Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp23.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/Angelopoulou14,
  author       = {Olga Angelopoulou},
  title        = {Introduction to the Special Issue},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {123--124},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.987063},
  doi          = {10.1080/19393555.2014.987063},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Angelopoulou14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/CanforaMVN14,
  author       = {Gerardo Canfora and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio and
                  Paolo Di Notte},
  title        = {Metamorphic Malware Detection Using Code Metrics},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {57--67},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931487},
  doi          = {10.1080/19393555.2014.931487},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/CanforaMVN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/CharitoudiB14,
  author       = {Konstantinia Charitoudi and
                  Andrew J. C. Blyth},
  title        = {An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber
                  Defense},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {125--136},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931492},
  doi          = {10.1080/19393555.2014.931492},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/CharitoudiB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Chasser14,
  author       = {John Mark Chasser},
  title        = {IPv6 Implementation Decisions for an Organization},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {100--106},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.943378},
  doi          = {10.1080/19393555.2014.943378},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Chasser14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DaraM14,
  author       = {Mona Dara and
                  Kooroush Manochehri},
  title        = {Using {RC4} and {AES} Key Schedule to Generate Dynamic S-Box in {AES}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {1--9},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2013.877541},
  doi          = {10.1080/19393555.2013.877541},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/DaraM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GuptaK14,
  author       = {Sanchika Gupta and
                  Padam Kumar},
  title        = {System cum Program-Wide Lightweight Malicious Program Execution Detection
                  Scheme for Cloud},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {86--99},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.942017},
  doi          = {10.1080/19393555.2014.942017},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/GuptaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/InglotL14,
  author       = {Bartosz Inglot and
                  Lu Liu},
  title        = {Enhanced Timeline Analysis for Digital Forensic Investigations},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {32--44},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.897401},
  doi          = {10.1080/19393555.2014.897401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/InglotL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JaliFD14,
  author       = {Mohd Zalisham Jali and
                  Steven M. Furnell and
                  Paul Dowland},
  title        = {Investigating the Viability of Multifactor Graphical Passwords for
                  User Authentication},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {10--21},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.891274},
  doi          = {10.1080/19393555.2014.891274},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/JaliFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/LiL14,
  author       = {Zhen Li and
                  Qi Liao},
  title        = {Toward a Monopoly Botnet Market},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {159--171},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931488},
  doi          = {10.1080/19393555.2014.931488},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/LiL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Lozada14,
  author       = {Brian A. Lozada},
  title        = {The Emerging Technology of Predictive Analytics: Implications for
                  Homeland Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {118--122},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.972598},
  doi          = {10.1080/19393555.2014.972598},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Lozada14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Morales-SandovalCD14,
  author       = {Miguel Morales{-}Sandoval and
                  Ana Karina Vega Castillo and
                  Arturo Diaz{-}Perez},
  title        = {A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents
                  in Cloud Computing Using Attribute-Based Encryption on Mobile Devices},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {22--31},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.891282},
  doi          = {10.1080/19393555.2014.891282},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Morales-SandovalCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Polymeropoulou14,
  author       = {Panagiota Polymeropoulou},
  title        = {Book Review: Graves, Michael W. \emph{Digital Archaeology: The Art
                  and Science of Digital Forensics} - Upper Saddle River, {NJ:} Addison-Wesley,
                  2013, 600p., {\textdollar}79.99. {ISBN:} 978-0-321-803-90-0},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {45},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2013.877542},
  doi          = {10.1080/19393555.2013.877542},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Polymeropoulou14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RanaS14,
  author       = {Hardikkumar Rana and
                  Mark Stamp},
  title        = {Hunting for Pirated Software Using Metamorphic Analysis},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {68--85},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.975557},
  doi          = {10.1080/19393555.2014.975557},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/RanaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ShahriarD14,
  author       = {Hossain Shahriar and
                  Vamshee Krishna Devendran},
  title        = {Classification of Clickjacking Attacks and Detection Techniques},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {137--147},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931489},
  doi          = {10.1080/19393555.2014.931489},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ShahriarD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Wu, Chwan-Hwa, and Irwin, J. David. \emph{Introduction
                  to Computer Networks and Cybersecurity} - Boca Raton, {FL:} {CRC}
                  Press/Taylor {\&} Francis Group, 2013, 1236p., {\textdollar}130.00.
                  {ISBN} 1466572132},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {46},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.896060},
  doi          = {10.1080/19393555.2014.896060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14a,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Samuelle, {T.J.} \emph{Mike Meyers' CompTIA Security
                  + Certification Passport (Exam SY0-301)} - 3rd ed. New York: McGraw-Hill
                  Osborne Media, 2011, 480p., {\textdollar}30.00. {ISBN:} 13: 978-0071770385},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {47--48},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.897402},
  doi          = {10.1080/19393555.2014.897402},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14b,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Stallings, W. \emph{Cryptography and Network Security:
                  Principles and Practice} - 6th ed. Upper Saddle River, {NJ:} Prentice
                  Hall, 2013, 752p., {\textdollar}142.40. {ISBN:} 13: 978-0133354690},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {49--50},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.900834},
  doi          = {10.1080/19393555.2014.900834},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14c,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Sullivan, Bryan, and Liu, Vincent. \emph{Web Application
                  Security, {A} Beginner's Guide} - McGraw-Hill Osborne Media, Beginner's
                  Guide Series. McGraw-Hill Osborne Media, 2011, 352p., {\textdollar}40.00.
                  {ISBN:} 10: 0071776168, {ISBN:} 13: 978-0071776165},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {51},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.904956},
  doi          = {10.1080/19393555.2014.904956},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14d,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Bahadur, Gary, Inasi, Jason, and de Carvalho, Alex. \emph{Securing
                  the Clicks: Network Security in the Age of Social Media} - McGraw-Hill
                  Osborne Media, 2011, 368p., {\textdollar}40.00. {ISBN:} 10: 0071769056,
                  {ISBN:} 13: 978-0071769051},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {52--53},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.904957},
  doi          = {10.1080/19393555.2014.904957},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14e,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Wong, Caroline. \emph{Security Metrics, {A} Beginner's
                  Guide} - McGraw-Hill Osborne Media, {A} Beginner's Guide Series. McGraw-Hill
                  Osborne Media, 2011, 432p., {\textdollar}40.00. {ISBN:} 10: 0071744002,
                  {ISBN:} 13: 978-0071744003},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {54},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.905661},
  doi          = {10.1080/19393555.2014.905661},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos14f,
  author       = {Nicolas Sklavos},
  title        = {Book Review: Shavers, Brett. \emph{Placing the Suspect Behind the
                  Keyboard: Using Digital Forensics and Investigative Techniques to
                  Identify Cybercrime Suspects}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {1-2},
  pages        = {55--56},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.905662},
  doi          = {10.1080/19393555.2014.905662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos14f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SolankiSD14,
  author       = {Jaydeep Solanki and
                  Aenik Shah and
                  Manik Lal Das},
  title        = {Secure Patrol: Patrolling Against Buffer Overflow Exploits},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {3},
  pages        = {107--117},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.972597},
  doi          = {10.1080/19393555.2014.972597},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SolankiSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Warikoo14,
  author       = {Arun Warikoo},
  title        = {Proposed Methodology for Cyber Criminal Profiling},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {172--178},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931491},
  doi          = {10.1080/19393555.2014.931491},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Warikoo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ZargariS14,
  author       = {Shahrzad Zargari and
                  Anthony Smith},
  title        = {Policing as a Service in the Cloud},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {23},
  number       = {4-6},
  pages        = {148--158},
  year         = {2014},
  url          = {https://doi.org/10.1080/19393555.2014.931490},
  doi          = {10.1080/19393555.2014.931490},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ZargariS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}