Search dblp for Publications

export results for "toc:db/journals/istr/istr21.bht:"

 download as .bib file

@article{DBLP:journals/istr/ChenL15,
  author       = {Chia{-}Mei Chen and
                  Hsiao{-}Chung Lin},
  title        = {Detecting botnet by anomalous traffic},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {21},
  pages        = {42--51},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.05.002},
  doi          = {10.1016/J.JISA.2014.05.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarPR15,
  author       = {Manish Kumar and
                  Pradeep Powduri and
                  Avinash Reddy},
  title        = {An {RGB} image encryption using diffusion process associated with
                  chaotic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {21},
  pages        = {20--30},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.11.003},
  doi          = {10.1016/J.JISA.2014.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/OdeluDG15,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {An efficient ECC-based privacy-preserving client authentication protocol
                  with key agreement using smart card},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {21},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2015.01.001},
  doi          = {10.1016/J.JISA.2015.01.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/OdeluDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PallipamuRV15,
  author       = {Venkateswara Rao Pallipamu and
                  K. Thammi Reddy and
                  P. Suresh Varma},
  title        = {{ASH-160:} {A} novel algorithm for secure hashing using geometric
                  concepts},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {21},
  pages        = {52--63},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.05.001},
  doi          = {10.1016/J.JISA.2014.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PallipamuRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SatohNI15,
  author       = {Akihiro Satoh and
                  Yutaka Nakamura and
                  Takeshi Ikenaga},
  title        = {A flow-based detection method for stealthy dictionary attacks against
                  Secure Shell},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {21},
  pages        = {31--41},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.08.003},
  doi          = {10.1016/J.JISA.2014.08.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SatohNI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics