Search dblp for Publications

export results for "toc:db/journals/jcs/jcs32.bht:"

 download as .bib file

@article{DBLP:journals/jcs/BasinDH24,
  author       = {David A. Basin and
                  S{\o}ren Debois and
                  Thomas T. Hildebrandt},
  title        = {Proactive enforcement of provisions and obligations},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {3},
  pages        = {247--289},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-210078},
  doi          = {10.3233/JCS-210078},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BasinDH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BreuerHPMW24,
  author       = {Malte Breuer and
                  Pascal Hein and
                  Leonardo Pompe and
                  Urike Meyer and
                  Susanne Wetzel},
  title        = {Prioritization and exchange chains in privacy-preserving kidney exchange},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {4},
  pages        = {349--404},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-230012},
  doi          = {10.3233/JCS-230012},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BreuerHPMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FalmariB24,
  author       = {Vinod Ramesh Falmari and
                  M. Brindha},
  title        = {Secure authentication protocols to resist off-line attacks on authentication
                  data table},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {53--76},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-210171},
  doi          = {10.3233/JCS-210171},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/FalmariB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FanWWWG24,
  author       = {Haopeng Fan and
                  Wenhao Wang and
                  Yongjuan Wang and
                  Xiangbin Wang and
                  Yang Gao},
  title        = {Cache attacks on subkey calculation of Blowfish},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {165--191},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-230052},
  doi          = {10.3233/JCS-230052},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FanWWWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GaoDWLLW24,
  author       = {Yan Gao and
                  Ruizhong Du and
                  Xiaofei Wang and
                  Ruilin Li and
                  Mingyue Li and
                  Ziyuan Wang},
  title        = {{DRC-EDI:} An integrity protection scheme based on data right confirmation
                  for mobile edge computing},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {4},
  pages        = {405--423},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220103},
  doi          = {10.3233/JCS-220103},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GaoDWLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GopeLYN24,
  author       = {Prosanta Gope and
                  Zhihui Lin and
                  Yang Yang and
                  Jianting Ning},
  title        = {E-Tenon: An efficient privacy-preserving secure open data sharing
                  scheme for {EHR} system},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {4},
  pages        = {319--348},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220097},
  doi          = {10.3233/JCS-220097},
  timestamp    = {Thu, 12 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GopeLYN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HuKJLLZH24,
  author       = {Yupeng Hu and
                  Wenxin Kuang and
                  Zhe Jin and
                  Wenjia Li and
                  Keqin Li and
                  Jiliang Zhang and
                  Qiao Hu},
  title        = {{SIAT:} {A} systematic inter-component communication real-time analysis
                  technique for detecting data leak threats on Android},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {3},
  pages        = {291--317},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220044},
  doi          = {10.3233/JCS-220044},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HuKJLLZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LuoZLYJ24,
  author       = {Jiale Luo and
                  Zhewngyu Zhang and
                  Jiesi Luo and
                  Pin Yang and
                  Runyu Jing},
  title        = {Sequence-based malware detection using a single-bidirectional graph
                  embedding and multi-task learning framework},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {141--163},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-230041},
  doi          = {10.3233/JCS-230041},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LuoZLYJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ObiriAAAA24,
  author       = {Isaac Amankona Obiri and
                  Abigail Akosua Addobea and
                  Eric Affum and
                  Jacob Ankamah and
                  Albert Kofi Kwansah Ansah},
  title        = {A certificateless signcryption with proxy-encryption for securing
                  agricultural data in the cloud},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {77--115},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220107},
  doi          = {10.3233/JCS-220107},
  timestamp    = {Sat, 06 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ObiriAAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WanjauWOM24,
  author       = {Stephen Kahara Wanjau and
                  Geoffrey Mariga Wambugu and
                  Aaron Mogeni Oirere and
                  Geoffrey Muchiri Muketha},
  title        = {Discriminative spatial-temporal feature learning for modeling network
                  intrusion detection systems},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {1--30},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220031},
  doi          = {10.3233/JCS-220031},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/WanjauWOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WeiC24,
  author       = {Jin Wei and
                  Ping Chen},
  title        = {{DSLR-:} {A} low-overhead data structure layout randomization for
                  defending data-oriented programming},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {3},
  pages        = {221--246},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-230053},
  doi          = {10.3233/JCS-230053},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WeiC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangWS24,
  author       = {Yubao Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {A multiview clustering framework for detecting deceptive reviews},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {31--52},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220001},
  doi          = {10.3233/JCS-220001},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangZX24,
  author       = {Jianfeng Zhang and
                  Wensheng Zhang and
                  Jingdong Xu},
  title        = {StegEraser: Defending cybersecurity against malicious covert communications},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {2},
  pages        = {117--139},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220094},
  doi          = {10.3233/JCS-220094},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZouZSSL24,
  author       = {Qingtian Zou and
                  Lan Zhang and
                  Anoop Singhal and
                  Xiaoyan Sun and
                  Peng Liu},
  title        = {Analysis of neural network detectors for network attacks},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {3},
  pages        = {193--220},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-230031},
  doi          = {10.3233/JCS-230031},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZouZSSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}