default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp23.bht:"
@article{DBLP:journals/isjgp/Angelopoulou14, author = {Olga Angelopoulou}, title = {Introduction to the Special Issue}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {123--124}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.987063}, doi = {10.1080/19393555.2014.987063}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Angelopoulou14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/CanforaMVN14, author = {Gerardo Canfora and Francesco Mercaldo and Corrado Aaron Visaggio and Paolo Di Notte}, title = {Metamorphic Malware Detection Using Code Metrics}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {57--67}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931487}, doi = {10.1080/19393555.2014.931487}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/CanforaMVN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/CharitoudiB14, author = {Konstantinia Charitoudi and Andrew J. C. Blyth}, title = {An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {125--136}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931492}, doi = {10.1080/19393555.2014.931492}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/CharitoudiB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Chasser14, author = {John Mark Chasser}, title = {IPv6 Implementation Decisions for an Organization}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {100--106}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.943378}, doi = {10.1080/19393555.2014.943378}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Chasser14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DaraM14, author = {Mona Dara and Kooroush Manochehri}, title = {Using {RC4} and {AES} Key Schedule to Generate Dynamic S-Box in {AES}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {1--9}, year = {2014}, url = {https://doi.org/10.1080/19393555.2013.877541}, doi = {10.1080/19393555.2013.877541}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/DaraM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GuptaK14, author = {Sanchika Gupta and Padam Kumar}, title = {System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {86--99}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.942017}, doi = {10.1080/19393555.2014.942017}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/GuptaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/InglotL14, author = {Bartosz Inglot and Lu Liu}, title = {Enhanced Timeline Analysis for Digital Forensic Investigations}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {32--44}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.897401}, doi = {10.1080/19393555.2014.897401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/InglotL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JaliFD14, author = {Mohd Zalisham Jali and Steven M. Furnell and Paul Dowland}, title = {Investigating the Viability of Multifactor Graphical Passwords for User Authentication}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {10--21}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.891274}, doi = {10.1080/19393555.2014.891274}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/JaliFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/LiL14, author = {Zhen Li and Qi Liao}, title = {Toward a Monopoly Botnet Market}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {159--171}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931488}, doi = {10.1080/19393555.2014.931488}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/LiL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Lozada14, author = {Brian A. Lozada}, title = {The Emerging Technology of Predictive Analytics: Implications for Homeland Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {118--122}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.972598}, doi = {10.1080/19393555.2014.972598}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Lozada14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Morales-SandovalCD14, author = {Miguel Morales{-}Sandoval and Ana Karina Vega Castillo and Arturo Diaz{-}Perez}, title = {A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {22--31}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.891282}, doi = {10.1080/19393555.2014.891282}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Morales-SandovalCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Polymeropoulou14, author = {Panagiota Polymeropoulou}, title = {Book Review: Graves, Michael W. \emph{Digital Archaeology: The Art and Science of Digital Forensics} - Upper Saddle River, {NJ:} Addison-Wesley, 2013, 600p., {\textdollar}79.99. {ISBN:} 978-0-321-803-90-0}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {45}, year = {2014}, url = {https://doi.org/10.1080/19393555.2013.877542}, doi = {10.1080/19393555.2013.877542}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Polymeropoulou14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RanaS14, author = {Hardikkumar Rana and Mark Stamp}, title = {Hunting for Pirated Software Using Metamorphic Analysis}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {68--85}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.975557}, doi = {10.1080/19393555.2014.975557}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/RanaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ShahriarD14, author = {Hossain Shahriar and Vamshee Krishna Devendran}, title = {Classification of Clickjacking Attacks and Detection Techniques}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {137--147}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931489}, doi = {10.1080/19393555.2014.931489}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ShahriarD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14, author = {Nicolas Sklavos}, title = {Book Review: Wu, Chwan-Hwa, and Irwin, J. David. \emph{Introduction to Computer Networks and Cybersecurity} - Boca Raton, {FL:} {CRC} Press/Taylor {\&} Francis Group, 2013, 1236p., {\textdollar}130.00. {ISBN} 1466572132}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {46}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.896060}, doi = {10.1080/19393555.2014.896060}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14a, author = {Nicolas Sklavos}, title = {Book Review: Samuelle, {T.J.} \emph{Mike Meyers' CompTIA Security + Certification Passport (Exam SY0-301)} - 3rd ed. New York: McGraw-Hill Osborne Media, 2011, 480p., {\textdollar}30.00. {ISBN:} 13: 978-0071770385}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {47--48}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.897402}, doi = {10.1080/19393555.2014.897402}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14b, author = {Nicolas Sklavos}, title = {Book Review: Stallings, W. \emph{Cryptography and Network Security: Principles and Practice} - 6th ed. Upper Saddle River, {NJ:} Prentice Hall, 2013, 752p., {\textdollar}142.40. {ISBN:} 13: 978-0133354690}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {49--50}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.900834}, doi = {10.1080/19393555.2014.900834}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14c, author = {Nicolas Sklavos}, title = {Book Review: Sullivan, Bryan, and Liu, Vincent. \emph{Web Application Security, {A} Beginner's Guide} - McGraw-Hill Osborne Media, Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 352p., {\textdollar}40.00. {ISBN:} 10: 0071776168, {ISBN:} 13: 978-0071776165}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {51}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.904956}, doi = {10.1080/19393555.2014.904956}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14d, author = {Nicolas Sklavos}, title = {Book Review: Bahadur, Gary, Inasi, Jason, and de Carvalho, Alex. \emph{Securing the Clicks: Network Security in the Age of Social Media} - McGraw-Hill Osborne Media, 2011, 368p., {\textdollar}40.00. {ISBN:} 10: 0071769056, {ISBN:} 13: 978-0071769051}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {52--53}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.904957}, doi = {10.1080/19393555.2014.904957}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14e, author = {Nicolas Sklavos}, title = {Book Review: Wong, Caroline. \emph{Security Metrics, {A} Beginner's Guide} - McGraw-Hill Osborne Media, {A} Beginner's Guide Series. McGraw-Hill Osborne Media, 2011, 432p., {\textdollar}40.00. {ISBN:} 10: 0071744002, {ISBN:} 13: 978-0071744003}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {54}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.905661}, doi = {10.1080/19393555.2014.905661}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos14f, author = {Nicolas Sklavos}, title = {Book Review: Shavers, Brett. \emph{Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {1-2}, pages = {55--56}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.905662}, doi = {10.1080/19393555.2014.905662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos14f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SolankiSD14, author = {Jaydeep Solanki and Aenik Shah and Manik Lal Das}, title = {Secure Patrol: Patrolling Against Buffer Overflow Exploits}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {3}, pages = {107--117}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.972597}, doi = {10.1080/19393555.2014.972597}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SolankiSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Warikoo14, author = {Arun Warikoo}, title = {Proposed Methodology for Cyber Criminal Profiling}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {172--178}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931491}, doi = {10.1080/19393555.2014.931491}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Warikoo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ZargariS14, author = {Shahrzad Zargari and Anthony Smith}, title = {Policing as a Service in the Cloud}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {23}, number = {4-6}, pages = {148--158}, year = {2014}, url = {https://doi.org/10.1080/19393555.2014.931490}, doi = {10.1080/19393555.2014.931490}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ZargariS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.