![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Cyber Security and Mobility, Volume 10
Volume 10, Number 1, 2021
- Niklas Bunzel, Martin Steinebach
, Huajian Liu
:
Cover-aware Steganalysis. 1-26 - Ludwig Englbrecht
, Günther Pernul
:
A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises. 27-64 - Zhen Li, Qi Liao
:
Game Theory of Data-selling Ransomware. 65-96 - Uwe Breidenbach
, Martin Steinebach
, Huajian Liu
:
Privacy-Enhanced Robust Image Hashing with Bloom Filters. 97-132 - Florian Platzer
, Marcel Schäfer, Martin Steinebach
:
Critical Traffic Analysis on the Tor Network. 133-160 - Joo Yeon Cho
, Andrew Sergeev
:
Post-quantum MACsec in Ethernet Networks. 161-176
- Shymalagowri Selvaganapathy
, G. Sudha Sadasivam
, Vinayakumar Ravi
:
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead. 177-230 - Charu Negi, Preeti Mishra, Pooja Chaudhary, Harsh Vardhan:
A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools. 231-260 - Zainab Rashid Alkindi
, Mohamed Sarrab, Nasser Alzeidi:
User Privacy and Data Flow Control for Android Apps: Systematic Literature Review. 261-304
Volume 10, Number 2, 2021
- Stéphane Mocanu
, Jean-Marc Thiriet
:
Real-Time Performance and Security of IEC 61850 Process Bus Communications. 305-346 - Emeline Marechal
, Benoit Donnet
:
Targeted Attack through Network Fingerprinting. 347-376
- Sihem Baccari, Mohamed Hadded
, Haifa Touati
, Paul Mühlethaler:
A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks. 377-402 - Rupali M. Chopade
, Vinod Keshaorao Pachghare:
Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries. 403-420 - Rupali M. Chopade
, Vinod Keshaorao Pachghare:
Data Tamper Detection from NoSQL Database in Forensic Environment. 421-450
- Yuji Sakurai
, Takuya Watanabe
, Tetsuya Okuda, Mitsuaki Akiyama
, Tatsuya Mori
:
Identifying the Phishing Websites Using the Patterns of TLS Certificates. 451-486
Volume 10, Number 3, 2021
- M. Raviraja Holla
, Alwyn R. Pais, Suma D.:
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images. 487-510
Volume 10, Number 4, 2021
- Rajeev Singh
, Sukhwinder Singh:
A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System. 641-662 - Adarsh Anand, Navneet Bhatt
, Jasmine Kaur
, Yoshinobu Tamura
:
Time Lag-Based Modelling for Software Vulnerability Exploitation Process. 663-678 - Nupur Goyal
, Tanuja Joshi, Mangey Ram
:
Evaluating and Improving a Content Delivery Network (CDN) Workflow using Stochastic Modelling. 679-698
- Bayisa Kune Mamade
, Diriba Mangasha Dabala
:
Exploring The Correlation between Cyber Security Awareness, Protection Measures and the State of Victimhood: The Case Study of Ambo University's Academic Staffs. 699-724
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.