default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs32.bht:"
@article{DBLP:journals/jcs/BasinDH24, author = {David A. Basin and S{\o}ren Debois and Thomas T. Hildebrandt}, title = {Proactive enforcement of provisions and obligations}, journal = {J. Comput. Secur.}, volume = {32}, number = {3}, pages = {247--289}, year = {2024}, url = {https://doi.org/10.3233/JCS-210078}, doi = {10.3233/JCS-210078}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BasinDH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BreuerHPMW24, author = {Malte Breuer and Pascal Hein and Leonardo Pompe and Urike Meyer and Susanne Wetzel}, title = {Prioritization and exchange chains in privacy-preserving kidney exchange}, journal = {J. Comput. Secur.}, volume = {32}, number = {4}, pages = {349--404}, year = {2024}, url = {https://doi.org/10.3233/JCS-230012}, doi = {10.3233/JCS-230012}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BreuerHPMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FalmariB24, author = {Vinod Ramesh Falmari and M. Brindha}, title = {Secure authentication protocols to resist off-line attacks on authentication data table}, journal = {J. Comput. Secur.}, volume = {32}, number = {1}, pages = {53--76}, year = {2024}, url = {https://doi.org/10.3233/JCS-210171}, doi = {10.3233/JCS-210171}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/FalmariB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FanWWWG24, author = {Haopeng Fan and Wenhao Wang and Yongjuan Wang and Xiangbin Wang and Yang Gao}, title = {Cache attacks on subkey calculation of Blowfish}, journal = {J. Comput. Secur.}, volume = {32}, number = {2}, pages = {165--191}, year = {2024}, url = {https://doi.org/10.3233/JCS-230052}, doi = {10.3233/JCS-230052}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FanWWWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GaoDWLLW24, author = {Yan Gao and Ruizhong Du and Xiaofei Wang and Ruilin Li and Mingyue Li and Ziyuan Wang}, title = {{DRC-EDI:} An integrity protection scheme based on data right confirmation for mobile edge computing}, journal = {J. Comput. Secur.}, volume = {32}, number = {4}, pages = {405--423}, year = {2024}, url = {https://doi.org/10.3233/JCS-220103}, doi = {10.3233/JCS-220103}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GaoDWLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GopeLYN24, author = {Prosanta Gope and Zhihui Lin and Yang Yang and Jianting Ning}, title = {E-Tenon: An efficient privacy-preserving secure open data sharing scheme for {EHR} system}, journal = {J. Comput. Secur.}, volume = {32}, number = {4}, pages = {319--348}, year = {2024}, url = {https://doi.org/10.3233/JCS-220097}, doi = {10.3233/JCS-220097}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GopeLYN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HuKJLLZH24, author = {Yupeng Hu and Wenxin Kuang and Zhe Jin and Wenjia Li and Keqin Li and Jiliang Zhang and Qiao Hu}, title = {{SIAT:} {A} systematic inter-component communication real-time analysis technique for detecting data leak threats on Android}, journal = {J. Comput. Secur.}, volume = {32}, number = {3}, pages = {291--317}, year = {2024}, url = {https://doi.org/10.3233/JCS-220044}, doi = {10.3233/JCS-220044}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HuKJLLZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LuoZLYJ24, author = {Jiale Luo and Zhewngyu Zhang and Jiesi Luo and Pin Yang and Runyu Jing}, title = {Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework}, journal = {J. Comput. Secur.}, volume = {32}, number = {2}, pages = {141--163}, year = {2024}, url = {https://doi.org/10.3233/JCS-230041}, doi = {10.3233/JCS-230041}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LuoZLYJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ObiriAAAA24, author = {Isaac Amankona Obiri and Abigail Akosua Addobea and Eric Affum and Jacob Ankamah and Albert Kofi Kwansah Ansah}, title = {A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud}, journal = {J. Comput. Secur.}, volume = {32}, number = {2}, pages = {77--115}, year = {2024}, url = {https://doi.org/10.3233/JCS-220107}, doi = {10.3233/JCS-220107}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ObiriAAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WanjauWOM24, author = {Stephen Kahara Wanjau and Geoffrey Mariga Wambugu and Aaron Mogeni Oirere and Geoffrey Muchiri Muketha}, title = {Discriminative spatial-temporal feature learning for modeling network intrusion detection systems}, journal = {J. Comput. Secur.}, volume = {32}, number = {1}, pages = {1--30}, year = {2024}, url = {https://doi.org/10.3233/JCS-220031}, doi = {10.3233/JCS-220031}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/WanjauWOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WeiC24, author = {Jin Wei and Ping Chen}, title = {{DSLR-:} {A} low-overhead data structure layout randomization for defending data-oriented programming}, journal = {J. Comput. Secur.}, volume = {32}, number = {3}, pages = {221--246}, year = {2024}, url = {https://doi.org/10.3233/JCS-230053}, doi = {10.3233/JCS-230053}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WeiC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangWS24, author = {Yubao Zhang and Haining Wang and Angelos Stavrou}, title = {A multiview clustering framework for detecting deceptive reviews}, journal = {J. Comput. Secur.}, volume = {32}, number = {1}, pages = {31--52}, year = {2024}, url = {https://doi.org/10.3233/JCS-220001}, doi = {10.3233/JCS-220001}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangZX24, author = {Jianfeng Zhang and Wensheng Zhang and Jingdong Xu}, title = {StegEraser: Defending cybersecurity against malicious covert communications}, journal = {J. Comput. Secur.}, volume = {32}, number = {2}, pages = {117--139}, year = {2024}, url = {https://doi.org/10.3233/JCS-220094}, doi = {10.3233/JCS-220094}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhangZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZouZSSL24, author = {Qingtian Zou and Lan Zhang and Anoop Singhal and Xiaoyan Sun and Peng Liu}, title = {Analysis of neural network detectors for network attacks}, journal = {J. Comput. Secur.}, volume = {32}, number = {3}, pages = {193--220}, year = {2024}, url = {https://doi.org/10.3233/JCS-230031}, doi = {10.3233/JCS-230031}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZouZSSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.