default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 274 matches
- 2024
- Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher:
A Secure and Efficient Optimized Image Encryption Using Block Compressive Sensing and Logistic Map Method. J. Cyber Secur. Mobil. 13(5): 983-1006 (2024) - Qutaiba Kadhim Abed, Waleed Ameen Mahmoud Al-Jawher:
Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer. J. Cyber Secur. Mobil. 13(5): 1207-1238 (2024) - John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron-Acquah, Yaw Marfo Missah:
Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS. J. Cyber Secur. Mobil. 13(2): 265-282 (2024) - Herasym Dei, Dmytro Shvets, Nataliia Lytvyn, Olena Sytnichenko, Olena Kobus:
Legal Challenges and Perspectives of Cybersecurity in the System of State Governance of Educational Institutions in Ukraine. J. Cyber Secur. Mobil. 13(5): 963-982 (2024) - Yongsheng Deng:
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network. J. Cyber Secur. Mobil. 13(2): 327-348 (2024) - Zambia Diko, Khulumani Sibanda:
Comparative Analysis of Popular Supervised Machine Learning Algorithms for Detecting Malicious Universal Resource Locators. J. Cyber Secur. Mobil. 13(5): 1105-1128 (2024) - Nabeel Mahdy Haddad, Mustafa sabah Mustafa, Hayder Sabah Salih, Mustafa Musa Jaber, Mohammed Hasan Ali:
Analysis of the Security of Internet of Multimedia Things in Wireless Environment. J. Cyber Secur. Mobil. 13(1): 161-192 (2024) - Lamia Hamza, Mayliss Yousfi, Lynda Bounehar:
Partially Observable Stochastic Game for Analysing Complex Attacks in IoT Networks. J. Cyber Secur. Mobil. 13(5): 1039-1060 (2024) - Guoying Han, Bin Zhou, Yazi Zhang:
Application of Genetic Algorithm-Grey Wolf Optimization-Support Vector Machine Algorithm in Network Security Services Assessment and Prediction. J. Cyber Secur. Mobil. 13(5): 941-962 (2024) - Li He:
Design of a Lightweight Network Intrusion Detection System Based on Artificial Intelligence Technology. J. Cyber Secur. Mobil. 13(5): 1129-1148 (2024) - Botao Hou, Zhefeng Li, Xiaojun Zuo, Yuling Guo, Jianchun Zhou:
Application of Intelligent Cloud Computing Technology in Optical Communication Network Security of Smart Grid. J. Cyber Secur. Mobil. 13(4): 605-632 (2024) - Liusuo Huang, Yan Song:
Update Algorithm of Secure Computer Database Based on Deep Belief Network. J. Cyber Secur. Mobil. 13(1): 1-26 (2024) - Syed Shuja Hussain, Mohd Faizal Ab Razak, Ahmad Firdaus:
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review. J. Cyber Secur. Mobil. 13(1): 91-134 (2024) - Karam Mustafa Ignaim, João M. Fernandes:
Improving Incident Management Processes with Feature Models. J. Cyber Secur. Mobil. 13(4): 701-724 (2024) - Tayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane, Leïla Azouz Saïdane:
A Comprehensive Survey on Vehicular Communication Security. J. Cyber Secur. Mobil. 13(5): 1007-1038 (2024) - Yan Jiang, Jing Huang, Yunsong Fan, Xiaobin Zhu:
Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm. J. Cyber Secur. Mobil. 13(4): 677-700 (2024) - Wentao Li:
Construction and Analysis of QPSO-LSTM Model in Network Security Situation Prediction. J. Cyber Secur. Mobil. 13(3): 417-438 (2024) - Jiabin Li:
Attribute Based Signature Encryption Scheme Based on Cloud Computing in Medical Social Networks. J. Cyber Secur. Mobil. 13(3): 517-540 (2024) - Xiaowu Li:
Network Security Behavior Anomaly Detection Based on Improved Empirical Mode Decomposition. J. Cyber Secur. Mobil. 13(5): 917-940 (2024) - Jun Li, Weijun Huang:
A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion. J. Cyber Secur. Mobil. 13(3): 489-516 (2024) - Biaoqi Li, Min Xu, Yuan Zhou, Haibin Liu, Renlong Zhang:
Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm. J. Cyber Secur. Mobil. 13(2): 239-264 (2024) - Cheng Liu, Xuanxuan Che, Jianshe Xie, Yumin Dong:
A Multi-Path QKD Algorithm with Multiple Segments. J. Cyber Secur. Mobil. 13(2): 193-214 (2024) - Xiaoyan Luo:
Wireless Sensor Networks Security Enhancement Approach Based on Single Path Secure Routing Algorithm. J. Cyber Secur. Mobil. 13(5): 1085-1104 (2024) - Zhimin Lv, Jun Wan:
Intrusion Detection in Wireless Sensor Networks Based on IPSO-SVM Algorithm. J. Cyber Secur. Mobil. 13(4): 803-822 (2024) - Yanliu Nie:
Analysis and Research on Secure Access Control Technology of Industrial Internet of Things Based on ZTM Model. J. Cyber Secur. Mobil. 13(4): 585-604 (2024) - Donald R. Reising, Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, T. Daniel Loveless:
Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary. J. Cyber Secur. Mobil. 13(5): 887-916 (2024) - Vikash Kumar Singh, Durga Sivashankar, Kishlay Kundan, Sushmita Kumari:
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR. J. Cyber Secur. Mobil. 13(1): 135-160 (2024) - Xiaobo Song:
Analysis and Application of Chaotic Genetic Algorithm Based on Network Security in The Research of Resilience of Cluster Networks. J. Cyber Secur. Mobil. 13(4): 657-676 (2024) - Martin Steinebach:
Robustness and Collision-Resistance of PhotoDNA. J. Cyber Secur. Mobil. 13(3): 541-564 (2024) - Jianhua Wang:
Industrial Internet of Things ARP Virus Attack Detection Method Based on Improved CNN BiLSTM. J. Cyber Secur. Mobil. 13(5): 1173-1206 (2024)
skipping 244 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-28 00:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint