabriel Ruiz Garz{\'{o}}n},
  title        = {Optimality conditions for generalized differentiable interval-valued
                  functions},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {136--146},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.039},
  doi          = {10.1016/J.INS.2015.05.039},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/GomezCHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HeKC15,
  author       = {Debiao He and
                  Neeraj Kumar and
                  Naveen K. Chilamkurti},
  title        = {A secure temporal-credential-based mutual authentication and key agreement
                  scheme with pseudo identity for wireless sensor networks},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {263--277},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.02.010},
  doi          = {10.1016/J.INS.2015.02.010},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HeKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LeeCC15,
  author       = {Jen{-}Chun Lee and
                  Chien{-}Ping Chang and
                  Wei{-}Kuei Chen},
  title        = {Detection of copy-move image forgery using histogram of orientated
                  gradients},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {250--262},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.03.009},
  doi          = {10.1016/J.INS.2015.03.009},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LeeCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Li15a,
  author       = {Wenye Li},
  title        = {Visualizing network communities with a semi-definite programming method},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.037},
  doi          = {10.1016/J.INS.2015.05.037},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/Li15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZZ15,
  author       = {Deqing Li and
                  Wenyi Zeng and
                  Yibin Zhao},
  title        = {Note on distance measure of hesitant fuzzy sets},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {103--115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.03.076},
  doi          = {10.1016/J.INS.2015.03.076},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/OnievaHOPZ15,
  author       = {Enrique Onieva and
                  Unai Hern{\'{a}}ndez{-}Jayo and
                  Eneko Osaba and
                  Asier Perallos and
                  Xiao Zhang},
  title        = {A multi-objective evolutionary algorithm for the tuning of fuzzy rule
                  bases for uncoordinated intersections in autonomous driving},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {14--30},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.036},
  doi          = {10.1016/J.INS.2015.05.036},
  timestamp    = {Tue, 11 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/OnievaHOPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RiosCL15,
  author       = {Ruben Rios and
                  Jorge Cu{\'{e}}llar and
                  Javier L{\'{o}}pez},
  title        = {Probabilistic receiver-location privacy protection in wireless sensor
                  networks},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {205--223},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.01.016},
  doi          = {10.1016/J.INS.2015.01.016},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/RiosCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SunHCWLW15,
  author       = {Hung{-}Min Sun and
                  Bing{-}Zhe He and
                  Chien{-}Ming Chen and
                  Tsu{-}Yang Wu and
                  Chia{-}Hsien Lin and
                  Huaxiong Wang},
  title        = {A provable authenticated group key agreement protocol for mobile environment},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {224--237},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.01.037},
  doi          = {10.1016/J.INS.2015.01.037},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SunHCWLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLSVC15,
  author       = {Shiuh{-}Jeng Wang and
                  Jigang Liu and
                  Taeshik Shon and
                  Binod Vaidya and
                  Yeong{-}Sheng Chen},
  title        = {Security and privacy information technologies and applications for
                  wireless pervasive computing environments},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {147--149},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.07.037},
  doi          = {10.1016/J.INS.2015.07.037},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangLSVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangMS15,
  author       = {Kefeng Wang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Identity-based quotable ring signature},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {71--89},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.05.033},
  doi          = {10.1016/J.INS.2015.05.033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWWQ15,
  author       = {Ding Wang and
                  Nan Wang and
                  Ping Wang and
                  Sihan Qing},
  title        = {Preserving privacy for free: Efficient and provably secure two-factor
                  authentication scheme with user anonymity},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {162--178},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.03.070},
  doi          = {10.1016/J.INS.2015.03.070},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangWWQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}