Search dblp for Publications

export results for "toc:db/journals/istr/istr64.bht:"

 download as .bib file

@article{DBLP:journals/istr/AkleylekS22,
  author       = {Sedat Akleylek and
                  Meryem Soysaldi},
  title        = {A new lattice-based authentication scheme for IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103053},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103053},
  doi          = {10.1016/J.JISA.2021.103053},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AkleylekS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Al-DweikHMM22,
  author       = {Ahmad Y. Al{-}Dweik and
                  Iqtadar Hussain and
                  Moutaz Saleh Mustafa and
                  M. T. Mustafa},
  title        = {A novel method to generate key-dependent s-boxes with identical algebraic
                  properties},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103065},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103065},
  doi          = {10.1016/J.JISA.2021.103065},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Al-DweikHMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BensaoudK22,
  author       = {Ahmed Bensaoud and
                  Jugal Kalita},
  title        = {Deep multi-task learning for malware image classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103057},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103057},
  doi          = {10.1016/J.JISA.2021.103057},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BensaoudK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChatzoglouKK22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103058},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103058},
  doi          = {10.1016/J.JISA.2021.103058},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCX22,
  author       = {Long Chen and
                  Jianguo Chen and
                  Chunhe Xia},
  title        = {Social network behavior and public opinion manipulation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103060},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103060},
  doi          = {10.1016/J.JISA.2021.103060},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenN22,
  author       = {Liqun Chen and
                  Siaw{-}Lynn Ng},
  title        = {Securing emergent behaviour in swarm robotics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103047},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103047},
  doi          = {10.1016/J.JISA.2021.103047},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CoruhB22,
  author       = {Ugur Coruh and
                  Oguz Bayat},
  title        = {{ESAR:} Enhanced Secure Authentication and Revocation Scheme for Vehicular
                  Ad Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103081},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103081},
  doi          = {10.1016/J.JISA.2021.103081},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CoruhB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeviRS22,
  author       = {Anju Devi and
                  Geetanjali Rathee and
                  Hemraj Saini},
  title        = {Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using {DPSO}
                  and {M-ITA} Algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103094},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103094},
  doi          = {10.1016/J.JISA.2021.103094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeviRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuyHHNP22,
  author       = {Phan The Duy and
                  Hien Do Hoang and
                  Do Thi Thu Hien and
                  Anh Gia{-}Tuan Nguyen and
                  Van{-}Hau Pham},
  title        = {{B-DAC:} {A} decentralized access control framework on Northbound
                  interface for securing {SDN} using blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103080},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103080},
  doi          = {10.1016/J.JISA.2021.103080},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DuyHHNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarJ22,
  author       = {Sanjeev Kumar and
                  B. Janet},
  title        = {{DTMIC:} Deep transfer learning for malware image classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103063},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103063},
  doi          = {10.1016/J.JISA.2021.103063},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MelandNBS22,
  author       = {Per H{\aa}kon Meland and
                  Dag Atle Nesheim and
                  Karin Bernsmed and
                  Guttorm Sindre},
  title        = {Assessing cyber threats for storyless systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103050},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103050},
  doi          = {10.1016/J.JISA.2021.103050},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MelandNBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QuinteroPVLC22,
  author       = {Antonia M. Reina Quintero and
                  Salvador Mart{\'{\i}}nez Perez and
                  {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca and
                  Mar{\'{\i}}a Teresa G{\'{o}}mez{-}L{\'{o}}pez and
                  Jordi Cabot},
  title        = {A domain-specific language for the specification of {UCON} policies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103006},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103006},
  doi          = {10.1016/J.JISA.2021.103006},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/QuinteroPVLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RamanM22,
  author       = {M. R. Gauthama Raman and
                  Aditya P. Mathur},
  title        = {AICrit: {A} unified framework for real-time anomaly detection in water
                  treatment plants},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103046},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103046},
  doi          = {10.1016/J.JISA.2021.103046},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RamanM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShafaiMAEE22,
  author       = {Walid El Shafai and
                  Ahmed K. Mesrega and
                  Hossam Eldin H. Ahmed and
                  Nirmeen A. El{-}Bahnasawy and
                  Fathi E. Abd El{-}Samie},
  title        = {An efficient multimedia compression-encryption scheme using latin
                  squares for securing Internet-of-things networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103039},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103039},
  doi          = {10.1016/J.JISA.2021.103039},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShafaiMAEE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCH22,
  author       = {Xu Wang and
                  Liyao Li and
                  Ching{-}Chun Chang and
                  Yongfeng Huang},
  title        = {Multi-level reversible data hiding for crypto-imagery via a block-wise
                  substitution-transposition cipher},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103067},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103067},
  doi          = {10.1016/J.JISA.2021.103067},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuanMRXH22,
  author       = {Manli Yuan and
                  Yi Mu and
                  Fatemeh Rezaeibagha and
                  Li Xu and
                  Xinyi Huang},
  title        = {Controllable software licensing system for sub-licensing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103061},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103061},
  doi          = {10.1016/J.JISA.2021.103061},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuanMRXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}