default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp31.bht:"
@article{DBLP:journals/isjgp/Al-MalikiA22, author = {Ossama Al{-}Maliki and Hisham Al{-}Assam}, title = {A tokenization technique for improving the security of {EMV} contactless cards}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {511--526}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.2001120}, doi = {10.1080/19393555.2021.2001120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Al-MalikiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AlhejaziM22, author = {Manal Mohamed Alhejazi and Rami Mustafa A. Mohammad}, title = {Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm {(WMCA)}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {125--143}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1869356}, doi = {10.1080/19393555.2020.1869356}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AlhejaziM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Anu22, author = {Vaibhav K. Anu}, title = {Information security governance metrics: a survey and taxonomy}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {466--478}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1922786}, doi = {10.1080/19393555.2021.1922786}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Anu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AroraB22, author = {Shefali Arora and M. P. S. Bhatia}, title = {Challenges and opportunities in biometric security: {A} survey}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {28--48}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1873464}, doi = {10.1080/19393555.2021.1873464}, timestamp = {Tue, 25 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AroraB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BalaGK22, author = {Neeru Bala and Rashmi Gupta and Anil Kumar}, title = {Multimodal biometric system based on fusion techniques: a review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {289--337}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1974130}, doi = {10.1080/19393555.2021.1974130}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BalaGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BirthriyaJ22, author = {Santosh Kumar Birthriya and Ankit Kumar Jain}, title = {A Comprehensive Survey of Phishing Email Detection and Protection Techniques}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {411--440}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1959678}, doi = {10.1080/19393555.2021.1959678}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/BirthriyaJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Bisoyi22, author = {Akanksha Bisoyi}, title = {Ownership, liability, patentability, and creativity issues in artificial intelligence}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {377--386}, year = {2022}, url = {https://doi.org/10.1080/19393555.2022.2060879}, doi = {10.1080/19393555.2022.2060879}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Bisoyi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ChaudhariD22, author = {Payal Chaudhari and Manik Lal Das}, title = {{PAC:} Privacy preserving proxy re-encryption for access control in public cloud}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {612--627}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1959679}, doi = {10.1080/19393555.2021.1959679}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ChaudhariD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ChewLOWP22, author = {Yee Jian Chew and Nicholas Lee and Shih Yin Ooi and Kok{-}Seng Wong and Ying{-}Han Pang}, title = {Benchmarking full version of GureKDDCup, UNSW-NB15, and {CIDDS-001} {NIDS} datasets using rolling-origin resampling}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {544--565}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1985191}, doi = {10.1080/19393555.2021.1985191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ChewLOWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ChumaN22, author = {Kabelo Given Chuma and Mpho Ngoepe}, title = {Security of electronic personal health information in a public hospital in South Africa}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {179--195}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1893410}, doi = {10.1080/19393555.2021.1893410}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ChumaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DalalJ22, author = {Mukesh Dalal and Mamta Juneja}, title = {A secure video steganography scheme using {DWT} based on object tracking}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {196--213}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1896055}, doi = {10.1080/19393555.2021.1896055}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/DalalJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/DeebaDZMMKL22, author = {Farah Deeba and Fayaz Ali Dharejo and Yuanchun Zhou and Parvez Ahmed Memon and Hira Memon and Saeed Ahmed Khan and Nauman Ali Larik}, title = {Digital image watermarking in sparse domain}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {237--250}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1919250}, doi = {10.1080/19393555.2021.1919250}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/DeebaDZMMKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GajmalU22, author = {Yogesh M. Gajmal and R. Udayakumar}, title = {Privacy and Utility-Assisted Data Protection Strategy for Secure Data Sharing and Retrieval in Cloud System}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {451--465}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1933270}, doi = {10.1080/19393555.2021.1933270}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GajmalU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HoangV22, author = {Xuan Dau Hoang and Xuan{-}Hanh Vu}, title = {An improved model for detecting {DGA} botnets using random forest algorithm}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {441--450}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1934198}, doi = {10.1080/19393555.2021.1934198}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/HoangV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HossainDIH22, author = {Md. Nazmul Hossain and Taposh Das and Tariqul Islam and Md. Alam Hossain}, title = {Cyber security risk assessment method for {SCADA} system}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {499--510}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1934196}, doi = {10.1080/19393555.2021.1934196}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/HossainDIH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/IborOOU22, author = {Ayei E. Ibor and Florence A. Oladeji and Olusoji B. Okunoye and Charles Onuwa Uwadia}, title = {Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep)}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {105--124}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1883777}, doi = {10.1080/19393555.2021.1883777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/IborOOU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/IkbalG22, author = {Febina Ikbal and R. Gopikakumari}, title = {Performance analysis of SMRT-based color image watermarking in different color spaces}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {157--167}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1873465}, doi = {10.1080/19393555.2021.1873465}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/IkbalG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JanaJ22, author = {Manasi Jana and Biswapati Jana}, title = {A new {DCT} based robust image watermarking scheme using cellular automata}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {527--543}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1956023}, doi = {10.1080/19393555.2021.1956023}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/JanaJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Lee22, author = {In Lee}, title = {An analysis of data breaches in the {U.S.} healthcare industry: diversity, trends, and risk profiling}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {346--358}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.2017522}, doi = {10.1080/19393555.2021.2017522}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Lee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Lopriore22, author = {Lanfranco Lopriore}, title = {Cryptographic pointers for fine-grained file access security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {359--375}, year = {2022}, url = {https://doi.org/10.1080/19393555.2022.2033365}, doi = {10.1080/19393555.2022.2033365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Lopriore22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MirSL22, author = {Umar Hussain Mir and Deep Singh and Parveiz Nazir Lone}, title = {Color image encryption using {RSA} cryptosystem with a chaotic map in Hartley domain}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {49--63}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1963018}, doi = {10.1080/19393555.2021.1963018}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MirSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Ogundoyin22, author = {Sunday Oyinlola Ogundoyin}, title = {A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {387--410}, year = {2022}, url = {https://doi.org/10.1080/19393555.2022.2036879}, doi = {10.1080/19393555.2022.2036879}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Ogundoyin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OlakanmiO22, author = {Oladayo Olufemi Olakanmi and Kehinde Oluwasesan Odeyemi}, title = {{EACS:} Expressible Access Control Scheme for Secure Services and Data Delegation in Collaborative E-health System}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {274--288}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1926603}, doi = {10.1080/19393555.2021.1926603}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/OlakanmiO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PandaC22, author = {Prabhat Kumar Panda and Sudipta Chattopadhyay}, title = {An enhanced mutual authentication and security protocol for IoT and cloud server}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {144--156}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1871534}, doi = {10.1080/19393555.2020.1871534}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PandaC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Patel22, author = {Chintan Patel}, title = {IoT privacy preservation using blockchain}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {566--581}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1919795}, doi = {10.1080/19393555.2021.1919795}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Patel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PatelD22, author = {Chintan Patel and Nishant Doshi}, title = {LDA-IoT : a level dependent authentication for IoT paradigm}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {629--656}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1931573}, doi = {10.1080/19393555.2021.1931573}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PatelD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PishdarSNB22, author = {Mohammad Pishdar and Younes Seifi and Mohammad Nasiri and Mozafar Bag{-}Mohammadi}, title = {{PCC-RPL:} An efficient trust-based security extension for {RPL}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {168--178}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1887413}, doi = {10.1080/19393555.2021.1887413}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PishdarSNB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PrabhuT22, author = {Sunitha Prabhu and Nik Thompson}, title = {A primer on insider threats in cybersecurity}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {602--611}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1971802}, doi = {10.1080/19393555.2021.1971802}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/PrabhuT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RatchfordENW22, author = {Melva M. Ratchford and Omar F. El{-}Gayar and Cherie Noteboom and Yong Wang}, title = {{BYOD} security issues: a systematic literature review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {253--273}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1923873}, doi = {10.1080/19393555.2021.1923873}, timestamp = {Thu, 28 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/RatchfordENW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ReveraertS22, author = {Mathias Reveraert and Tom Sauer}, title = {A four-part typology to assess organizational and individual security awareness}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {64--82}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1855374}, doi = {10.1080/19393555.2020.1855374}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ReveraertS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SK22, author = {Ajish S and K. S. Anil Kumar}, title = {Secure I-voting system using {QR} code and biometric authentication}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {83--104}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1867261}, doi = {10.1080/19393555.2020.1867261}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SadqiM22, author = {Yassine Sadqi and Yassine Maleh}, title = {A systematic review and taxonomy of web applications threats}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {1}, pages = {1--27}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1853855}, doi = {10.1080/19393555.2020.1853855}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SadqiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ShrivastavaNH22, author = {Rajesh Kumar Shrivastava and Varun Natu and Chittaranjan Hota}, title = {Code integrity verification using cache memory monitoring}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {226--236}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1902592}, doi = {10.1080/19393555.2021.1902592}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ShrivastavaNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SommestadHS22, author = {Teodor Sommestad and Hannes Holm and Daniel Steinvall}, title = {Variables influencing the effectiveness of signature-based network intrusion detection systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {711--728}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1975853}, doi = {10.1080/19393555.2021.1975853}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SonarS22, author = {Reshma Sonar and Gandharba Swain}, title = {A hybrid steganography technique based on RR, AQVD, and {QVC}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {4}, pages = {479--498}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1912219}, doi = {10.1080/19393555.2021.1912219}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SonarS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SrikanthJ22, author = {G. Umarani Srikanth and Lijetha. C. Jaffrin}, title = {Security Issues in Cloud and Mobile cloud: {A} Comprehensive Survey}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {686--710}, year = {2022}, url = {https://doi.org/10.1080/19393555.2022.2035470}, doi = {10.1080/19393555.2022.2035470}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SrikanthJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SrisakthiA22, author = {S. Srisakthi and Gufran Ahmad Ansari}, title = {{PCSP:} {A} Protected Cloud Storage Provider employing light weight techniques}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {214--225}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1900465}, doi = {10.1080/19393555.2021.1900465}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SrisakthiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Stone22, author = {Alexander Gregory Stone}, title = {The role risk-management plays in reducing insider threat's in the federal Government}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {3}, pages = {338--345}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1998735}, doi = {10.1080/19393555.2021.1998735}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Stone22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TanveerAM22, author = {Md. Siddiqur Rahman Tanveer and Kazi Md. Rokibul Alam and Yasuhiko Morimoto}, title = {A multi-stage chaotic encryption technique for medical image}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {657--675}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1934197}, doi = {10.1080/19393555.2021.1934197}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/TanveerAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TanwarK22, author = {Sarvesh Tanwar and Anil Kumar}, title = {Secure key issuing scheme in ID-based cryptography with revocable {ID}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {676--685}, year = {2022}, url = {https://doi.org/10.1080/19393555.2022.2033366}, doi = {10.1080/19393555.2022.2033366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TanwarK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/VenkateswarluS22, author = {B. Venkateswarlu and V. Viswanath Shenoi}, title = {Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {5}, pages = {582--601}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1956024}, doi = {10.1080/19393555.2021.1956024}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/VenkateswarluS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/X22, title = {Correction}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {251}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1883967}, doi = {10.1080/19393555.2021.1883967}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.