default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr64.bht:"
@article{DBLP:journals/istr/AkleylekS22, author = {Sedat Akleylek and Meryem Soysaldi}, title = {A new lattice-based authentication scheme for IoT}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103053}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103053}, doi = {10.1016/J.JISA.2021.103053}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AkleylekS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Al-DweikHMM22, author = {Ahmad Y. Al{-}Dweik and Iqtadar Hussain and Moutaz Saleh Mustafa and M. T. Mustafa}, title = {A novel method to generate key-dependent s-boxes with identical algebraic properties}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103065}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103065}, doi = {10.1016/J.JISA.2021.103065}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Al-DweikHMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BensaoudK22, author = {Ahmed Bensaoud and Jugal Kalita}, title = {Deep multi-task learning for malware image classification}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103057}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103057}, doi = {10.1016/J.JISA.2021.103057}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BensaoudK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChatzoglouKK22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103058}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103058}, doi = {10.1016/J.JISA.2021.103058}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCX22, author = {Long Chen and Jianguo Chen and Chunhe Xia}, title = {Social network behavior and public opinion manipulation}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103060}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103060}, doi = {10.1016/J.JISA.2021.103060}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenN22, author = {Liqun Chen and Siaw{-}Lynn Ng}, title = {Securing emergent behaviour in swarm robotics}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103047}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103047}, doi = {10.1016/J.JISA.2021.103047}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CoruhB22, author = {Ugur Coruh and Oguz Bayat}, title = {{ESAR:} Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103081}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103081}, doi = {10.1016/J.JISA.2021.103081}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CoruhB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeviRS22, author = {Anju Devi and Geetanjali Rathee and Hemraj Saini}, title = {Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using {DPSO} and {M-ITA} Algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103094}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103094}, doi = {10.1016/J.JISA.2021.103094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeviRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuyHHNP22, author = {Phan The Duy and Hien Do Hoang and Do Thi Thu Hien and Anh Gia{-}Tuan Nguyen and Van{-}Hau Pham}, title = {{B-DAC:} {A} decentralized access control framework on Northbound interface for securing {SDN} using blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103080}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103080}, doi = {10.1016/J.JISA.2021.103080}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DuyHHNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarJ22, author = {Sanjeev Kumar and B. Janet}, title = {{DTMIC:} Deep transfer learning for malware image classification}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103063}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103063}, doi = {10.1016/J.JISA.2021.103063}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MelandNBS22, author = {Per H{\aa}kon Meland and Dag Atle Nesheim and Karin Bernsmed and Guttorm Sindre}, title = {Assessing cyber threats for storyless systems}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103050}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103050}, doi = {10.1016/J.JISA.2021.103050}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MelandNBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QuinteroPVLC22, author = {Antonia M. Reina Quintero and Salvador Mart{\'{\i}}nez Perez and {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca and Mar{\'{\i}}a Teresa G{\'{o}}mez{-}L{\'{o}}pez and Jordi Cabot}, title = {A domain-specific language for the specification of {UCON} policies}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103006}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103006}, doi = {10.1016/J.JISA.2021.103006}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/QuinteroPVLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RamanM22, author = {M. R. Gauthama Raman and Aditya P. Mathur}, title = {AICrit: {A} unified framework for real-time anomaly detection in water treatment plants}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103046}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103046}, doi = {10.1016/J.JISA.2021.103046}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RamanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShafaiMAEE22, author = {Walid El Shafai and Ahmed K. Mesrega and Hossam Eldin H. Ahmed and Nirmeen A. El{-}Bahnasawy and Fathi E. Abd El{-}Samie}, title = {An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103039}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103039}, doi = {10.1016/J.JISA.2021.103039}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShafaiMAEE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCH22, author = {Xu Wang and Liyao Li and Ching{-}Chun Chang and Yongfeng Huang}, title = {Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103067}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103067}, doi = {10.1016/J.JISA.2021.103067}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangLCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanMRXH22, author = {Manli Yuan and Yi Mu and Fatemeh Rezaeibagha and Li Xu and Xinyi Huang}, title = {Controllable software licensing system for sub-licensing}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103061}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103061}, doi = {10.1016/J.JISA.2021.103061}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanMRXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.