Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp31.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/Al-MalikiA22,
  author       = {Ossama Al{-}Maliki and
                  Hisham Al{-}Assam},
  title        = {A tokenization technique for improving the security of {EMV} contactless
                  cards},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {511--526},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.2001120},
  doi          = {10.1080/19393555.2021.2001120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Al-MalikiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AlhejaziM22,
  author       = {Manal Mohamed Alhejazi and
                  Rami Mustafa A. Mohammad},
  title        = {Enhancing the blockchain voting process in IoT using a novel blockchain
                  Weighted Majority Consensus Algorithm {(WMCA)}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {125--143},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2020.1869356},
  doi          = {10.1080/19393555.2020.1869356},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AlhejaziM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Anu22,
  author       = {Vaibhav K. Anu},
  title        = {Information security governance metrics: a survey and taxonomy},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {466--478},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1922786},
  doi          = {10.1080/19393555.2021.1922786},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Anu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AroraB22,
  author       = {Shefali Arora and
                  M. P. S. Bhatia},
  title        = {Challenges and opportunities in biometric security: {A} survey},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {28--48},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1873464},
  doi          = {10.1080/19393555.2021.1873464},
  timestamp    = {Tue, 25 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AroraB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BalaGK22,
  author       = {Neeru Bala and
                  Rashmi Gupta and
                  Anil Kumar},
  title        = {Multimodal biometric system based on fusion techniques: a review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {289--337},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1974130},
  doi          = {10.1080/19393555.2021.1974130},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BalaGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BirthriyaJ22,
  author       = {Santosh Kumar Birthriya and
                  Ankit Kumar Jain},
  title        = {A Comprehensive Survey of Phishing Email Detection and Protection
                  Techniques},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {411--440},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1959678},
  doi          = {10.1080/19393555.2021.1959678},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/BirthriyaJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Bisoyi22,
  author       = {Akanksha Bisoyi},
  title        = {Ownership, liability, patentability, and creativity issues in artificial
                  intelligence},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {377--386},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2022.2060879},
  doi          = {10.1080/19393555.2022.2060879},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Bisoyi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ChaudhariD22,
  author       = {Payal Chaudhari and
                  Manik Lal Das},
  title        = {{PAC:} Privacy preserving proxy re-encryption for access control in
                  public cloud},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {612--627},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1959679},
  doi          = {10.1080/19393555.2021.1959679},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ChaudhariD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ChewLOWP22,
  author       = {Yee Jian Chew and
                  Nicholas Lee and
                  Shih Yin Ooi and
                  Kok{-}Seng Wong and
                  Ying{-}Han Pang},
  title        = {Benchmarking full version of GureKDDCup, UNSW-NB15, and {CIDDS-001}
                  {NIDS} datasets using rolling-origin resampling},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {544--565},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1985191},
  doi          = {10.1080/19393555.2021.1985191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ChewLOWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ChumaN22,
  author       = {Kabelo Given Chuma and
                  Mpho Ngoepe},
  title        = {Security of electronic personal health information in a public hospital
                  in South Africa},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {179--195},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1893410},
  doi          = {10.1080/19393555.2021.1893410},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ChumaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DalalJ22,
  author       = {Mukesh Dalal and
                  Mamta Juneja},
  title        = {A secure video steganography scheme using {DWT} based on object tracking},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {196--213},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1896055},
  doi          = {10.1080/19393555.2021.1896055},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/DalalJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/DeebaDZMMKL22,
  author       = {Farah Deeba and
                  Fayaz Ali Dharejo and
                  Yuanchun Zhou and
                  Parvez Ahmed Memon and
                  Hira Memon and
                  Saeed Ahmed Khan and
                  Nauman Ali Larik},
  title        = {Digital image watermarking in sparse domain},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {237--250},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1919250},
  doi          = {10.1080/19393555.2021.1919250},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/DeebaDZMMKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GajmalU22,
  author       = {Yogesh M. Gajmal and
                  R. Udayakumar},
  title        = {Privacy and Utility-Assisted Data Protection Strategy for Secure Data
                  Sharing and Retrieval in Cloud System},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {451--465},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1933270},
  doi          = {10.1080/19393555.2021.1933270},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GajmalU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HoangV22,
  author       = {Xuan Dau Hoang and
                  Xuan{-}Hanh Vu},
  title        = {An improved model for detecting {DGA} botnets using random forest
                  algorithm},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {441--450},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1934198},
  doi          = {10.1080/19393555.2021.1934198},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/HoangV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HossainDIH22,
  author       = {Md. Nazmul Hossain and
                  Taposh Das and
                  Tariqul Islam and
                  Md. Alam Hossain},
  title        = {Cyber security risk assessment method for {SCADA} system},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {499--510},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1934196},
  doi          = {10.1080/19393555.2021.1934196},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/HossainDIH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/IborOOU22,
  author       = {Ayei E. Ibor and
                  Florence A. Oladeji and
                  Olusoji B. Okunoye and
                  Charles Onuwa Uwadia},
  title        = {Novel adaptive cyberattack prediction model using an enhanced genetic
                  algorithm and deep learning (AdacDeep)},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {105--124},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1883777},
  doi          = {10.1080/19393555.2021.1883777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/IborOOU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/IkbalG22,
  author       = {Febina Ikbal and
                  R. Gopikakumari},
  title        = {Performance analysis of SMRT-based color image watermarking in different
                  color spaces},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {157--167},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1873465},
  doi          = {10.1080/19393555.2021.1873465},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/IkbalG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JanaJ22,
  author       = {Manasi Jana and
                  Biswapati Jana},
  title        = {A new {DCT} based robust image watermarking scheme using cellular
                  automata},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {527--543},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1956023},
  doi          = {10.1080/19393555.2021.1956023},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/JanaJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Lee22,
  author       = {In Lee},
  title        = {An analysis of data breaches in the {U.S.} healthcare industry: diversity,
                  trends, and risk profiling},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {346--358},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.2017522},
  doi          = {10.1080/19393555.2021.2017522},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Lee22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Lopriore22,
  author       = {Lanfranco Lopriore},
  title        = {Cryptographic pointers for fine-grained file access security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {359--375},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2022.2033365},
  doi          = {10.1080/19393555.2022.2033365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Lopriore22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MirSL22,
  author       = {Umar Hussain Mir and
                  Deep Singh and
                  Parveiz Nazir Lone},
  title        = {Color image encryption using {RSA} cryptosystem with a chaotic map
                  in Hartley domain},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {49--63},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1963018},
  doi          = {10.1080/19393555.2021.1963018},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MirSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Ogundoyin22,
  author       = {Sunday Oyinlola Ogundoyin},
  title        = {A privacy-preserving multisubset data aggregation scheme with fault
                  resilience for intelligent transportation system},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {387--410},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2022.2036879},
  doi          = {10.1080/19393555.2022.2036879},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Ogundoyin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OlakanmiO22,
  author       = {Oladayo Olufemi Olakanmi and
                  Kehinde Oluwasesan Odeyemi},
  title        = {{EACS:} Expressible Access Control Scheme for Secure Services and
                  Data Delegation in Collaborative E-health System},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {274--288},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1926603},
  doi          = {10.1080/19393555.2021.1926603},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/OlakanmiO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PandaC22,
  author       = {Prabhat Kumar Panda and
                  Sudipta Chattopadhyay},
  title        = {An enhanced mutual authentication and security protocol for IoT and
                  cloud server},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {144--156},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2020.1871534},
  doi          = {10.1080/19393555.2020.1871534},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PandaC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Patel22,
  author       = {Chintan Patel},
  title        = {IoT privacy preservation using blockchain},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {566--581},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1919795},
  doi          = {10.1080/19393555.2021.1919795},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Patel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PatelD22,
  author       = {Chintan Patel and
                  Nishant Doshi},
  title        = {LDA-IoT : a level dependent authentication for IoT paradigm},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {629--656},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1931573},
  doi          = {10.1080/19393555.2021.1931573},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PatelD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PishdarSNB22,
  author       = {Mohammad Pishdar and
                  Younes Seifi and
                  Mohammad Nasiri and
                  Mozafar Bag{-}Mohammadi},
  title        = {{PCC-RPL:} An efficient trust-based security extension for {RPL}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {168--178},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1887413},
  doi          = {10.1080/19393555.2021.1887413},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PishdarSNB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PrabhuT22,
  author       = {Sunitha Prabhu and
                  Nik Thompson},
  title        = {A primer on insider threats in cybersecurity},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {602--611},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1971802},
  doi          = {10.1080/19393555.2021.1971802},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/PrabhuT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RatchfordENW22,
  author       = {Melva M. Ratchford and
                  Omar F. El{-}Gayar and
                  Cherie Noteboom and
                  Yong Wang},
  title        = {{BYOD} security issues: a systematic literature review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {253--273},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1923873},
  doi          = {10.1080/19393555.2021.1923873},
  timestamp    = {Thu, 28 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/RatchfordENW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ReveraertS22,
  author       = {Mathias Reveraert and
                  Tom Sauer},
  title        = {A four-part typology to assess organizational and individual security
                  awareness},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {64--82},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2020.1855374},
  doi          = {10.1080/19393555.2020.1855374},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ReveraertS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SK22,
  author       = {Ajish S and
                  K. S. Anil Kumar},
  title        = {Secure I-voting system using {QR} code and biometric authentication},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {83--104},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2020.1867261},
  doi          = {10.1080/19393555.2020.1867261},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SadqiM22,
  author       = {Yassine Sadqi and
                  Yassine Maleh},
  title        = {A systematic review and taxonomy of web applications threats},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {1},
  pages        = {1--27},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2020.1853855},
  doi          = {10.1080/19393555.2020.1853855},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SadqiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ShrivastavaNH22,
  author       = {Rajesh Kumar Shrivastava and
                  Varun Natu and
                  Chittaranjan Hota},
  title        = {Code integrity verification using cache memory monitoring},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {226--236},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1902592},
  doi          = {10.1080/19393555.2021.1902592},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ShrivastavaNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SommestadHS22,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Daniel Steinvall},
  title        = {Variables influencing the effectiveness of signature-based network
                  intrusion detection systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {711--728},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1975853},
  doi          = {10.1080/19393555.2021.1975853},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SonarS22,
  author       = {Reshma Sonar and
                  Gandharba Swain},
  title        = {A hybrid steganography technique based on RR, AQVD, and {QVC}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {4},
  pages        = {479--498},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1912219},
  doi          = {10.1080/19393555.2021.1912219},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SonarS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SrikanthJ22,
  author       = {G. Umarani Srikanth and
                  Lijetha. C. Jaffrin},
  title        = {Security Issues in Cloud and Mobile cloud: {A} Comprehensive Survey},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {686--710},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2022.2035470},
  doi          = {10.1080/19393555.2022.2035470},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SrikanthJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SrisakthiA22,
  author       = {S. Srisakthi and
                  Gufran Ahmad Ansari},
  title        = {{PCSP:} {A} Protected Cloud Storage Provider employing light weight
                  techniques},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {214--225},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1900465},
  doi          = {10.1080/19393555.2021.1900465},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SrisakthiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Stone22,
  author       = {Alexander Gregory Stone},
  title        = {The role risk-management plays in reducing insider threat's in the
                  federal Government},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {3},
  pages        = {338--345},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1998735},
  doi          = {10.1080/19393555.2021.1998735},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Stone22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TanveerAM22,
  author       = {Md. Siddiqur Rahman Tanveer and
                  Kazi Md. Rokibul Alam and
                  Yasuhiko Morimoto},
  title        = {A multi-stage chaotic encryption technique for medical image},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {657--675},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1934197},
  doi          = {10.1080/19393555.2021.1934197},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/TanveerAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TanwarK22,
  author       = {Sarvesh Tanwar and
                  Anil Kumar},
  title        = {Secure key issuing scheme in ID-based cryptography with revocable
                  {ID}},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {676--685},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2022.2033366},
  doi          = {10.1080/19393555.2022.2033366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TanwarK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/VenkateswarluS22,
  author       = {B. Venkateswarlu and
                  V. Viswanath Shenoi},
  title        = {Optimized generative adversarial network with fractional calculus
                  based feature fusion using Twitter stream for spam detection},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {5},
  pages        = {582--601},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1956024},
  doi          = {10.1080/19393555.2021.1956024},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/VenkateswarluS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/X22,
  title        = {Correction},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {2},
  pages        = {251},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1883967},
  doi          = {10.1080/19393555.2021.1883967},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}