default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure4.bht:"
@article{DBLP:journals/isecure/AfzaliNA12, author = {Hammad Afzali and Hamed Nemati and Reza Azmi}, title = {Private Key based query on encrypted data}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {41--50}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.5}, doi = {10.22042/ISECURE.2015.4.1.5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AfzaliNA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/BaraniA12, author = {Fatemeh Barani and Mahdi Abadi}, title = {BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {25--39}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.4}, doi = {10.22042/ISECURE.2015.4.1.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/BaraniA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/FarhatDGA12, author = {Farshid Farhat and Abolfazl Diyanat and Shahrokh Ghaemmaghami and Mohammad Reza Aref}, title = {Eigenvalues-based {LSB} steganalysis}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {97--106}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.1}, doi = {10.22042/ISECURE.2013.4.2.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/FarhatDGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GhafariVM12, author = {Vahid Amin Ghafari and Ali Vardasbi and Javad Mohajeri}, title = {Cryptanalysis of {GSM} encryption algorithm {A5/1}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {107--114}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.2}, doi = {10.22042/ISECURE.2013.4.2.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GhafariVM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/HooshmandEA12, author = {Reza Hooshmand and Taraneh Eghlidos and Mohammad Reza Aref}, title = {Improving the Rao-Nam secret key cryptosystem using regular {EDF-QC-LDPC} codes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {3--14}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.2}, doi = {10.22042/ISECURE.2015.4.1.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/HooshmandEA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Jalili12, author = {Rasool Jalili}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.1}, doi = {10.22042/ISECURE.2015.4.1.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Jalili12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Jalili12a, author = {Rasool Jalili}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {95--96}, year = {2012}, url = {https://doi.org/10.22042/isecure.2012.4.2.7}, doi = {10.22042/ISECURE.2012.4.2.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Jalili12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MabutoV12, author = {Enos K. Mabuto and Hein S. Venter}, title = {Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {137--150}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.5}, doi = {10.22042/ISECURE.2013.4.2.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MabutoV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MehrnejadBHT12, author = {Maryam Mehrnejad and Abbas Ghaemi Bafghi and Ahad Harati and Ehsan Toreini}, title = {{SEIMCHA:} a new semantic image {CAPTCHA} using geometric transformations}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {63--76}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.7}, doi = {10.22042/ISECURE.2015.4.1.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MehrnejadBHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MohammadiH12, author = {Somayyeh Mohammadi and Ahmad Hakimi}, title = {A chaos-based video watermarking algorithm}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {77--86}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.8}, doi = {10.22042/ISECURE.2015.4.1.8}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MohammadiH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ShakeriB12, author = {Hassan Shakeri and Abbas Ghaemi Bafghi}, title = {A confidence-aware interval-based trust model}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {151--165}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.6}, doi = {10.22042/ISECURE.2013.4.2.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ShakeriB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/TaheriM12, author = {Motahareh Taheri and Saeed Mozaffari}, title = {Improving security of double random phase encoding with chaos theory using fractal images}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {115--124}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.3}, doi = {10.22042/ISECURE.2013.4.2.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/TaheriM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/VardasbiSM12, author = {Ali Vardasbi and Mahmoud Salmasizadeh and Javad Mohajeri}, title = {On the multi {\_} chi-square tests and their data complexity}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {15--24}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.3}, doi = {10.22042/ISECURE.2015.4.1.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/VardasbiSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/YahyazadehA12, author = {Moosa Yahyazadeh and Mahdi Abadi}, title = {BotOnus: an online unsupervised method for Botnet detection}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {1}, pages = {51--62}, year = {2012}, url = {https://doi.org/10.22042/isecure.2015.4.1.6}, doi = {10.22042/ISECURE.2015.4.1.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/YahyazadehA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ZaliH012, author = {Zeinab Zali and Massoud Reza Hashemi and Hossein Saidi}, title = {Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {4}, number = {2}, pages = {125--136}, year = {2012}, url = {https://doi.org/10.22042/isecure.2013.4.2.4}, doi = {10.22042/ISECURE.2013.4.2.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ZaliH012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.