Search dblp for Publications

export results for "stream:streams/journals/istr:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/istr/AhmadYLCLUSWHLZSC24,
  author       = {Ijaz Ahmad and
                  Chen Yao and
                  Lin Li and
                  Yan Chen and
                  Zhenzhen Liu and
                  Inam Ullah and
                  Mohammad Shabaz and
                  Xin Wang and
                  Kaiyang Huang and
                  Guanglin Li and
                  Guoru Zhao and
                  Oluwarotimi Williams Samuel and
                  Shixiong Chen},
  title        = {An efficient feature selection and explainable classification method
                  for EEG-based epileptic seizure detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103654},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103654},
  doi          = {10.1016/J.JISA.2023.103654},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadYLCLUSWHLZSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Alawida24,
  author       = {Moatsum Alawida},
  title        = {Enhancing logistic chaotic map for improved cryptographic security
                  in random number generation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103685},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103685},
  doi          = {10.1016/J.JISA.2023.103685},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Alawida24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenZJTZ24,
  author       = {Jinliang Chen and
                  Tianqi Zhou and
                  Sai Ji and
                  Haowen Tan and
                  Wenying Zheng},
  title        = {Efficient public auditing scheme for non-administrator group with
                  secure user revocation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103676},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103676},
  doi          = {10.1016/J.JISA.2023.103676},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenZJTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DiroZSKP24,
  author       = {Abebe Abeshu Diro and
                  Lu Zhou and
                  Akanksha Saini and
                  Shahriar Kaisar and
                  Cong Hiep Pham},
  title        = {Leveraging zero knowledge proofs for blockchain-based identity sharing:
                  {A} survey of advancements, challenges and opportunities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103678},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103678},
  doi          = {10.1016/J.JISA.2023.103678},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DiroZSKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FahdAISK24,
  author       = {Shah Fahd and
                  Mehreen Afzal and
                  Waseem Iqbal and
                  Dawood Shah and
                  Ijaz Khalid},
  title        = {The reality of backdoored S-Boxes - An eye opener},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103674},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103674},
  doi          = {10.1016/J.JISA.2023.103674},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FahdAISK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GambhirDBSG24,
  author       = {Pooja Gambhir and
                  Amita Dev and
                  Poonam Bansal and
                  Deepak Kumar Sharma and
                  Deepak Gupta},
  title        = {Residual networks for text-independent speaker identification: Unleashing
                  the power of residual learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103665},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103665},
  doi          = {10.1016/J.JISA.2023.103665},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GambhirDBSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Hu24,
  author       = {Hwai{-}Tsu Hu},
  title        = {Synergistic compensation for RGB-based blind color image watermarking
                  to withstand {JPEG} compression},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103673},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103673},
  doi          = {10.1016/J.JISA.2023.103673},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Hu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaiphrakpamTPK24,
  author       = {Dolendro Singh Laiphrakpam and
                  Rohit Thingbaijam and
                  Ripon Patgiri and
                  Motilal Singh Khoirom},
  title        = {Cryptanalysis of cross-coupled chaotic maps multi-image encryption
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103694},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103694},
  doi          = {10.1016/J.JISA.2023.103694},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LaiphrakpamTPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LayeghyGP24,
  author       = {Siamak Layeghy and
                  Marcus Gallagher and
                  Marius Portmann},
  title        = {Benchmarking the benchmark - Comparing synthetic and real-world Network
                  {IDS} datasets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103689},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103689},
  doi          = {10.1016/J.JISA.2023.103689},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LayeghyGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiCG24,
  author       = {Xuelian Li and
                  Zhuohao Chen and
                  Juntao Gao},
  title        = {Ciphertext face recognition system based on secure inner product protocol},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103681},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103681},
  doi          = {10.1016/J.JISA.2023.103681},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinLLC24,
  author       = {Yijie Lin and
                  Chia{-}Chen Lin and
                  Jui{-}Chuan Liu and
                  Chin{-}Chen Chang},
  title        = {Verifiable (\emph{t, n}) Secret Image Sharing Scheme Based on Slim
                  Turtle Shell Matrix},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103679},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103679},
  doi          = {10.1016/J.JISA.2023.103679},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuZFHM24,
  author       = {Junming Liu and
                  Yuntao Zhao and
                  Yongxin Feng and
                  Yutao Hu and
                  Xiangyu Ma},
  title        = {SeMalBERT: Semantic-based malware detection with bidirectional encoder
                  representations from transformers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103690},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103690},
  doi          = {10.1016/J.JISA.2023.103690},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuZFHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahmanMKMN24,
  author       = {Mobashshirur Rahman and
                  Anita Murmu and
                  Piyush Kumar and
                  Nageswara Rao Moparthi and
                  Suyel Namasudra},
  title        = {A novel compression-based 2D-chaotic sine map for enhancing privacy
                  and security of biometric identification systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103677},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103677},
  doi          = {10.1016/J.JISA.2023.103677},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RahmanMKMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SadhukhanHP24,
  author       = {Payel Sadhukhan and
                  Labani Halder and
                  Sarbani Palit},
  title        = {Approximate {DBSCAN} on obfuscated data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103664},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103664},
  doi          = {10.1016/J.JISA.2023.103664},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SadhukhanHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SainiS24,
  author       = {Ankit Kumar Saini and
                  Samayveer Singh},
  title        = {{HSB} based reversible data hiding using sorting and pairwise expansion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103663},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103663},
  doi          = {10.1016/J.JISA.2023.103663},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SainiS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShiralyEP24,
  author       = {Danial Shiraly and
                  Ziba Eslami and
                  Nasrollah Pakniat},
  title        = {Certificate-based authenticated encryption with keyword search: Enhanced
                  security model and a concrete construction for Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103683},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103683},
  doi          = {10.1016/J.JISA.2023.103683},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShiralyEP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoiSMG24,
  author       = {Diego Soi and
                  Alessandro Sanna and
                  Davide Maiorca and
                  Giorgio Giacinto},
  title        = {Enhancing android malware detection explainability through function
                  call graph APIs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103691},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103691},
  doi          = {10.1016/J.JISA.2023.103691},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SoiSMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SongFZZCW24,
  author       = {Wei Song and
                  Chong Fu and
                  Yu Zheng and
                  Yanfeng Zhang and
                  Junxin Chen and
                  Peipei Wang},
  title        = {Batch image encryption using cross image permutation and diffusion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103686},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103686},
  doi          = {10.1016/J.JISA.2023.103686},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SongFZZCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangL24,
  author       = {Benxuan Wang and
                  Kwok{-}Tung Lo},
  title        = {Autoencoder-based joint image compression and encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103680},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103680},
  doi          = {10.1016/J.JISA.2023.103680},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WickramaarachchiZZX24,
  author       = {Wiraj Udara Wickramaarachchi and
                  Dongdong Zhao and
                  Junwei Zhou and
                  Jianwen Xiang},
  title        = {An effective iris biometric privacy protection scheme with renewability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103684},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103684},
  doi          = {10.1016/J.JISA.2023.103684},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WickramaarachchiZZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiangLRHZC24,
  author       = {Yuexin Xiang and
                  Tiantian Li and
                  Wei Ren and
                  Jie He and
                  Tianqing Zhu and
                  Kim{-}Kwang Raymond Choo},
  title        = {AdvEWM: Generating image adversarial examples by embedding digital
                  watermarks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103662},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103662},
  doi          = {10.1016/J.JISA.2023.103662},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XiangLRHZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YanTXQ24,
  author       = {Xueping Yan and
                  Lin Tan and
                  Hong Xu and
                  Wen{-}Feng Qi},
  title        = {Improved mixture differential attacks on 6-round AES-like ciphers
                  towards time and data complexities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103661},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103661},
  doi          = {10.1016/J.JISA.2023.103661},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YanTXQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZengFWWCZ24,
  author       = {Chunyan Zeng and
                  Shixiong Feng and
                  Zhifeng Wang and
                  Xiangkui Wan and
                  Yunfan Chen and
                  Nan Zhao},
  title        = {Spatio-temporal representation learning enhanced source cell-phone
                  recognition from speech recordings},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103672},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103672},
  doi          = {10.1016/J.JISA.2023.103672},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZengFWWCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZengXPZ24,
  author       = {ZengRi Zeng and
                  Peng Xun and
                  Wei Peng and
                  Baokang Zhao},
  title        = {Toward identifying malicious encrypted traffic with a causality detection
                  system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103644},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103644},
  doi          = {10.1016/J.JISA.2023.103644},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZengXPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangWWLM24,
  author       = {Jiawei Zhang and
                  Jinwei Wang and
                  Hao Wang and
                  Xiangyang Luo and
                  Bin Ma},
  title        = {Trustworthy adaptive adversarial perturbations in social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {80},
  pages        = {103675},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2023.103675},
  doi          = {10.1016/J.JISA.2023.103675},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangWWLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbdollahiHT23,
  author       = {Behnaz Abdollahi and
                  Ahad Harati and
                  Amir Hossein Taherinia},
  title        = {Image steganography based on smooth cycle-consistent adversarial learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103631},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103631},
  doi          = {10.1016/J.JISA.2023.103631},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AbdollahiHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AddobeaLOH23,
  author       = {Abigail Akosua Addobea and
                  Qianmu Li and
                  Isaac Amankona Obiri and
                  Jun Hou},
  title        = {Secure multi-factor access control mechanism for pairing blockchains},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103477},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103477},
  doi          = {10.1016/J.JISA.2023.103477},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AddobeaLOH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AffinitoZSBV23,
  author       = {Antonia Affinito and
                  Stefania Zinno and
                  Giovanni Stanco and
                  Alessio Botta and
                  Giorgio Ventre},
  title        = {The evolution of Mirai botnet scans over a six-year period},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103629},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103629},
  doi          = {10.1016/J.JISA.2023.103629},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AffinitoZSBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlaeiyanPP23,
  author       = {Mohammadhadi Alaeiyan and
                  Saeed Parsa and
                  Vinod P.},
  title        = {Sober: Explores for invasive behaviour of malware},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103451},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103451},
  doi          = {10.1016/J.JISA.2023.103451},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlaeiyanPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliHHHY23,
  author       = {Muqadar Ali and
                  Hongjie He and
                  Abid Hussain and
                  Mehboob Hussain and
                  Yuan Yuan},
  title        = {Efficient Secure Privacy Preserving Multi Keywords Rank Search over
                  Encrypted Data in Cloud Computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103500},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103500},
  doi          = {10.1016/J.JISA.2023.103500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AliHHHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AntwiBoasiakoZLD23,
  author       = {Emmanuel Antwi{-}Boasiako and
                  Shijie Zhou and
                  Yongjian Liao and
                  Yingjie Dong},
  title        = {Privacy-preserving distributed deep learning via LWE-based Certificateless
                  Additively Homomorphic Encryption {(CAHE)}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103462},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103462},
  doi          = {10.1016/J.JISA.2023.103462},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AntwiBoasiakoZLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnushiadeviA23,
  author       = {R. Anushiadevi and
                  Rengarajan Amirtharajan},
  title        = {Separable reversible data hiding in an encrypted image using the adjacency
                  pixel difference histogram},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103407},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103407},
  doi          = {10.1016/J.JISA.2022.103407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnushiadeviA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AroraRRG23,
  author       = {Jatin Arora and
                  Ketti Ramchandran Ramkumar and
                  Sathiyaraj R and
                  G. S. Pradeep Ghantasala},
  title        = {Securing web documents by using piggybacked framework based on Newton's
                  forward interpolation method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103498},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103498},
  doi          = {10.1016/J.JISA.2023.103498},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AroraRRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BagherL23,
  author       = {Kassem Bagher and
                  Shangqi Lai},
  title        = {SGX-Stream: {A} Secure Stream Analytics Framework In SGX-enabled Edge
                  Cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103403},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103403},
  doi          = {10.1016/J.JISA.2022.103403},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BagherL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BahaghighatGO23,
  author       = {Mahdi Bahaghighat and
                  Majid Ghasemi and
                  Figen {\"{O}}zen},
  title        = {A high-accuracy phishing website detection method based on machine
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103553},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103553},
  doi          = {10.1016/J.JISA.2023.103553},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BahaghighatGO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BakhtinaMS23,
  author       = {Mariia Bakhtina and
                  Raimundas Matulevicius and
                  Mari Seeba},
  title        = {Tool-supported method for privacy analysis of a business process model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103525},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103525},
  doi          = {10.1016/J.JISA.2023.103525},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BakhtinaMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BanikK23,
  author       = {Mandira Banik and
                  Sanjay Kumar},
  title        = {Blockchain-based public key encryption with keyword search for medical
                  data sharing in cloud environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103626},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103626},
  doi          = {10.1016/J.JISA.2023.103626},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BanikK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BeraPRDP23,
  author       = {Sourav Bera and
                  Suryakant Prasad and
                  Y. Sreenivasa Rao and
                  Ashok Kumar Das and
                  Youngho Park},
  title        = {Designing attribute-based verifiable data storage and retrieval scheme
                  in cloud computing environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103482},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103482},
  doi          = {10.1016/J.JISA.2023.103482},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BeraPRDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhowmikA23,
  author       = {Sandeep Bhowmik and
                  Sriyankar Acharyya},
  title        = {Image encryption approach using improved chaotic system incorporated
                  with differential evolution and genetic algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103391},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103391},
  doi          = {10.1016/J.JISA.2022.103391},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BhowmikA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BlundoC23,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Role mining under User-Distribution cardinality constraint},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103611},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103611},
  doi          = {10.1016/J.JISA.2023.103611},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BlundoC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BoulemtafesDC23,
  author       = {Amine Boulemtafes and
                  Abdelouahid Derhab and
                  Yacine Challal},
  title        = {PRIviLY: Private Remote Inference over fulLY connected deep networks
                  for pervasive health monitoring with constrained client-side},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103552},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103552},
  doi          = {10.1016/J.JISA.2023.103552},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BoulemtafesDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BuccafurriAL23,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Sara Lazzaro},
  title        = {Enabling anonymized open-data linkage by authorized parties},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103478},
  doi          = {10.1016/J.JISA.2023.103478},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BuccafurriAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChagantiRP23,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {A multi-view feature fusion approach for effective malware classification
                  using Deep Learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103402},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103402},
  doi          = {10.1016/J.JISA.2022.103402},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChagantiRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChakrabortyKC23,
  author       = {Ananya Chakraborty and
                  Mohit Kumar and
                  Nisha Chaurasia},
  title        = {Secure framework for IoT applications using Deep Learning in fog Computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103569},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103569},
  doi          = {10.1016/J.JISA.2023.103569},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChakrabortyKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChangLL23,
  author       = {Yuan Chang and
                  Jiliang Li and
                  Wenjuan Li},
  title        = {2D2PS: {A} demand-driven privacy-preserving scheme for anonymous data
                  sharing in smart grids},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103466},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103466},
  doi          = {10.1016/J.JISA.2023.103466},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChangLYP23,
  author       = {Wen Chang and
                  Zhen{-}Zhen Li and
                  Fu{-}Cheng You and
                  Xing{-}Bo Pan},
  title        = {Dynamic quantum fully homomorphic encryption scheme based on universal
                  quantum circuit},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103510},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103510},
  doi          = {10.1016/J.JISA.2023.103510},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChangLYP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChanuSC23,
  author       = {Usham Sanjota Chanu and
                  Khundrakpam Johnson Singh and
                  Yambem Jina Chanu},
  title        = {A dynamic feature selection technique to detect DDoS attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103445},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103445},
  doi          = {10.1016/J.JISA.2023.103445},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChanuSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaoHL23,
  author       = {Jedrik Chao and
                  Md. Shafaeat Hossain and
                  Lisa Lancor},
  title        = {Swipe gestures for user authentication in smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103450},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103450},
  doi          = {10.1016/J.JISA.2023.103450},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaoHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenYLTMJ23,
  author       = {Jiaqi Chen and
                  Chong Yuan and
                  Jiashuo Li and
                  Donghai Tian and
                  Rui Ma and
                  Xiaoqi Jia},
  title        = {{ELAMD:} An ensemble learning framework for adversarial malware defense},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103508},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103508},
  doi          = {10.1016/J.JISA.2023.103508},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenYLTMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenZWJ23,
  author       = {Jie Chen and
                  Haodi Zhang and
                  Shuai Wang and
                  Huamin Jin},
  title        = {A secure recharge scheme for blockchain payment channels},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103603},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103603},
  doi          = {10.1016/J.JISA.2023.103603},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenZWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenZZ23,
  author       = {Chao Chen and
                  Fangguo Zhang and
                  Changan Zhao},
  title        = {Isogeny computation on Kummer lines and applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103546},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103546},
  doi          = {10.1016/J.JISA.2023.103546},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenamA23,
  author       = {Venkata Bhikshapathi Chenam and
                  Syed Taqi Ali},
  title        = {A designated tester-based certificateless public key encryption with
                  conjunctive keyword search for cloud-based MIoT in dynamic multi-user
                  environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103377},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103377},
  doi          = {10.1016/J.JISA.2022.103377},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenamA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChockalingamPTG23,
  author       = {Sabarathinam Chockalingam and
                  Wolter Pieters and
                  Andr{\'{e}} M. H. Teixeira and
                  Pieter H. A. J. M. van Gelder},
  title        = {Probability elicitation for Bayesian networks to distinguish between
                  intentional attacks and accidental technical failures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103497},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103497},
  doi          = {10.1016/J.JISA.2023.103497},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChockalingamPTG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CuiWQQY23,
  author       = {Hui Cui and
                  Zhiguo Wan and
                  Huayi Qi and
                  Baodong Qin and
                  Xun Yi},
  title        = {Password-authenticated proofs of retrievability for multiple devices
                  checking cloud data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103480},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103480},
  doi          = {10.1016/J.JISA.2023.103480},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CuiWQQY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DashPSS23,
  author       = {Priyabrata Dash and
                  Fagul Pandey and
                  Monalisa Sarma and
                  Debasis Samanta},
  title        = {Efficient private key generation from iris data for privacy and security
                  applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103506},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103506},
  doi          = {10.1016/J.JISA.2023.103506},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DashPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DaubnerMMBMP23,
  author       = {Lukas Daubner and
                  Martin Mac{\'{a}}k and
                  Raimundas Matulevicius and
                  Barbora Buhnova and
                  Sofija Maksovic and
                  Tom{\'{a}}s Pitner},
  title        = {Addressing insider attacks via forensic-ready risk management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103433},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103433},
  doi          = {10.1016/J.JISA.2023.103433},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DaubnerMMBMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DebnathMD23,
  author       = {Sourabh Debnath and
                  Ramesh Kumar Mohapatra and
                  Ratnakar Dash},
  title        = {Secret data sharing through coverless video steganography based on
                  bit plane segmentation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103612},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103612},
  doi          = {10.1016/J.JISA.2023.103612},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DebnathMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeviSDTTA23,
  author       = {Kilari Jyothsna Devi and
                  Priyanka Singh and
                  Jatindra Kumar Dash and
                  Hiren Kumar Thakkar and
                  Sudeep Tanwar and
                  Abdulatif Alabdulatif},
  title        = {Secure transmission of medical images in multi-cloud e-healthcare
                  applications using data hiding scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103655},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103655},
  doi          = {10.1016/J.JISA.2023.103655},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DeviSDTTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DingX23,
  author       = {Zixuan Ding and
                  Qi Xie},
  title        = {Provably secure and lightweight three-factor authentication scheme
                  for industrial medical {CPS}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103656},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103656},
  doi          = {10.1016/J.JISA.2023.103656},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DingX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuLLT23,
  author       = {Ruizhong Du and
                  Na Liu and
                  Mingyue Li and
                  Junfeng Tian},
  title        = {Block verifiable dynamic searchable encryption using redactable blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103504},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103504},
  doi          = {10.1016/J.JISA.2023.103504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DuLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuSWW23,
  author       = {Ling Du and
                  Qiuchen Shang and
                  Ziwei Wang and
                  Xiaochao Wang},
  title        = {Robust image hashing based on multi-view dimension reduction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103578},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103578},
  doi          = {10.1016/J.JISA.2023.103578},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DuSWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuTL23,
  author       = {Ruizhong Du and
                  Yuchi Tai and
                  Mingyue Li},
  title        = {Refined statistical attacks against searchable symmetric encryption
                  using non-indexed documents},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103652},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103652},
  doi          = {10.1016/J.JISA.2023.103652},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DuTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DushkuRVBM23,
  author       = {Edlira Dushku and
                  Md Masoom Rabbani and
                  Jo Vliegen and
                  An Braeken and
                  Nele Mentens},
  title        = {{PROVE:} Provable remote attestation for public verifiability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103448},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103448},
  doi          = {10.1016/J.JISA.2023.103448},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DushkuRVBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuyKHHP23,
  author       = {Phan The Duy and
                  Nghi Hoang Khoa and
                  Do Thi Thu Hien and
                  Hien Do Hoang and
                  Van{-}Hau Pham},
  title        = {Investigating on the robustness of flow-based intrusion detection
                  system against adversarial samples using Generative Adversarial Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103472},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103472},
  doi          = {10.1016/J.JISA.2023.103472},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DuyKHHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EmamiYAA23,
  author       = {Ashkan Emami and
                  Habib Yajam and
                  Mohammad Ali Akhaee and
                  Rahim Asghari},
  title        = {A scalable decentralized privacy-preserving e-voting system based
                  on zero-knowledge off-chain computations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103645},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103645},
  doi          = {10.1016/J.JISA.2023.103645},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/EmamiYAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FaghihiZD23,
  author       = {Farnood Faghihi and
                  Mohammad Zulkernine and
                  Steven H. H. Ding},
  title        = {{AIM:} An Android Interpretable Malware detector based on application
                  class modeling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103486},
  doi          = {10.1016/J.JISA.2023.103486},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FaghihiZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarAH23,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Asaar and
                  Afrooz Haghbin},
  title        = {Distributed auditing protocol for untraceable transactions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103429},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103429},
  doi          = {10.1016/J.JISA.2023.103429},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FarAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FinoginaH23,
  author       = {Tamara Finogina and
                  Javier Herranz},
  title        = {On remote electronic voting with both coercion resistance and cast-as-intended
                  verifiability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103554},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103554},
  doi          = {10.1016/J.JISA.2023.103554},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FinoginaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GangulyMP23,
  author       = {Sreeparna Ganguly and
                  Imon Mukherjee and
                  Ashutosh Pati},
  title        = {Stegano-Purge: An integer wavelet transformation based adaptive universal
                  image sterilizer for steganography removal},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103586},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103586},
  doi          = {10.1016/J.JISA.2023.103586},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GangulyMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoWLC23,
  author       = {Mengnan Gao and
                  Lifa Wu and
                  Qi Li and
                  Wei Chen},
  title        = {Anomaly traffic detection in IoT security using graph neural networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103532},
  doi          = {10.1016/J.JISA.2023.103532},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GomezMCC23,
  author       = {{\'{A}}ngel Luis Perales G{\'{o}}mez and
                  Lorenzo Fern{\'{a}}ndez Maim{\'{o}} and
                  Alberto Huertas Celdr{\'{a}}n and
                  F{\'{e}}lix J. Garc{\'{\i}}a Clemente},
  title        = {{VAASI:} Crafting valid and abnormal adversarial samples for anomaly
                  detection systems in industrial scenarios},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103647},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103647},
  doi          = {10.1016/J.JISA.2023.103647},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GomezMCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuB23,
  author       = {Yuhao Gu and
                  Yuebin Bai},
  title        = {{LDIA:} Label distribution inference attack against federated learning
                  in edge computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103475},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103475},
  doi          = {10.1016/J.JISA.2023.103475},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuYSLL23,
  author       = {Xiaodan Gu and
                  Ming Yang and
                  Bingchen Song and
                  Wei Lan and
                  Zhen Ling},
  title        = {A practical multi-tab website fingerprinting attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103627},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103627},
  doi          = {10.1016/J.JISA.2023.103627},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GuYSLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoDZW23,
  author       = {Junyan Guo and
                  Ye Du and
                  Dawei Zhang and
                  Runfang Wu},
  title        = {{PSEEMV:} Provably secure and efficient emergency message verification
                  scheme based on {ECC} and {CRT} for Space Information Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103437},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103437},
  doi          = {10.1016/J.JISA.2023.103437},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoDZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWDPL23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Orr Dunkelman and
                  Yinxue Pan and
                  Shengyuan Liu},
  title        = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103406},
  doi          = {10.1016/J.JISA.2022.103406},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWTFZ23,
  author       = {Cheng Guo and
                  Litao Wang and
                  Xinyu Tang and
                  Bin Feng and
                  Guofeng Zhang},
  title        = {Two-party interactive secure deduplication with efficient data ownership
                  management in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103426},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103426},
  doi          = {10.1016/J.JISA.2023.103426},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWTFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoZZRTX23,
  author       = {Shuitao Guo and
                  Shijie Zhu and
                  Changqing Zhu and
                  Na Ren and
                  Wei Tang and
                  Dingjie Xu},
  title        = {A robust and lossless commutative encryption and watermarking algorithm
                  for vector geographic data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103503},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103503},
  doi          = {10.1016/J.JISA.2023.103503},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoZZRTX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HanXLJC23,
  author       = {Yunxia Han and
                  Chunxiang Xu and
                  Shanshan Li and
                  Changsong Jiang and
                  Kefei Chen},
  title        = {ttPAKE: Typo tolerance password-authenticated key exchange},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103658},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103658},
  doi          = {10.1016/J.JISA.2023.103658},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HanXLJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HanZJWLR23,
  author       = {Pengchong Han and
                  Zhouyang Zhang and
                  Shan Ji and
                  Xiaowan Wang and
                  Liang Liu and
                  Yongjun Ren},
  title        = {Access control mechanism for the Internet of Things based on blockchain
                  and inner product encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103446},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103446},
  doi          = {10.1016/J.JISA.2023.103446},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HanZJWLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HarissN23,
  author       = {Khalil Hariss and
                  Hassan N. Noura},
  title        = {Homomorphic additive lightweight block cipher scheme for securing
                  IoT applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103540},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103540},
  doi          = {10.1016/J.JISA.2023.103540},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HarissN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HarnHXXZP23,
  author       = {Lein Harn and
                  Chingfang Hsu and
                  Zhe Xia and
                  Hang Xu and
                  Shuchang Zeng and
                  Fengling Pang},
  title        = {Simple and efficient threshold changeable secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103576},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103576},
  doi          = {10.1016/J.JISA.2023.103576},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HarnHXXZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HasanLZ23,
  author       = {Hayyan Hasan and
                  Behrouz Tork Ladani and
                  Bahman Zamani},
  title        = {Maaker: {A} framework for detecting and defeating evasion techniques
                  in Android malware},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103617},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103617},
  doi          = {10.1016/J.JISA.2023.103617},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HasanLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HeXDZS23,
  author       = {Yuan He and
                  Chang{-}you Xing and
                  Ke Ding and
                  Guomin Zhang and
                  Lihua Song},
  title        = {A differential privacy based multi-stage network fingerprinting deception
                  game method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103460},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103460},
  doi          = {10.1016/J.JISA.2023.103460},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HeXDZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HemalathaMKGS23,
  author       = {J. Hemalatha and
                  Sekar Mohan and
                  Chandan Kumar and
                  Adnan Gutub and
                  Aditya Kumar Sahu},
  title        = {Towards improving the performance of blind image steganalyzer using
                  third-order {SPAM} features and ensemble classifier},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103541},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103541},
  doi          = {10.1016/J.JISA.2023.103541},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HemalathaMKGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HoglundFR23,
  author       = {Joel H{\"{o}}glund and
                  Martin Furuhed and
                  Shahid Raza},
  title        = {Lightweight certificate revocation for low-power IoT with end-to-end
                  security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103424},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103424},
  doi          = {10.1016/J.JISA.2023.103424},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HoglundFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouJS23,
  author       = {Xin Hou and
                  Xiaofeng Jia and
                  Jun Shao},
  title        = {Public key encryption with public-verifiable decryption delegation
                  and its application},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103513},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103513},
  doi          = {10.1016/J.JISA.2023.103513},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouMDWR23,
  author       = {Shen Hou and
                  Yanzhou Ma and
                  Ding Deng and
                  Zhenyu Wang and
                  Guolei Ren},
  title        = {Modeling and physical attack resistant authentication protocol with
                  double PUFs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103543},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103543},
  doi          = {10.1016/J.JISA.2023.103543},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouMDWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangDFHZ23,
  author       = {Wenhua Huang and
                  Hongyuan Du and
                  JingYu Feng and
                  Gang Han and
                  Wenbo Zhang},
  title        = {A dynamic anonymous authentication scheme with trusted fog computing
                  in {V2G} networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103648},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103648},
  doi          = {10.1016/J.JISA.2023.103648},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuangDFHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangXWLCK23,
  author       = {Lu Huang and
                  Jingfeng Xue and
                  Yong Wang and
                  Zhenyan Liu and
                  Junbao Chen and
                  Zixiao Kong},
  title        = {WHGDroid: Effective android malware detection based on weighted heterogeneous
                  graph},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103556},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103556},
  doi          = {10.1016/J.JISA.2023.103556},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangXWLCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HwangLLLWLC23,
  author       = {Ren{-}Hung Hwang and
                  Chieh{-}Lun Lee and
                  Ying{-}Dar Lin and
                  Po{-}Ching Lin and
                  Hsiao{-}Kuang Wu and
                  Yuan{-}Cheng Lai and
                  C. K. Chen},
  title        = {Host-based intrusion detection with multi-datasource and deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103625},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103625},
  doi          = {10.1016/J.JISA.2023.103625},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HwangLLLWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IshizakaF23,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  title        = {Wildcarded identity-based ring signatures based on linearly homomorphic
                  signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103499},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103499},
  doi          = {10.1016/J.JISA.2023.103499},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IshizakaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IslamUAS23,
  author       = {Md. Amirul Islam and
                  Ashraf Uddin and
                  Sunil Aryal and
                  Giovanni Stea},
  title        = {An ensemble learning approach for anomaly detection in credit card
                  data with imbalanced and overlapped classes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103618},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103618},
  doi          = {10.1016/J.JISA.2023.103618},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/IslamUAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ItalisPQ23,
  author       = {Olson Italis and
                  Samuel Pierre and
                  Alejandro Quintero},
  title        = {Privacy-preserving model for biometric-based authentication and Key
                  Derivation Function},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103624},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103624},
  doi          = {10.1016/J.JISA.2023.103624},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ItalisPQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JavanmardiSMPP23,
  author       = {Saeed Javanmardi and
                  Mohammad Shojafar and
                  Reza Mohammadi and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {S-FoS: {A} secure workflow scheduling approach for performance optimization
                  in SDN-based IoT-Fog networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103404},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103404},
  doi          = {10.1016/J.JISA.2022.103404},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JavanmardiSMPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiangXCC23,
  author       = {Changsong Jiang and
                  Chunxiang Xu and
                  Chenchen Cao and
                  Kefei Chen},
  title        = {{GAIN:} Decentralized Privacy-Preserving Federated Learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103615},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103615},
  doi          = {10.1016/J.JISA.2023.103615},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JiangXCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JinLCLS23,
  author       = {Shan Jin and
                  Yong Li and
                  Xi Chen and
                  Ruxian Li and
                  Zhibin Shen},
  title        = {Blockchain-based fairness-enhanced federated learning scheme against
                  label flipping attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103580},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103580},
  doi          = {10.1016/J.JISA.2023.103580},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JinLCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KaurHS23,
  author       = {Harmanjeet Kaur and
                  Nishtha Hooda and
                  Harpreet Singh},
  title        = {k-anonymization of social network data using Neural Network and {SVM:}
                  K-NeuroSVM},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103382},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103382},
  doi          = {10.1016/J.JISA.2022.103382},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KaurHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimYZJ23,
  author       = {Cheonshik Kim and
                  Ching{-}Nung Yang and
                  Zhili Zhou and
                  Ki{-}Hyun Jung},
  title        = {Dual efficient reversible data hiding using Hamming code and {OPAP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103544},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103544},
  doi          = {10.1016/J.JISA.2023.103544},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimYZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KocAK23,
  author       = {Basar Koc and
                  Ziya Arnavut and
                  H{\"{u}}seyin Ko{\c{c}}ak},
  title        = {Concurrent encryption and lossless compression using inversion ranks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103587},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103587},
  doi          = {10.1016/J.JISA.2023.103587},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KocAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KoshibaZB23,
  author       = {Takeshi Koshiba and
                  Behrouz Zolfaghari and
                  Khodakhast Bibak},
  title        = {A tradeoff paradigm shift in cryptographically-secure pseudorandom
                  number generation based on discrete logarithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103430},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103430},
  doi          = {10.1016/J.JISA.2023.103430},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KoshibaZB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarS23,
  author       = {Anmol Kumar and
                  Gaurav Somani},
  title        = {Service separation assisted DDoS attack mitigation in cloud targets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103435},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103435},
  doi          = {10.1016/J.JISA.2023.103435},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarSDJ23,
  author       = {Rajeev Kumar and
                  Deepak Sharma and
                  Amit Dua and
                  Ki{-}Hyun Jung},
  title        = {A review of different prediction methods for reversible data hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103572},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103572},
  doi          = {10.1016/J.JISA.2023.103572},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarSDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LauIACY23,
  author       = {Terry Shue Chien Lau and
                  Fedor Ivanov and
                  Muhammad Rezal Kamel Ariffin and
                  Ji{-}Jian Chin and
                  Timothy Tzen Vun Yap},
  title        = {New code-based cryptosystems via the {IKKR} framework},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103530},
  doi          = {10.1016/J.JISA.2023.103530},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LauIACY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeCCHFL23,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Wei{-}Che Hung and
                  Yun{-}Yi Fan and
                  Bo Li},
  title        = {Constructing gene features for robust 3D mesh zero-watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103414},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103414},
  doi          = {10.1016/J.JISA.2022.103414},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiBCFGE23,
  author       = {Li Li and
                  Yu Bai and
                  Ching{-}Chun Chang and
                  Yunyuan Fan and
                  Wei Gu and
                  Mahmoud Emam},
  title        = {Anti-pruning multi-watermarking for ownership proof of steganographic
                  autoencoders},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103548},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103548},
  doi          = {10.1016/J.JISA.2023.103548},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiBCFGE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiFQ23,
  author       = {Yingjie Li and
                  Yan Feng and
                  Quan Qian},
  title        = {FDPBoost: Federated differential privacy gradient boosting decision
                  trees},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103468},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103468},
  doi          = {10.1016/J.JISA.2023.103468},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiFQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLGW23,
  author       = {Xuelian Li and
                  Hui Li and
                  Juntao Gao and
                  Runsong Wang},
  title        = {Privacy preserving via multi-key homomorphic encryption in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103463},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103463},
  doi          = {10.1016/J.JISA.2023.103463},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiQXT23,
  author       = {Nan Li and
                  Jiaohua Qin and
                  Xuyu Xiang and
                  Yun Tan},
  title        = {Robust coverless video steganography based on inter-frame keypoint
                  matching},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103653},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103653},
  doi          = {10.1016/J.JISA.2023.103653},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiQXT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiW23,
  author       = {Yu Li and
                  Li{-}Ping Wang},
  title        = {Security analysis of the Classic McEliece, {HQC} and {BIKE} schemes
                  in low memory},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103651},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103651},
  doi          = {10.1016/J.JISA.2023.103651},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiZNY23,
  author       = {Jun Li and
                  Minqing Zhang and
                  Ke Niu and
                  Xiaoyuan Yang},
  title        = {Investigation on principles for cost assignment in motion vector-based
                  video steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103439},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103439},
  doi          = {10.1016/J.JISA.2023.103439},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiZNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiangLZW23,
  author       = {Yanrong Liang and
                  Yanping Li and
                  Kai Zhang and
                  Zhenqiang Wu},
  title        = {{VMSE:} Verifiable multi-keyword searchable encryption in multi-user
                  setting supporting keywords updating},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103518},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103518},
  doi          = {10.1016/J.JISA.2023.103518},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiangLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiangPLTBW23,
  author       = {Junying Liang and
                  Haipeng Peng and
                  Lixiang Li and
                  Fenghua Tong and
                  Shuang Bao and
                  Lanlan Wang},
  title        = {A secure and effective image encryption scheme by combining parallel
                  compressed sensing with secret sharing scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103487},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103487},
  doi          = {10.1016/J.JISA.2023.103487},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiangPLTBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiaoCWMZ23,
  author       = {Binjie Liao and
                  Hongyi Chen and
                  Yu Wang and
                  Weizhi Meng and
                  Jun Zhang},
  title        = {Analysis of hybrid attack and defense based on block withholding strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103620},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103620},
  doi          = {10.1016/J.JISA.2023.103620},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiaoCWMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinCH23,
  author       = {Jiang{-}Yi Lin and
                  Chin{-}Chen Chang and
                  Ji{-}Hwei Horng},
  title        = {Crypto-space image steganography based on blind flipping},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103660},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103660},
  doi          = {10.1016/J.JISA.2023.103660},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuCYGF23,
  author       = {Suhui Liu and
                  Liquan Chen and
                  Hongtao Yu and
                  Shang Gao and
                  Huiyu Fang},
  title        = {{BP-AKAA:} Blockchain-enforced Privacy-preserving Authentication and
                  Key Agreement and Access Control for IIoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103443},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103443},
  doi          = {10.1016/J.JISA.2023.103443},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuCYGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuLLY23,
  author       = {Mengjuan Liu and
                  Jiang Liu and
                  Chenyang Liu and
                  Kuo{-}Hui Yeh},
  title        = {A task-oriented neural dialogue system capable of knowledge accessing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103551},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103551},
  doi          = {10.1016/J.JISA.2023.103551},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuRCL23,
  author       = {Jiashuo Liu and
                  Jiongjiong Ren and
                  Shaozhen Chen and
                  ManMan Li},
  title        = {Improved neural distinguishers with multi-round and multi-splicing
                  construction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103461},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103461},
  doi          = {10.1016/J.JISA.2023.103461},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuRCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuSZ23,
  author       = {Yajing Liu and
                  Zhengya Sun and
                  Wensheng Zhang},
  title        = {Improving fraud detection via hierarchical attention-based Graph Neural
                  Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103399},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103399},
  doi          = {10.1016/J.JISA.2022.103399},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LopezCEPM23,
  author       = {Juan Manuel Esp{\'{\i}}n L{\'{o}}pez and
                  Alberto Huertas Celdr{\'{a}}n and
                  Francisco Esquembre and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Javier G. Mar{\'{\i}}n{-}Bl{\'{a}}zquez},
  title        = {{CGAPP:} {A} continuous group authentication privacy-preserving platform
                  for industrial scene},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103622},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103622},
  doi          = {10.1016/J.JISA.2023.103622},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LopezCEPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuoCY23,
  author       = {Pengcheng Luo and
                  Jian Chu and
                  Genke Yang},
  title        = {{IP} packet-level encrypted traffic classification using machine learning
                  with a light weight feature engineering method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103519},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103519},
  doi          = {10.1016/J.JISA.2023.103519},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LuoCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuoYYH23,
  author       = {Junwei Luo and
                  Xuechao Yang and
                  Xun Yi and
                  Fengling Han},
  title        = {Privacy-preserving recommendation system based on user classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103630},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103630},
  doi          = {10.1016/J.JISA.2023.103630},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LuoYYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuyenSP23,
  author       = {Cao Thi Luyen and
                  Nguyen Kim Sao and
                  At PhamVan},
  title        = {Dual-image reversible data hiding method using maximum embedding ability
                  of each pixel},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103470},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103470},
  doi          = {10.1016/J.JISA.2023.103470},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LuyenSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaDRA23,
  author       = {Tinghuai Ma and
                  Qian Deng and
                  Huan Rong and
                  Najla Al{-}Nabhan},
  title        = {A privacy-preserving trajectory data synthesis framework based on
                  differential privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103550},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103550},
  doi          = {10.1016/J.JISA.2023.103550},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaDRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaDXWLZ23,
  author       = {Bin Ma and
                  Kaixin Du and
                  Jian Xu and
                  Chunpeng Wang and
                  Jian Li and
                  Linna Zhou},
  title        = {A screen-shooting resilient data-hiding algorithm based on two-level
                  singular value decomposition},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103605},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103605},
  doi          = {10.1016/J.JISA.2023.103605},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaDXWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaZHLZLWHD23,
  author       = {Zhaorui Ma and
                  Shicheng Zhang and
                  Xinhao Hu and
                  Na Li and
                  Qinglei Zhou and
                  Fenlin Liu and
                  Hongjian Wang and
                  Guangwu Hu and
                  Qilin Dong},
  title        = {GWS-Geo: {A} graph neural network based model for street-level IPv6
                  geolocation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103511},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103511},
  doi          = {10.1016/J.JISA.2023.103511},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaZHLZLWHD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MallikarachchiWL23,
  author       = {Dilshani Mallikarachchi and
                  KokSheik Wong and
                  Joanne Mun{-}Yee Lim},
  title        = {An authentication scheme for {FANET} packet payload using data hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103559},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103559},
  doi          = {10.1016/J.JISA.2023.103559},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MallikarachchiWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MandalS23,
  author       = {Mriganka Mandal and
                  Ramprasad Sarkar},
  title        = {Efficient identity-based traceable cloud data broadcasting with outsider
                  anonymity and simultaneous individual transmission},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103584},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103584},
  doi          = {10.1016/J.JISA.2023.103584},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MandalS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McCarthyGAL23,
  author       = {Andrew McCarthy and
                  Essam Ghadafi and
                  Panagiotis Andriotis and
                  Phil Legg},
  title        = {Defending against adversarial machine learning attacks using hierarchical
                  learning: {A} case study on network traffic attack classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103398},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103398},
  doi          = {10.1016/J.JISA.2022.103398},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/McCarthyGAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MehmoodSCAKK23,
  author       = {Abid Mehmood and
                  Arslan Shafique and
                  Shehzad Ashraf Chaudhry and
                  Moatsum Alawida and
                  Abdul Nasir Khan and
                  Neeraj Kumar},
  title        = {A time-efficient and noise-resistant cryptosystem based on discrete
                  wavelet transform and chaos theory: An application in image encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103590},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103590},
  doi          = {10.1016/J.JISA.2023.103590},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MehmoodSCAKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MehtaSPSK23,
  author       = {Ravishankar Mehta and
                  Sindhuja Shukla and
                  Jitesh Pradhan and
                  Koushlendra Kumar Singh and
                  Abhinav Kumar},
  title        = {A vision transformer-based automated human identification using ear
                  biometrics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103599},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103599},
  doi          = {10.1016/J.JISA.2023.103599},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MehtaSPSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MeiLFZ23,
  author       = {Huan Mei and
                  Guanjun Lin and
                  Da Fang and
                  Jun Zhang},
  title        = {Detecting vulnerabilities in IoT software: New hybrid model and comprehensive
                  data analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103467},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103467},
  doi          = {10.1016/J.JISA.2023.103467},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MeiLFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MittalKB23,
  author       = {Meenakshi Mittal and
                  Krishan Kumar and
                  Sunny Behal},
  title        = {DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection
                  framework},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103609},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103609},
  doi          = {10.1016/J.JISA.2023.103609},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MittalKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohantyD23,
  author       = {Tapaswini Mohanty and
                  Sumit Kumar Debnath},
  title        = {An information-theoretically secure quantum multiparty private set
                  intersection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103623},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103623},
  doi          = {10.1016/J.JISA.2023.103623},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MohantyD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohantySMD23,
  author       = {Tapaswini Mohanty and
                  Vikas Srivastava and
                  Sihem Mesnager and
                  Sumit Kumar Debnath},
  title        = {A constant round quantum secure protocol for oblivious polynomial
                  evaluation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103560},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103560},
  doi          = {10.1016/J.JISA.2023.103560},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MohantySMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MsolliAHGMM23,
  author       = {Amina Msolli and
                  Nader Ajmi and
                  Abdelhamid Helali and
                  Abdelaziz Gassoumi and
                  Hassen Maaref and
                  Ridha Mghaieth},
  title        = {New key management scheme based on pool-hash for {WSN} and IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103415},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103415},
  doi          = {10.1016/J.JISA.2022.103415},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MsolliAHGMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NajafiB23,
  author       = {Zamineh Najafi and
                  Shahram Babaie},
  title        = {A lightweight hierarchical key management approach for internet of
                  things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103485},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103485},
  doi          = {10.1016/J.JISA.2023.103485},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NajafiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NayarT23,
  author       = {Gayathri R. Nayar and
                  Tony Thomas},
  title        = {Partial palm vein based biometric authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103390},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103390},
  doi          = {10.1016/J.JISA.2022.103390},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NayarT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NiCTWW23,
  author       = {Jiayi Ni and
                  Wei Chen and
                  Jiacheng Tong and
                  Haiyong Wang and
                  Lifa Wu},
  title        = {High-speed anomaly traffic detection based on staged frequency domain
                  features},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103575},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103575},
  doi          = {10.1016/J.JISA.2023.103575},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NiCTWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NikooghadamSS23,
  author       = {Mahdi Nikooghadam and
                  Hamid Reza Shahriari and
                  Saeid Tousi Saeidi},
  title        = {{HAKECC:} Highly efficient authentication and key agreement scheme
                  based on {ECDH} for {RFID} in {IOT} environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103523},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103523},
  doi          = {10.1016/J.JISA.2023.103523},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NikooghadamSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NiuLLDG23,
  author       = {Shufen Niu and
                  Qi Liu and
                  Wei Liu and
                  Runyuan Dong and
                  Peng Ge},
  title        = {Multi-party anonymous authentication scheme in heterogeneous network
                  slicing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103589},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103589},
  doi          = {10.1016/J.JISA.2023.103589},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NiuLLDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraSC23,
  author       = {Hassan N. Noura and
                  Ola Salman and
                  Ali Chehab},
  title        = {Conception of efficient key-dependent binary diffusion matrix structures
                  for dynamic cryptographic algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103514},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103514},
  doi          = {10.1016/J.JISA.2023.103514},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NouraSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PanR23,
  author       = {Ronghao Pan and
                  Antonio Ruiz{-}Mart{\'{\i}}nez},
  title        = {Evolution of web tracking protection in Chrome},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103643},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103643},
  doi          = {10.1016/J.JISA.2023.103643},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PanR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PanditKM23,
  author       = {Anupama Arjun Pandit and
                  Atul Kumar and
                  Arun Mishra},
  title        = {LWR-based Quantum-Safe Pseudo-Random Number Generator},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103431},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103431},
  doi          = {10.1016/J.JISA.2023.103431},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PanditKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PriscoSMZ23,
  author       = {Roberto De Prisco and
                  Alfredo De Santis and
                  Delfina Malandrino and
                  Rocco Zaccagnino},
  title        = {An improved privacy attack on smartphones exploiting the accelerometer},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103479},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103479},
  doi          = {10.1016/J.JISA.2023.103479},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PriscoSMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiZXWC23,
  author       = {Jianxiang Qi and
                  Ning Zheng and
                  Ming Xu and
                  Xiaodong Wang and
                  Yunzhi Chen},
  title        = {A multi-dimensional trust model for misbehavior detection in vehicular
                  ad hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103528},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103528},
  doi          = {10.1016/J.JISA.2023.103528},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiZXWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahmanMH23,
  author       = {Md. Bayazid Rahman and
                  Hossen Asiful Mustafa and
                  Md Delwar Hossain},
  title        = {Towards evaluating robustness of violence detection in videos using
                  cross-domain transferability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103583},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103583},
  doi          = {10.1016/J.JISA.2023.103583},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RahmanMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaiOCA23,
  author       = {Arun Kumar Rai and
                  Hari Om and
                  Satish Chand and
                  Saurabh Agarwal},
  title        = {Reversible data hiding in encrypted image using two-pass pixel value
                  ordering},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103545},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103545},
  doi          = {10.1016/J.JISA.2023.103545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaiOCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RajapakshaKAPM23,
  author       = {Sampath Rajapaksha and
                  Harsha Kalutarage and
                  M. Omar Al{-}Kadri and
                  Andrei Petrovski and
                  Garikayi Madzudzo},
  title        = {Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion
                  detection system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103570},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103570},
  doi          = {10.1016/J.JISA.2023.103570},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RajapakshaKAPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RanaPKWK23,
  author       = {Subhabrata Rana and
                  Fatemeh Khoda Parast and
                  Brett Kelly and
                  Yang Wang and
                  Kenneth B. Kent},
  title        = {A comprehensive survey of cryptography key management systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103607},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103607},
  doi          = {10.1016/J.JISA.2023.103607},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RanaPKWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RandiveMS23,
  author       = {Krunal Randive and
                  R. Mohan and
                  Ambairam Muthu Sivakrishna},
  title        = {An efficient pattern-based approach for insider threat classification
                  using the image-based feature representation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103434},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103434},
  doi          = {10.1016/J.JISA.2023.103434},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RandiveMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RewalSMPM23,
  author       = {Purva Rewal and
                  Mrityunjay Singh and
                  Dheerendra Mishra and
                  Komal Pursharthi and
                  Ankita Mishra},
  title        = {Quantum-safe three-party lattice based authenticated key agreement
                  protocol for mobile devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103505},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103505},
  doi          = {10.1016/J.JISA.2023.103505},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RewalSMPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RuiuLCG23,
  author       = {Pietro Ruiu and
                  Andrea Lagorio and
                  Marinella Cadoni and
                  Enrico Grosso},
  title        = {Enhancing eID card mobile-based authentication through 3D facial reconstruction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103577},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103577},
  doi          = {10.1016/J.JISA.2023.103577},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RuiuLCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahinA23,
  author       = {Meryem Soysaldi Sahin and
                  Sedat Akleylek},
  title        = {A survey of quantum secure group signature schemes: Lattice-based
                  approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103432},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103432},
  doi          = {10.1016/J.JISA.2023.103432},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SahinA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SakshiMS23,
  author       = {Sakshi and
                  Aruna Malik and
                  Ajay K. Sharma},
  title        = {Blockchain-based digital chain of custody multimedia evidence preservation
                  framework for internet-of-things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103579},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103579},
  doi          = {10.1016/J.JISA.2023.103579},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SakshiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaleemWI23,
  author       = {Mahreen Saleem and
                  M. R. Warsi and
                  Saiful Islam},
  title        = {Secure information processing for multimedia forensics using zero-trust
                  security model for large scale data analytics in SaaS cloud computing
                  environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103389},
  doi          = {10.1016/J.JISA.2022.103389},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SaleemWI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SangaviT23,
  author       = {V. Sangavi and
                  Palanivel Thangavel},
  title        = {An exquisite multiple image encryption harnessing multi-scroll Lu-Chen
                  and Chua chaotic systems employing domino strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103408},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103408},
  doi          = {10.1016/J.JISA.2022.103408},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SangaviT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderA23,
  author       = {Johannes Schneider and
                  Giovanni Apruzzese},
  title        = {Dual adversarial attacks: Fooling humans and classifiers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103502},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103502},
  doi          = {10.1016/J.JISA.2023.103502},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderB23,
  author       = {Johannes Schneider and
                  Frank Breitinger},
  title        = {Towards {AI} forensics: Did the artificial intelligence system do
                  it?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103517},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103517},
  doi          = {10.1016/J.JISA.2023.103517},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaP23,
  author       = {Payal Sharma and
                  B. R. Purushothama},
  title        = {Generalization of multicast encryption for Internet of Things deployment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103571},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103571},
  doi          = {10.1016/J.JISA.2023.103571},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShatnawiAATM23,
  author       = {Ahmed S. Shatnawi and
                  Mahmoud M. Almazari and
                  Zakarea AlShara and
                  Eyad Taqieddin and
                  Dheya Mustafa},
  title        = {{RSA} cryptanalysis - Fermat factorization exact bound and the role
                  of integer sequences in factorization problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103614},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103614},
  doi          = {10.1016/J.JISA.2023.103614},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShatnawiAATM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawD23,
  author       = {Surbhi Shaw and
                  Ratna Dutta},
  title        = {A quantum resistant multi-user signcryption scheme featuring key invisibility
                  for Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103549},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103549},
  doi          = {10.1016/J.JISA.2023.103549},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawkyUFIAAT23,
  author       = {Mahmoud A. Shawky and
                  Muhammad Usman and
                  David Flynn and
                  Muhammad Ali Imran and
                  Qammer H. Abbasi and
                  Shuja Ansari and
                  Ahmad Taha},
  title        = {Blockchain-based secret key extraction for efficient and secure authentication
                  in VANETs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103476},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103476},
  doi          = {10.1016/J.JISA.2023.103476},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawkyUFIAAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShenYTQ23,
  author       = {Xiaofeng Shen and
                  Heng Yao and
                  Shunquan Tan and
                  Chuan Qin},
  title        = {VHNet: {A} Video Hiding Network with robustness to video coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103515},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103515},
  doi          = {10.1016/J.JISA.2023.103515},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShenYTQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShengFLTCS23,
  author       = {Qingxin Sheng and
                  Chong Fu and
                  Zhaonan Lin and
                  Ming Tie and
                  Junxin Chen and
                  Chiu{-}Wing Sham},
  title        = {A one-time-pad-like chaotic image encryption scheme using data steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103592},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103592},
  doi          = {10.1016/J.JISA.2023.103592},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShengFLTCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghBSSZ23,
  author       = {Monu Singh and
                  Naman Baranwal and
                  Kedar Nath Singh and
                  Amit Kumar Singh and
                  Huiyu Zhou},
  title        = {Deep learning-based biometric image feature extraction for securing
                  medical images through data hiding and joint encryption-compression},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103628},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103628},
  doi          = {10.1016/J.JISA.2023.103628},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SinghBSSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoltaniOSJ23,
  author       = {Mahdi Soltani and
                  Behzad Ousat and
                  Mahdi Jafari Siavoshani and
                  Amir Hossein Jahangir},
  title        = {An adaptable deep learning-based intrusion detection system to zero-day
                  attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103516},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103516},
  doi          = {10.1016/J.JISA.2023.103516},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SoltaniOSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SrivastavaDTS23,
  author       = {Vikas Srivastava and
                  Sumit Kumar Debnath and
                  Sharwan K. Tiwari and
                  Harshdeep Singh},
  title        = {On the security of multivariate-based ring signature and other related
                  primitives},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103474},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103474},
  doi          = {10.1016/J.JISA.2023.103474},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SrivastavaDTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StepniakM23,
  author       = {Mateusz Stepniak and
                  Jakub Mielczarek},
  title        = {Analysis of multiple overlapping paths algorithms for secure key exchange
                  in large-scale quantum networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103581},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103581},
  doi          = {10.1016/J.JISA.2023.103581},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/StepniakM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SuLZWW23,
  author       = {Zhaopin Su and
                  Mengke Li and
                  Guofu Zhang and
                  Qinfang Wu and
                  Yaofei Wang},
  title        = {Robust audio copy-move forgery detection on short forged slices using
                  sliding window},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103507},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103507},
  doi          = {10.1016/J.JISA.2023.103507},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SuLZWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunTZCLW23,
  author       = {Xiaobing Sun and
                  Liangqiong Tu and
                  Jiale Zhang and
                  Jie Cai and
                  Bin Li and
                  Yu Wang},
  title        = {\emph{ASSBert}: Active and semi-supervised bert for smart contract
                  vulnerability detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103423},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103423},
  doi          = {10.1016/J.JISA.2023.103423},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SunTZCLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunZWJZ23,
  author       = {Jintong Sun and
                  Fucai Zhou and
                  Qiang Wang and
                  Zi Jiao and
                  Yun Zhang},
  title        = {Flexible revocation and verifiability for outsourced Private Set Intersection
                  computation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103438},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103438},
  doi          = {10.1016/J.JISA.2023.103438},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SunZWJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SwethaAU23,
  author       = {Gadde Swetha and
                  J. Amutharaj and
                  S. Usha},
  title        = {A security model to protect the isolation of medical data in the cloud
                  using hybrid cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103412},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103412},
  doi          = {10.1016/J.JISA.2022.103412},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SwethaAU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TalukderHIUAYAM23,
  author       = {Md. Alamin Talukder and
                  Khondokar Fida Hasan and
                  Md. Manowarul Islam and
                  Ashraf Uddin and
                  Arnisha Akhter and
                  Mohammand Abu Yousuf and
                  Fares Alharbi and
                  Mohammad Ali Moni},
  title        = {A dependable hybrid machine learning model for network intrusion detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103405},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103405},
  doi          = {10.1016/J.JISA.2022.103405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TalukderHIUAYAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TangCLWT23,
  author       = {Zongwei Tang and
                  Xiuli Chai and
                  Yang Lu and
                  Binjie Wang and
                  Yong Tan},
  title        = {An end-to-end screen shooting resilient blind watermarking scheme
                  for medical images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103547},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103547},
  doi          = {10.1016/J.JISA.2023.103547},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TangCLWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TeganeSB23,
  author       = {Saher Tegane and
                  Fouzi Semchedine and
                  Abdelmalek Boudries},
  title        = {An extended Attribute-based access control with controlled delegation
                  in IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103473},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103473},
  doi          = {10.1016/J.JISA.2023.103473},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TeganeSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TengTJ23,
  author       = {Weijian Teng and
                  Je Sen Teh and
                  Norziana Jamil},
  title        = {On the security of lightweight block ciphers against neural distinguishers:
                  Observations on LBC-IoT and {SLIM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103531},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103531},
  doi          = {10.1016/J.JISA.2023.103531},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TengTJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ThakorRDP23,
  author       = {Vishal A. Thakor and
                  Mohammad Abdur Razzaque and
                  Anand D. Darji and
                  Aksh R. Patel},
  title        = {A novel 5-bit S-box design for lightweight cryptography algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103444},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103444},
  doi          = {10.1016/J.JISA.2023.103444},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ThakorRDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TianGJLY23,
  author       = {Pengxu Tian and
                  Cheng Guo and
                  Yingmo Jie and
                  Yining Liu and
                  Lin Yao},
  title        = {Scan-free verifiable public-key searchable encryption supporting efficient
                  user updates in distributed systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103471},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103471},
  doi          = {10.1016/J.JISA.2023.103471},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TianGJLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TongXHWR23,
  author       = {Yan Tong and
                  Shiwei Xu and
                  Jinzhou Huang and
                  Bangju Wang and
                  Zhengwei Ren},
  title        = {A new analysis of small S-boxes based on a new notion of algebraic
                  immunity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103574},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103574},
  doi          = {10.1016/J.JISA.2023.103574},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TongXHWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TuZHCZ23,
  author       = {Tengfei Tu and
                  Hua Zhang and
                  Yangye Hu and
                  Dong Cui and
                  Xilin Zhai},
  title        = {A detector for Android repackaged applications with layout-fingerprint},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103527},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103527},
  doi          = {10.1016/J.JISA.2023.103527},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TuZHCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TundisSM23,
  author       = {Andrea Tundis and
                  Ahmed Ali Shams and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {From the detection towards a pyramidal classification of terrorist
                  propaganda},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103646},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103646},
  doi          = {10.1016/J.JISA.2023.103646},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TundisSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VadigiSMDB23,
  author       = {Sreekanth Vadigi and
                  Kamalakanta Sethi and
                  Dinesh Mohanty and
                  Shom Prasad Das and
                  Padmalochan Bera},
  title        = {Federated reinforcement learning based intrusion detection system
                  using dynamic attention mechanism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103608},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103608},
  doi          = {10.1016/J.JISA.2023.103608},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VadigiSMDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VashishthaCR23,
  author       = {Lalit Kumar Vashishtha and
                  Kakali Chatterjee and
                  Siddhartha Suman Rout},
  title        = {An Ensemble approach for advance malware memory analysis using Image
                  classification techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103561},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103561},
  doi          = {10.1016/J.JISA.2023.103561},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VashishthaCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VazaoSCR23,
  author       = {Ana Paula Vaz{\~{a}}o and
                  Leonel Santos and
                  Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and
                  Carlos Rabad{\~{a}}o},
  title        = {Implementing and evaluating a GDPR-compliant open-source {SIEM} solution},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103509},
  doi          = {10.1016/J.JISA.2023.103509},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VazaoSCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VeigaFHW23,
  author       = {Ad{\'{e}}le da Veiga and
                  Steven Furnell and
                  Yuxiang Hong and
                  Merrill Warkentin},
  title        = {Introduction to the special issue on insider threats in cybersecurity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103585},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103585},
  doi          = {10.1016/J.JISA.2023.103585},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VeigaFHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangCW23,
  author       = {Yefan Wang and
                  Jiale Chen and
                  Jun Wang},
  title        = {Visually meaningful image encryption based on 2D compressive sensing
                  and dynamic embedding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103613},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103613},
  doi          = {10.1016/J.JISA.2023.103613},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangCWYXS23,
  author       = {Nai Wang and
                  Junjun Chen and
                  Di Wu and
                  Wencheng Yang and
                  Yong Xiang and
                  Atul Sajjanhar},
  title        = {Hybrid {KD-NFT:} {A} multi-layered {NFT} assisted robust Knowledge
                  Distillation framework for Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103483},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103483},
  doi          = {10.1016/J.JISA.2023.103483},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangCWYXS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCHH23,
  author       = {Zheng Wang and
                  Bin Liu and
                  Jingzhao Chen and
                  Weihua Huang and
                  Yong Hu},
  title        = {Nash mixed detection strategy of multi-type network attack based on
                  zero-sum stochastic game},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103436},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103436},
  doi          = {10.1016/J.JISA.2023.103436},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLTFY23,
  author       = {Qinglong Wang and
                  YongYong Li and
                  Zhiqiang Tan and
                  Na Fan and
                  GuDi Yao},
  title        = {Conditional privacy-preserving authentication scheme for {V2V} communication
                  without pseudonyms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103616},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103616},
  doi          = {10.1016/J.JISA.2023.103616},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLTFY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLZWLLM23,
  author       = {Yazhou Wang and
                  Bing Li and
                  Yan Zhang and
                  Jiaxin Wu and
                  Guozhu Liu and
                  Yuqi Li and
                  Zhen Mao},
  title        = {A novel blockchain's private key generation mechanism based on facial
                  biometrics and physical unclonable function},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103610},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103610},
  doi          = {10.1016/J.JISA.2023.103610},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLZWLLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangQXTP23,
  author       = {Zhangdong Wang and
                  Jiaohua Qin and
                  Xuyu Xiang and
                  Yun Tan and
                  Jia Peng},
  title        = {A privacy-preserving cross-media retrieval on encrypted data in cloud
                  computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103440},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103440},
  doi          = {10.1016/J.JISA.2023.103440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangQXTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWZD23,
  author       = {Junxin Wang and
                  Shangping Wang and
                  Qian Zhang and
                  Yinjuan Deng},
  title        = {A two-layer consortium blockchain with transaction privacy protection
                  based on sharding technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103452},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103452},
  doi          = {10.1016/J.JISA.2023.103452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangXTYZY23,
  author       = {Yongjun Wang and
                  Kun Xiong and
                  Yongli Tang and
                  Li Yang and
                  Jing Zhang and
                  Xixi Yan},
  title        = {More efficient constant-round secure multi-party computation based
                  on optimized Tiny-OT and half-gate},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103650},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103650},
  doi          = {10.1016/J.JISA.2023.103650},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangXTYZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZL23,
  author       = {Yihao Wang and
                  Ru Zhang and
                  Jianyi Liu},
  title        = {V-A3tS: {A} rapid text steganalysis method based on position information
                  and variable parameter multi-head self-attention controlled by length},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103512},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103512},
  doi          = {10.1016/J.JISA.2023.103512},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WenDXCZW23,
  author       = {Xueyuan Wen and
                  Kaiyan Dai and
                  Qi Xiong and
                  Lili Chen and
                  Jian Zhang and
                  Zhen Wang},
  title        = {An approach to internal threats detection based on sentiment analysis
                  and network analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103557},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103557},
  doi          = {10.1016/J.JISA.2023.103557},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WenDXCZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WenGGL23,
  author       = {Yamin Wen and
                  Jinyu Guo and
                  Zheng Gong and
                  Cong Lin},
  title        = {A new Private Mutual Authentication scheme with group discovery},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103558},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103558},
  doi          = {10.1016/J.JISA.2023.103558},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WenGGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuG23,
  author       = {Zhijun Wu and
                  Junjun Guo},
  title        = {{MFPD-LSTM:} {A} steganalysis method based on multiple features of
                  pitch delay using {RNN-LSTM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103469},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103469},
  doi          = {10.1016/J.JISA.2023.103469},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuYCL23,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Hong{-}Wu Cai and
                  Yanxiao Liu},
  title        = {A hybrid approach combining data hiding with visual cryptography for
                  secure extraction of data hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103520},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103520},
  doi          = {10.1016/J.JISA.2023.103520},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuYCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZZYL23,
  author       = {Bolun Wu and
                  Futai Zou and
                  Chengwei Zhang and
                  Tangda Yu and
                  Yun Li},
  title        = {Multi-field relation mining for malicious {HTTP} traffic detection
                  based on attention and cross network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103411},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103411},
  doi          = {10.1016/J.JISA.2022.103411},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiaCYW23,
  author       = {Ming Xia and
                  Jiyou Chen and
                  Gaobo Yang and
                  Shuai Wang},
  title        = {Robust detection of seam carving with low ratio via pixel adjacency
                  subtraction and CNN-based transfer learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103522},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103522},
  doi          = {10.1016/J.JISA.2023.103522},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiaCYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiaZWG23,
  author       = {Xiaofan Xia and
                  Songsong Zhang and
                  Kunshu Wang and
                  Tiegang Gao},
  title        = {A novel color image tampering detection and self-recovery based on
                  fragile watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103619},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103619},
  doi          = {10.1016/J.JISA.2023.103619},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XiaZWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XieSZWG23,
  author       = {Chenlu Xie and
                  Runhua Shi and
                  XiaoXu Zhang and
                  Pengbo Wang and
                  WanPeng Guo},
  title        = {Verifiable outsourcing EMRs scheme with attribute-based encryption
                  in cloud-edge environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103526},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103526},
  doi          = {10.1016/J.JISA.2023.103526},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XieSZWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuJWSHG23,
  author       = {Guangwei Xu and
                  Wenrui Ji and
                  Yan Wang and
                  Xiujin Shi and
                  Qiubo Huang and
                  Yanglan Gan},
  title        = {Searchable encryption algorithm based on key aggregation of multiple
                  data owners in data sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103600},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103600},
  doi          = {10.1016/J.JISA.2023.103600},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuJWSHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuNLH23,
  author       = {Han Xu and
                  Priyadarsi Nanda and
                  Jie Liang and
                  Xiangjian He},
  title        = {FCH, an incentive framework for data-owner dominated federated learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103521},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103521},
  doi          = {10.1016/J.JISA.2023.103521},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuNLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuTWAW23,
  author       = {Kexin Xu and
                  Benjamin Hong Meng Tan and
                  Li{-}Ping Wang and
                  Khin Mi Mi Aung and
                  Huaxiong Wang},
  title        = {Privacy-preserving outsourcing decision tree evaluation from homomorphic
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103582},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103582},
  doi          = {10.1016/J.JISA.2023.103582},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuTWAW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YanK23,
  author       = {Shin{-}Hung Yan and
                  Cooper Cheng{-}Yuan Ku},
  title        = {Using language-specific input methods and pronunciation rules to improve
                  the guesses of passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103588},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103588},
  doi          = {10.1016/J.JISA.2023.103588},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YanK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YanLISH23,
  author       = {Fei Yan and
                  Nianqiao Li and
                  Abdullah M. Iliyasu and
                  Ahmed S. Salama and
                  Kaoru Hirota},
  title        = {Insights into security and privacy issues in smart healthcare systems
                  based on medical images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103621},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103621},
  doi          = {10.1016/J.JISA.2023.103621},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YanLISH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLK23,
  author       = {Ching{-}Nung Yang and
                  Peng Li and
                  Hsin{-}Chuan Kuo},
  title        = {(\emph{k, n}) secret image sharing scheme with privileged set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103413},
  doi          = {10.1016/J.JISA.2022.103413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangTZZ23,
  author       = {Nan Yang and
                  Youliang Tian and
                  Zhou Zhou and
                  Qijia Zhang},
  title        = {A provably secure collusion-resistant identity-based proxy re-encryption
                  scheme based on {NTRU}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103604},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103604},
  doi          = {10.1016/J.JISA.2023.103604},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangTZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWHYC23,
  author       = {Dongmei Yang and
                  Jianghong Wei and
                  Xuexian Hu and
                  Kuiwu Yang and
                  Yue Chen},
  title        = {System-widely and fine-grained forward secure identity-based signature
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103659},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103659},
  doi          = {10.1016/J.JISA.2023.103659},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangWHYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWQL23,
  author       = {Zeyu Yang and
                  Ziqing Wang and
                  Fei Qiu and
                  Fagen Li},
  title        = {A group key agreement protocol based on {ECDH} and short signature},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103388},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103388},
  doi          = {10.1016/J.JISA.2022.103388},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangWQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangXWH23,
  author       = {Lin Yang and
                  Dawen Xu and
                  Rangding Wang and
                  Songhan He},
  title        = {Adaptive {HEVC} video steganography based on distortion compensation
                  optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103442},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103442},
  doi          = {10.1016/J.JISA.2023.103442},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangXWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YaoRWWYY23,
  author       = {Siyu Yao and
                  Yizhi Ren and
                  Dong Wang and
                  Yeru Wang and
                  Weifeng Yin and
                  Lifeng Yuan},
  title        = {{SNN-PPRL:} {A} secure record matching scheme based on siamese neural
                  network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103529},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103529},
  doi          = {10.1016/J.JISA.2023.103529},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YaoRWWYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Yin23,
  author       = {Haotian Yin},
  title        = {Security analysis of Bluetooth Secure Simple Pairing protocols with
                  extended threat model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103385},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103385},
  doi          = {10.1016/J.JISA.2022.103385},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Yin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuCTYZ23,
  author       = {Jiarui Yu and
                  Jingsong Cui and
                  Hang Tu and
                  Chunwu Yu and
                  Man Zhou},
  title        = {A {SM2} based efficient and lightweight batch verification approach
                  for {IC} cards},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103409},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103409},
  doi          = {10.1016/J.JISA.2022.103409},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuCTYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuH23,
  author       = {Huifang Yu and
                  Wenxuan Hui},
  title        = {Certificateless ring signature from {NTRU} lattice for electronic
                  voting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103496},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103496},
  doi          = {10.1016/J.JISA.2023.103496},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuLW23,
  author       = {Huifang Yu and
                  Junze Liu and
                  Zhicang Wang},
  title        = {Certificateless multi-source elliptic curve ring signcryption for
                  cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103449},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103449},
  doi          = {10.1016/J.JISA.2023.103449},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuanHHDCX23,
  author       = {Zhanwei Yuan and
                  Shufeng Huang and
                  Linqing Huang and
                  Yuxiao Du and
                  Shuting Cai and
                  Xiaoming Xiong},
  title        = {Safe-LBP: {A} visually meaningful image encryption scheme based on
                  {LBP} and compressive sensing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103591},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103591},
  doi          = {10.1016/J.JISA.2023.103591},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YuanHHDCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZambranoTTYV23,
  author       = {Patricio Zambrano and
                  Jenny Torres and
                  Luis Tello{-}Oquendo and
                  {\'{A}}ngel Y{\'{a}}nez and
                  Luis Vel{\'{a}}squez},
  title        = {On the modeling of cyber-attacks associated with social engineering:
                  {A} parental control prototype},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103501},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103501},
  doi          = {10.1016/J.JISA.2023.103501},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZambranoTTYV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCLCYG23,
  author       = {Bo Zhang and
                  Helei Cui and
                  Xiaoning Liu and
                  Yaxing Chen and
                  Zhiwen Yu and
                  Bin Guo},
  title        = {Decentralized and secure deduplication with dynamic ownership in MLaaS},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103524},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103524},
  doi          = {10.1016/J.JISA.2023.103524},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCLCYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangFZH23,
  author       = {Qiuyu Zhang and
                  Minrui Fu and
                  Zhenyu Zhao and
                  Yibo Huang},
  title        = {Searchable encryption over encrypted speech retrieval scheme in cloud
                  storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103542},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103542},
  doi          = {10.1016/J.JISA.2023.103542},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangFZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLXBWD23,
  author       = {Lianming Zhang and
                  Kui Liu and
                  Xiaowei Xie and
                  Wenji Bai and
                  Baolin Wu and
                  Pingping Dong},
  title        = {A data-driven network intrusion detection system using feature selection
                  and deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {78},
  pages        = {103606},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103606},
  doi          = {10.1016/J.JISA.2023.103606},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLXBWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLZZLY23,
  author       = {Jinghui Zhang and
                  Boxi Liang and
                  Hancheng Zhang and
                  Wei Zhang and
                  Zhen Ling and
                  Ming Yang},
  title        = {Mobile applications identification using autoencoder based electromagnetic
                  side channel analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103481},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103481},
  doi          = {10.1016/J.JISA.2023.103481},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLZZLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangSM23,
  author       = {Hua Zhang and
                  Huiying Sun and
                  Fanli Meng},
  title        = {Reversible data hiding scheme based on improved interpolation and
                  three-in-one intelligent strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103573},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103573},
  doi          = {10.1016/J.JISA.2023.103573},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTLLWZL23,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Mingfeng Lu and
                  Lu Liu and
                  Dianxin Wang and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Towards interpreting vulnerability of object detection models via
                  adversarial distillation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103410},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103410},
  doi          = {10.1016/J.JISA.2022.103410},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangWZW23,
  author       = {Ziming Zhang and
                  Wenjia Wang and
                  Zihan Zhao and
                  Erfu Wang},
  title        = {PVO-based reversible data hiding using bit plane segmentation and
                  pixel expansion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103649},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103649},
  doi          = {10.1016/J.JISA.2023.103649},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangWZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangZFL23,
  author       = {Hengyan Zhang and
                  Weizhe Zhang and
                  Yuming Feng and
                  Yang Liu},
  title        = {SVScanner: Detecting smart contract vulnerabilities via deep semantic
                  extraction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103484},
  doi          = {10.1016/J.JISA.2023.103484},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangZFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaoDTLYW23,
  author       = {Meng Zhao and
                  Yong Ding and
                  Shijie Tang and
                  Hai Liang and
                  Changsong Yang and
                  Huiyong Wang},
  title        = {Dual-server certificateless public key encryption with authorized
                  equality test for outsourced IoT data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103441},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103441},
  doi          = {10.1016/J.JISA.2023.103441},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaoDTLYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Zheng23,
  author       = {Mengce Zheng},
  title        = {Generalized implicit-key attacks on {RSA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103562},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103562},
  doi          = {10.1016/J.JISA.2023.103562},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Zheng23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhengLLLL23,
  author       = {Long Zheng and
                  Zhi Li and
                  Ruwei Luo and
                  Zhangyu Liu and
                  Changhong Li},
  title        = {VSTNet: Robust watermarking scheme based on voxel space transformation
                  for diffusion tensor imaging images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {79},
  pages        = {103657},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103657},
  doi          = {10.1016/J.JISA.2023.103657},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhengLLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouHCY23,
  author       = {Xiaoyu Zhou and
                  Wien Hong and
                  Tung{-}Shou Chen and
                  Guangsong Yang},
  title        = {Reversible demosaiced image authentication scheme with recoverability
                  using clustering and matching techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103425},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103425},
  doi          = {10.1016/J.JISA.2023.103425},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouHCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouHHGXWW23,
  author       = {Kuo Zhou and
                  Jing Huang and
                  Honggui Han and
                  Bei Gong and
                  Ao Xiong and
                  Wei Wang and
                  Qihui Wu},
  title        = {Smart contracts vulnerability detection model based on adversarial
                  multi-task learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103555},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103555},
  doi          = {10.1016/J.JISA.2023.103555},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouHHGXWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouLLPLX23,
  author       = {Junwei Zhou and
                  Botian Lei and
                  Huile Lang and
                  Emmanouil Panaousis and
                  Kaitai Liang and
                  Jianwen Xiang},
  title        = {Secure genotype imputation using homomorphic encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103386},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103386},
  doi          = {10.1016/J.JISA.2022.103386},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouLLPLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0002P22,
  author       = {Peter Sabev and
                  Milen Petrov},
  title        = {Android Password Managers and Vault Applications: Data Storage Security
                  Issues Identification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103152},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103152},
  doi          = {10.1016/J.JISA.2022.103152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0002P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Abd-El-Atty22,
  author       = {Bassem Abd{-}El{-}Atty},
  title        = {Quaternion with quantum walks for designing a novel color image cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103367},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103367},
  doi          = {10.1016/J.JISA.2022.103367},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Abd-El-Atty22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbdollahiHT22,
  author       = {Behnaz Abdollahi and
                  Ahad Harati and
                  Amirhossein Taherinia},
  title        = {Non-additive image steganographic framework based on variational inference
                  in Markov Random Fields},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103254},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103254},
  doi          = {10.1016/J.JISA.2022.103254},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AbdollahiHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbdullahiSWYWW22,
  author       = {Sani M. Abdullahi and
                  Shuifa Sun and
                  Yifei Wang and
                  Pengpeng Yang and
                  HuaZheng Wang and
                  Beng Wang},
  title        = {A hybrid {BTP} approach with filtered {BCH} codes for improved performance
                  and security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103355},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103355},
  doi          = {10.1016/J.JISA.2022.103355},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AbdullahiSWYWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbuAlghanamQAS22,
  author       = {Orieb AbuAlghanam and
                  Mohammad Qatawneh and
                  Wesam Almobaideen and
                  Maha Saadeh},
  title        = {A new hierarchical architecture and protocol for key distribution
                  in the context of IoT-based smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103173},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103173},
  doi          = {10.1016/J.JISA.2022.103173},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AbuAlghanamQAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhalawatBTP22,
  author       = {Anchal Ahalawat and
                  Korra Sathya Babu and
                  Ashok Kumar Turuk and
                  Sanjeev Patel},
  title        = {A low-rate DDoS detection and mitigation for {SDN} using Renyi Entropy
                  with Packet Drop},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103212},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103212},
  doi          = {10.1016/J.JISA.2022.103212},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhalawatBTP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhalawatBTP22a,
  author       = {Anchal Ahalawat and
                  Korra Sathya Babu and
                  Ashok Kumar Turuk and
                  Sanjeev Patel},
  title        = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN}
                  using Renyi Entropy with Packet Drop" [Journal of Information Security
                  and Applications 68 {(2022)} 103212]},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103344},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103344},
  doi          = {10.1016/J.JISA.2022.103344},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadA0T22,
  author       = {Rasheed Ahmad and
                  Izzat Alsmadi and
                  Wasim Alhamdani and
                  Lo'ai Tawalbeh},
  title        = {A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103196},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103196},
  doi          = {10.1016/J.JISA.2022.103196},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadA0T22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadUAK22,
  author       = {Syed Jalal Ahmad and
                  Ishrath Unissa and
                  M. Shoukath Ali and
                  Abhay Kumar},
  title        = {Enhanced security to MANETs using digital codes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103147},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103147},
  doi          = {10.1016/J.JISA.2022.103147},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadUAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhvanooeyZMLKCC22,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Wojciech Mazurczyk and
                  Qianmu Li and
                  Max Kilger and
                  Kim{-}Kwang Raymond Choo and
                  Mauro Conti},
  title        = {CovertSYS: {A} systematic covert communication approach for providing
                  secure end-to-end conversation via social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103368},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103368},
  doi          = {10.1016/J.JISA.2022.103368},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhvanooeyZMLKCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AkleylekS22,
  author       = {Sedat Akleylek and
                  Meryem Soysaldi},
  title        = {A new lattice-based authentication scheme for IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103053},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103053},
  doi          = {10.1016/J.JISA.2021.103053},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AkleylekS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Al-DweikHMM22,
  author       = {Ahmad Y. Al{-}Dweik and
                  Iqtadar Hussain and
                  Moutaz Saleh Mustafa and
                  M. T. Mustafa},
  title        = {A novel method to generate key-dependent s-boxes with identical algebraic
                  properties},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103065},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103065},
  doi          = {10.1016/J.JISA.2021.103065},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Al-DweikHMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Al-OdatKA22,
  author       = {Zeyad A. Al{-}Odat and
                  Samee U. Khan and
                  Eman Al{-}qtiemat},
  title        = {A modified secure hash design to circumvent collision and length extension
                  attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103376},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103376},
  doi          = {10.1016/J.JISA.2022.103376},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Al-OdatKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlguliyevAO22,
  author       = {Rasim M. Alguliyev and
                  Fargana J. Abdullayeva and
                  Sabira S. Ojagverdiyeva},
  title        = {Image-based malicious Internet content filtering method for child
                  protection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103123},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103123},
  doi          = {10.1016/J.JISA.2022.103123},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlguliyevAO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliIA22,
  author       = {Noor Ul Ain Ali and
                  Waseem Iqbal and
                  Hammad Afzal},
  title        = {Carving of the {OOXML} document from volatile memory using unsupervised
                  learning techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103096},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103096},
  doi          = {10.1016/J.JISA.2021.103096},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AliIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliSLMV22,
  author       = {Mohammad Ali and
                  Mohammadreza Sadeghi and
                  Ximeng Liu and
                  Yinbin Miao and
                  Athanasios V. Vasilakos},
  title        = {Verifiable online/offline multi-keyword search for cloud-assisted
                  Industrial Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103101},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103101},
  doi          = {10.1016/J.JISA.2021.103101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AliSLMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlorainiJRB22,
  author       = {Fatimah Aloraini and
                  Amir Javed and
                  Omer F. Rana and
                  Pete Burnap},
  title        = {Adversarial machine learning in IoT from an insider point of view},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103341},
  doi          = {10.1016/J.JISA.2022.103341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlsuhibanyP22,
  author       = {Suliman A. Alsuhibany and
                  Mohammad Tanvir Parvez},
  title        = {Attack-filtered interactive arabic CAPTCHAs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103318},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103318},
  doi          = {10.1016/J.JISA.2022.103318},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlsuhibanyP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Anagnostopoulos22,
  author       = {Marios Anagnostopoulos and
                  Stavros Lagos and
                  Georgios Kambourakis},
  title        = {Large-scale empirical evaluation of {DNS} and {SSDP} amplification
                  attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103168},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103168},
  doi          = {10.1016/J.JISA.2022.103168},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Anagnostopoulos22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ArtilesCP22,
  author       = {Jos{\'{e}} A. P. Artiles and
                  Daniel Pedro Bezerra Chaves and
                  Cecilio Pimentel},
  title        = {Robust image watermarking algorithm using chaotic sequences},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103219},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103219},
  doi          = {10.1016/J.JISA.2022.103219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ArtilesCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BG22,
  author       = {Suma B and
                  Shobha G},
  title        = {Fractional salp swarm algorithm: An association rule based privacy-preserving
                  strategy for data sanitization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103224},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103224},
  doi          = {10.1016/J.JISA.2022.103224},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bagherpour22,
  author       = {Bagher Bagherpour},
  title        = {An efficient verifiable secret redistribution scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103295},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103295},
  doi          = {10.1016/J.JISA.2022.103295},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Bagherpour22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bagherpour22a,
  author       = {Bagher Bagherpour},
  title        = {Corrigendum to "An efficient verifiable secret redistribution scheme"
                  [Journal of information security and applications, 69 {(2022)103295]}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103356},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103356},
  doi          = {10.1016/J.JISA.2022.103356},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Bagherpour22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BahramiG22,
  author       = {Somaye Bahrami and
                  Reza Ghasemi},
  title        = {A new secure and searchable data outsourcing leveraging a Bucket-Chain
                  index tree},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103206},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103206},
  doi          = {10.1016/J.JISA.2022.103206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BahramiG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BaiCDFZ22,
  author       = {Xuemei Bai and
                  Yong Chen and
                  Gangpeng Duan and
                  Chao Feng and
                  Wanli Zhang},
  title        = {A data hiding scheme based on the difference of image interpolation
                  algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103068},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103068},
  doi          = {10.1016/J.JISA.2021.103068},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BaiCDFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BarenghiCMPPS22,
  author       = {Alessandro Barenghi and
                  Diego Carrera and
                  Silvia Mella and
                  Andrea Pace and
                  Gerardo Pelosi and
                  Ruggero Susella},
  title        = {Profiled side channel attacks against the {RSA} cryptosystem using
                  neural networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103122},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103122},
  doi          = {10.1016/J.JISA.2022.103122},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BarenghiCMPPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BatistaMS22,
  author       = {Edgar Batista and
                  Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and
                  Agusti Solanas},
  title        = {Privacy-preserving process mining: {A} microaggregation-based approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103235},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103235},
  doi          = {10.1016/J.JISA.2022.103235},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BatistaMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BelaziKATXIE22,
  author       = {Akram Belazi and
                  Sofiane Kharbech and
                  Md Nazish Aslam and
                  Muhammad Talha and
                  Wei Xiang and
                  Abdullah M. Iliyasu and
                  Ahmed A. Abd El{-}Latif},
  title        = {Improved Sine-Tangent chaotic map with application in medical images
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103131},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103131},
  doi          = {10.1016/J.JISA.2022.103131},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BelaziKATXIE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BensaoudK22,
  author       = {Ahmed Bensaoud and
                  Jugal Kalita},
  title        = {Deep multi-task learning for malware image classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103057},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103057},
  doi          = {10.1016/J.JISA.2021.103057},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BensaoudK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BharathirajaKGH22,
  author       = {S. Bharathiraja and
                  B. Rajesh Kanna and
                  S. Geetha and
                  M. Hariharan},
  title        = {Exposing digital image forgeries from statistical footprints},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103273},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103273},
  doi          = {10.1016/J.JISA.2022.103273},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BharathirajaKGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhattacharyaRDC22,
  author       = {Munmun Bhattacharya and
                  Sandip Roy and
                  Ashok Kumar Das and
                  Samiran Chattopadhyay and
                  Soumya Banerjee and
                  Ankush Mitra},
  title        = {DDoS attack resisting authentication protocol for mobile based online
                  social network applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103115},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103115},
  doi          = {10.1016/J.JISA.2022.103115},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BhattacharyaRDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BlancoGRPPMTF22,
  author       = {Carlos Blanco and
                  Diego Garc{\'{\i}}a{-}Saiz and
                  David Garcia Rosado and
                  Antonio Santos{-}Olmo and
                  Jes{\'{u}}s Peral and
                  Alejandro Mat{\'{e}} and
                  Juan Trujillo and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Security policies by design in NoSQL document databases},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103120},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103120},
  doi          = {10.1016/J.JISA.2022.103120},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BlancoGRPPMTF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BoseM22,
  author       = {Anirban Bose and
                  Santi P. Maity},
  title        = {Secure sparse watermarking on {DWT-SVD} for digital images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103255},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103255},
  doi          = {10.1016/J.JISA.2022.103255},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BoseM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BrahimiM22,
  author       = {Mohamed Amine Brahimi and
                  Fatiha Merazka},
  title        = {Data confidentiality-preserving schemes for random linear network
                  coding-capable networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103136},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103136},
  doi          = {10.1016/J.JISA.2022.103136},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BrahimiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChagantiRP22,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {Image-based malware representation approach with EfficientNet convolutional
                  neural networks for effective malware classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103306},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103306},
  doi          = {10.1016/J.JISA.2022.103306},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChagantiRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaiLPLZ22,
  author       = {Tingting Chai and
                  Jiahui Li and
                  Shitala Prasad and
                  Qi Lu and
                  Zhaoxin Zhang},
  title        = {Shape-driven lightweight {CNN} for finger-vein biometrics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103211},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103211},
  doi          = {10.1016/J.JISA.2022.103211},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaiLPLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChangMLZW22,
  author       = {Zhuo Chang and
                  Yan Meng and
                  Wenyuan Liu and
                  Haojin Zhu and
                  Lin Wang},
  title        = {WiCapose: Multi-modal fusion based transparent authentication in mobile
                  environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103130},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103130},
  doi          = {10.1016/J.JISA.2022.103130},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChangMLZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChatzoglouKK22,
  author       = {Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  title        = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103058},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103058},
  doi          = {10.1016/J.JISA.2021.103058},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChefranovO22,
  author       = {Alexander G. Chefranov and
                  G{\"{u}}rc{\"{u}} {\"{O}}z},
  title        = {Adaptive to pixel value and pixel value difference irreversible spatial
                  data hiding method using modified {LSB} for grayscale images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103314},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103314},
  doi          = {10.1016/J.JISA.2022.103314},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChefranovO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenALCLSC22,
  author       = {Zigang Chen and
                  Jin Ao and
                  Wenjun Luo and
                  Zhiquan Cheng and
                  Yuhong Liu and
                  Kai Sheng and
                  Long Chen},
  title        = {A dual-factor access authentication scheme for IoT terminal in 5G
                  environments with network slice selection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103247},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103247},
  doi          = {10.1016/J.JISA.2022.103247},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenALCLSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenC22,
  author       = {Sisheng Chen and
                  Chin{-}Chen Chang},
  title        = {Reversible data hiding in encrypted images using block-based adaptive
                  MSBs prediction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103297},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103297},
  doi          = {10.1016/J.JISA.2022.103297},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCX22,
  author       = {Long Chen and
                  Jianguo Chen and
                  Chunhe Xia},
  title        = {Social network behavior and public opinion manipulation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103060},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103060},
  doi          = {10.1016/J.JISA.2021.103060},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenGTD22,
  author       = {Jinhai Chen and
                  Zheng Gong and
                  Yufeng Tang and
                  Xinfeng Dong},
  title        = {A comprehensive analysis of lightweight 8-bit sboxes from iterative
                  structures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103302},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103302},
  doi          = {10.1016/J.JISA.2022.103302},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenGTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenHSJX22,
  author       = {Aidong Chen and
                  Chen Hong and
                  Xinna Shang and
                  Hongyuan Jing and
                  Sen Xu},
  title        = {Timing leakage to break {SM2} signature algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103210},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103210},
  doi          = {10.1016/J.JISA.2022.103210},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenHSJX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenLXW22,
  author       = {Biwen Chen and
                  Xue Li and
                  Tao Xiang and
                  Peng Wang},
  title        = {{SBRAC:} Blockchain-based sealed-bid auction with bidding price privacy
                  and public verifiability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103082},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103082},
  doi          = {10.1016/J.JISA.2021.103082},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenLXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenN22,
  author       = {Liqun Chen and
                  Siaw{-}Lynn Ng},
  title        = {Securing emergent behaviour in swarm robotics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103047},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103047},
  doi          = {10.1016/J.JISA.2021.103047},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenXMZWLSX22,
  author       = {Li{-}Bo Chen and
                  Yihang Xia and
                  Zhenbang Ma and
                  Ruijie Zhao and
                  Yanhao Wang and
                  Yue Liu and
                  Wenqi Sun and
                  Zhi Xue},
  title        = {{SEAF:} {A} Scalable, Efficient, and Application-independent Framework
                  for container security detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103351},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103351},
  doi          = {10.1016/J.JISA.2022.103351},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenXMZWLSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenYXGH22,
  author       = {Jiyou Chen and
                  Gaobo Yang and
                  Ming Xia and
                  Zhiqing Guo and
                  Tianqiang Huang},
  title        = {HDNet: {A} dual-stream network with progressive fusion for image hazing
                  detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103271},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103271},
  doi          = {10.1016/J.JISA.2022.103271},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenYXGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChengYLSX22,
  author       = {Jingwen Cheng and
                  Xuehu Yan and
                  Lintao Liu and
                  Yuyuan Sun and
                  Fengyue Xing},
  title        = {Comprehensive reversible secret image sharing with palette cover images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103233},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103233},
  doi          = {10.1016/J.JISA.2022.103233},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChengYLSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChouhanPB22,
  author       = {Vikas Chouhan and
                  Sateesh Kumar Peddoju and
                  Rajkumar Buyya},
  title        = {\emph{dualDup}: {A} secure and reliable cloud storage framework to
                  deduplicate the encrypted data and key},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103265},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103265},
  doi          = {10.1016/J.JISA.2022.103265},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChouhanPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ContiVV22,
  author       = {Mauro Conti and
                  P. Vinod and
                  Alessio Vitella},
  title        = {Obfuscation detection in Android applications using deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103311},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103311},
  doi          = {10.1016/J.JISA.2022.103311},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ContiVV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CoruhB22,
  author       = {Ugur Coruh and
                  Oguz Bayat},
  title        = {{ESAR:} Enhanced Secure Authentication and Revocation Scheme for Vehicular
                  Ad Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103081},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103081},
  doi          = {10.1016/J.JISA.2021.103081},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CoruhB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DebnathSMKS22,
  author       = {Sumit Kumar Debnath and
                  Vikas Srivastava and
                  Tapaswini Mohanty and
                  Nibedita Kundu and
                  Kouichi Sakurai},
  title        = {Quantum secure privacy preserving technique to obtain the intersection
                  of two datasets for contact tracing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103127},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103127},
  doi          = {10.1016/J.JISA.2022.103127},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DebnathSMKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeverashettiKP22,
  author       = {Mounika Deverashetti and
                  Ranjitha K. and
                  K. V. Pradeepthi},
  title        = {Security analysis of menstruation cycle tracking applications using
                  static, dynamic and machine learning techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103171},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103171},
  doi          = {10.1016/J.JISA.2022.103171},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeverashettiKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeviRS22,
  author       = {Anju Devi and
                  Geetanjali Rathee and
                  Hemraj Saini},
  title        = {Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using {DPSO}
                  and {M-ITA} Algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103094},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103094},
  doi          = {10.1016/J.JISA.2021.103094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeviRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeyDSS22,
  author       = {Kunal Dey and
                  Sumit Kumar Debnath and
                  Pantelimon Stanica and
                  Vikas Srivastava},
  title        = {A post-quantum signcryption scheme using isogeny based cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103280},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103280},
  doi          = {10.1016/J.JISA.2022.103280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeyDSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Diaz-HonrubiaBS22,
  author       = {Antonio Jes{\'{u}}s D{\'{\i}}az{-}Honrubia and
                  Alberto Bl{\'{a}}zquez{-}Herranz and
                  Luc{\'{\i}}a Prieto Santamar{\'{\i}}a and
                  Ernestina Menasalvas Ruiz and
                  Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and
                  Gustavo {Gonzalez Granadillo} and
                  Rodrigo Diaz and
                  Emmanouil Panaousis and
                  Christos Xenakis},
  title        = {A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery
                  Tool},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103350},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103350},
  doi          = {10.1016/J.JISA.2022.103350},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Diaz-HonrubiaBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DingL22,
  author       = {Qingfeng Ding and
                  Jinguo Li},
  title        = {AnoGLA: An efficient scheme to improve network anomaly detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103149},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103149},
  doi          = {10.1016/J.JISA.2022.103149},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DingL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DouYLX22,
  author       = {Hanyue Dou and
                  Lingyuan Yin and
                  Yuan Lu and
                  Jing Xu},
  title        = {A probabilistic Proof-of-Stake protocol with fast confirmation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103268},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103268},
  doi          = {10.1016/J.JISA.2022.103268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DouYLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuWZLBL22,
  author       = {Zhenyu Du and
                  Xingxing Wei and
                  Weiming Zhang and
                  Fangzheng Liu and
                  Huanyu Bian and
                  Jiayang Liu},
  title        = {A motional but temporally consistent physical video examples},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103278},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103278},
  doi          = {10.1016/J.JISA.2022.103278},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DuWZLBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuyHHNP22,
  author       = {Phan The Duy and
                  Hien Do Hoang and
                  Do Thi Thu Hien and
                  Anh Gia{-}Tuan Nguyen and
                  Van{-}Hau Pham},
  title        = {{B-DAC:} {A} decentralized access control framework on Northbound
                  interface for securing {SDN} using blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103080},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103080},
  doi          = {10.1016/J.JISA.2021.103080},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DuyHHNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ErolaAGC22,
  author       = {Arnau Erola and
                  Ioannis Agrafiotis and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Insider-threat detection: Lessons from deploying the {CITD} tool in
                  three multinational organisations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103167},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103167},
  doi          = {10.1016/J.JISA.2022.103167},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ErolaAGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FanPZDZ22,
  author       = {Guojun Fan and
                  Zhibin Pan and
                  Quan Zhou and
                  Jing Dong and
                  Xiaoran Zhang},
  title        = {Reversible data hiding in multispectral images for satellite communications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103180},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103180},
  doi          = {10.1016/J.JISA.2022.103180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FanPZDZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarzadniaSN22,
  author       = {Ehsan Farzadnia and
                  Hossein Shirazi and
                  Alireza Nowroozi},
  title        = {Corrigendum to 'A novel sophisticated hybrid method for intrusion
                  detection using the artificial immune system': Journal of Information
                  Security and Applications Volume 58, May 2021, 102721},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103349},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103349},
  doi          = {10.1016/J.JISA.2022.103349},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Figueras-Martin22,
  author       = {Emilio Figueras{-}Mart{\'{\i}}n and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Juan Boubeta{-}Puig},
  title        = {Drawing the web structure and content analysis beyond the Tor darknet:
                  Freenet as a case of study},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103229},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103229},
  doi          = {10.1016/J.JISA.2022.103229},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Figueras-Martin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GanganAL22,
  author       = {Manjary P. Gangan and
                  K. Anoop and
                  Lajish V. L.},
  title        = {Distinguishing natural and computer generated images using Multi-Colorspace
                  fused EfficientNet},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103261},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103261},
  doi          = {10.1016/J.JISA.2022.103261},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GanganAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoA22,
  author       = {Guangyong Gao and
                  Lord Amoah},
  title        = {Automatic contrast enhancement with reversible data hiding using bi-histogram
                  shifting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103223},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103223},
  doi          = {10.1016/J.JISA.2022.103223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoHSH22,
  author       = {Xianwei Gao and
                  Changzhen Hu and
                  Chun Shan and
                  Weijie Han},
  title        = {MaliCage: {A} packed malware family classification framework based
                  on {DNN} and {GAN}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103267},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103267},
  doi          = {10.1016/J.JISA.2022.103267},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoHSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoLF22,
  author       = {Jian Gao and
                  Zhi Li and
                  Bin Fan},
  title        = {An efficient robust zero watermarking scheme for diffusion tensor-Magnetic
                  resonance imaging high-dimensional data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103106},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103106},
  doi          = {10.1016/J.JISA.2021.103106},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuBX22,
  author       = {Yuhao Gu and
                  Yuebin Bai and
                  Shubin Xu},
  title        = {{CS-MIA:} Membership inference attack based on prediction confidence
                  series in federated learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103201},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103201},
  doi          = {10.1016/J.JISA.2022.103201},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuBX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaRMC22,
  author       = {Sandeep Gupta and
                  Kiran B. Raja and
                  Fabio Martinelli and
                  Bruno Crispo},
  title        = {RiderAuth: {A} cancelable touch-signature based rider authentication
                  scheme for driverless taxis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103357},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103357},
  doi          = {10.1016/J.JISA.2022.103357},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaRMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaTMSK22,
  author       = {Ankur Gupta and
                  Meenakshi Tripathi and
                  Samya Muhuri and
                  Gaurav Singal and
                  Neeraj Kumar},
  title        = {A secure and lightweight anonymous mutual authentication scheme for
                  wearable devices in Medical Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103259},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103259},
  doi          = {10.1016/J.JISA.2022.103259},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaTMSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HarmsMJLF22,
  author       = {P. D. Harms and
                  Alexander Marbut and
                  Allen C. Johnston and
                  Paul Lester and
                  Tyler Fezzey},
  title        = {Exposing the darkness within: {A} review of dark personality traits,
                  models, and measures and their relationship to insider threats},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103378},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103378},
  doi          = {10.1016/J.JISA.2022.103378},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HarmsMJLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HokiIILS22,
  author       = {Jin Hoki and
                  Takanori Isobe and
                  Ryoma Ito and
                  Fukang Liu and
                  Kosei Sakamoto},
  title        = {Distinguishing and key recovery attacks on the reduced-round {SNOW-V}
                  and SNOW-Vi},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103100},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103100},
  doi          = {10.1016/J.JISA.2021.103100},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HokiIILS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HossainIA22,
  author       = {Md. Shafaeat Hossain and
                  Mohammad T. Islam and
                  Zahid Akhtar},
  title        = {Incorporating deep learning into capacitive images for smartphone
                  user authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103290},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103290},
  doi          = {10.1016/J.JISA.2022.103290},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HossainIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HowH22,
  author       = {Haw{-}Bin How and
                  Swee{-}Huay Heng},
  title        = {Blockchain-Enabled Searchable Encryption in Clouds: {A} Review},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103183},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103183},
  doi          = {10.1016/J.JISA.2022.103183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HowH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HsiehW22,
  author       = {Ku{-}Sung Hsieh and
                  Chung{-}Ming Wang},
  title        = {Constructive image steganography using example-based weighted color
                  transfer},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103126},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103126},
  doi          = {10.1016/J.JISA.2022.103126},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HsiehW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuYZH22,
  author       = {Xuewei Hu and
                  Bo Yang and
                  Jing Zhang and
                  Meijuan Huang},
  title        = {Constructions of non-basic totally disjoint spectra plateaued functions
                  for cryptographic applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103380},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103380},
  doi          = {10.1016/J.JISA.2022.103380},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuYZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuZWCLC22,
  author       = {Shuang Hu and
                  Renjun Zhang and
                  Fuqun Wang and
                  Kefei Chen and
                  Bin Lian and
                  Gongliang Chen},
  title        = {A sanitizable signcryption scheme with public verifiability via chameleon
                  hash function},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103371},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103371},
  doi          = {10.1016/J.JISA.2022.103371},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuZWCLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangL22,
  author       = {Zhenjie Huang and
                  Zhiwei Lin},
  title        = {Secure server-aided attribute-based signature with perfect anonymity
                  for cloud-assisted systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103066},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103066},
  doi          = {10.1016/J.JISA.2021.103066},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangWWGG22,
  author       = {Hai Huang and
                  Yongjian Wang and
                  Luyao Wang and
                  Huasheng Ge and
                  Qiang Gu},
  title        = {Secure word-level sorting based on fully homomorphic encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103372},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103372},
  doi          = {10.1016/J.JISA.2022.103372},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangWWGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HughesMS22,
  author       = {Kieran Hughes and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {A Model-Free Approach to Intrusion Response Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103150},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103150},
  doi          = {10.1016/J.JISA.2022.103150},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HughesMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HurPK22,
  author       = {Uk Hur and
                  Myungseo Park and
                  Jongsung Kim},
  title        = {A reused key attack on an encrypted mobile app database: Case study
                  on KakaoTalk and ProtonMail},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103181},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103181},
  doi          = {10.1016/J.JISA.2022.103181},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HurPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HussainIB22,
  author       = {Muhammad Hussain and
                  Nadeem Iqbal and
                  Zia Bashir},
  title        = {A chaotic image encryption scheme based on multi-directional confusion
                  and diffusion operations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103347},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103347},
  doi          = {10.1016/J.JISA.2022.103347},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HussainIB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IborOOA22,
  author       = {Ayei E. Ibor and
                  Olusoji B. Okunoye and
                  Florence A. Oladeji and
                  Khadeejah A. Abdulsalam},
  title        = {Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems'
                  Communication Networks based on Bio-inspired Deep Neural Network Structure},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103107},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103107},
  doi          = {10.1016/J.JISA.2021.103107},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IborOOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ImamVK22,
  author       = {Niddal H. Imam and
                  Vassilios G. Vassilakis and
                  Dimitrios S. Kolovos},
  title        = {{OCR} post-correction for detecting adversarial text images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103170},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103170},
  doi          = {10.1016/J.JISA.2022.103170},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ImamVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IshizakaK22,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Multi-dimensional sub/super-range signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103084},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103084},
  doi          = {10.1016/J.JISA.2021.103084},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/IshizakaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JanaJLV22,
  author       = {Sharmistha Jana and
                  Biswapati Jana and
                  Tzu{-}Chuen Lu and
                  Thanh Nhan Vo},
  title        = {Reversible data hiding scheme exploiting center folding with fuzzy
                  weight strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103276},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103276},
  doi          = {10.1016/J.JISA.2022.103276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JanaJLV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JolfaeiMZ22,
  author       = {Amirhossein Adavoudi Jolfaei and
                  Hamid Mala and
                  Maryam Zarezadeh},
  title        = {{EO-PSI-CA:} Efficient outsourced private set intersection cardinality},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {102996},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.102996},
  doi          = {10.1016/J.JISA.2021.102996},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JolfaeiMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KacarKC22,
  author       = {Sezgin Ka{\c{c}}ar and
                  Mehmet Zeki Konyar and
                  {\"{U}}nal {\c{C}}avusoglu},
  title        = {4D chaotic system-based secure data hiding method to improve robustness
                  and embedding capacity of videos},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103369},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103369},
  doi          = {10.1016/J.JISA.2022.103369},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KacarKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kakkar0ATS22,
  author       = {Riya Kakkar and
                  Rajesh Gupta and
                  Smita Agrawal and
                  Sudeep Tanwar and
                  Ravi Sharma},
  title        = {Blockchain-based secure and trusted data sharing scheme for autonomous
                  vehicle underlying 5G},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103179},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103179},
  doi          = {10.1016/J.JISA.2022.103179},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Kakkar0ATS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KernBGFP22,
  author       = {Sascha Kern and
                  Thomas Baumer and
                  Sebastian Groll and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Optimization of Access Control Policies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103301},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103301},
  doi          = {10.1016/J.JISA.2022.103301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KernBGFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhaleghiAR22,
  author       = {Mahmoud Khaleghi and
                  Mohammad Reza Aref and
                  Mehdi Rasti},
  title        = {Context-Aware Ontology-based Security Measurement Model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103199},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103199},
  doi          = {10.1016/J.JISA.2022.103199},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhaleghiAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanKAJ22,
  author       = {Akber Ali Khan and
                  Vinod Kumar and
                  Musheer Ahmad and
                  Srinivas Jangirala},
  title        = {A secure and energy efficient key agreement framework for vehicle-grid
                  system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103231},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103231},
  doi          = {10.1016/J.JISA.2022.103231},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanKAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhorasganiSY22,
  author       = {Alireza Abdellahi Khorasgani and
                  Mahdi Sajadieh and
                  Mohammad Rouhollah Yazdani},
  title        = {Novel lightweight {RFID} authentication protocols for inexpensive
                  tags},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103191},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103191},
  doi          = {10.1016/J.JISA.2022.103191},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhorasganiSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimKKK22,
  author       = {Giyoon Kim and
                  Soram Kim and
                  Soojin Kang and
                  Jongsung Kim},
  title        = {A method for decrypting data infected with Hive ransomware},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103387},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103387},
  doi          = {10.1016/J.JISA.2022.103387},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KimKKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KuldeepZ22,
  author       = {Gajraj Kuldeep and
                  Qi Zhang},
  title        = {Multi-class privacy-preserving cloud computing based on compressive
                  sensing for IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103139},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103139},
  doi          = {10.1016/J.JISA.2022.103139},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KuldeepZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarJ22,
  author       = {Sanjeev Kumar and
                  B. Janet},
  title        = {{DTMIC:} Deep transfer learning for malware image classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103063},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103063},
  doi          = {10.1016/J.JISA.2021.103063},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarY22,
  author       = {Rajeev Kumar and
                  Jainath Yadav},
  title        = {Vowel and non-vowel frame segmentation based digital speech watermarking
                  technique using {LPA} method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103218},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103218},
  doi          = {10.1016/J.JISA.2022.103218},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeCLCT22,
  author       = {Jung{-}San Lee and
                  Chit{-}Jie Chew and
                  Jo{-}Yun Liu and
                  Ying{-}Chin Chen and
                  Kuo{-}Yu Tsai},
  title        = {Medical blockchain: Data sharing and privacy preserving of {EHR} based
                  on smart contract},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103117},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103117},
  doi          = {10.1016/J.JISA.2022.103117},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeCLCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiCYGT22,
  author       = {Xiao Li and
                  Yuanhai Chang and
                  Guixin Ye and
                  Xiaoqing Gong and
                  Zhanyong Tang},
  title        = {{GENDA:} {A} Graph Embedded Network Based Detection Approach on encryption
                  algorithm of binary program},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103088},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103088},
  doi          = {10.1016/J.JISA.2021.103088},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiCYGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLD22,
  author       = {Donghan Li and
                  Jinqing Li and
                  Xiaoqiang Di},
  title        = {A novel exponential one-dimensional chaotic map enhancer and its application
                  in an image encryption scheme using modified ZigZag transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103304},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103304},
  doi          = {10.1016/J.JISA.2022.103304},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLGL22,
  author       = {Lang Li and
                  Jinggen Liu and
                  Ying Guo and
                  Botao Liu},
  title        = {A new S-box construction method meeting strict avalanche criterion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103135},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103135},
  doi          = {10.1016/J.JISA.2022.103135},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiSWLZ22,
  author       = {Kunchang Li and
                  Runhua Shi and
                  Mingxia Wu and
                  Yi{-}Fei Li and
                  Xiaoxu Zhang},
  title        = {A novel privacy-preserving multi-level aggregate signcryption and
                  query scheme for Smart Grid via mobile fog computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103214},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103214},
  doi          = {10.1016/J.JISA.2022.103214},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiSWLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiWP22,
  author       = {Huixian Li and
                  Chenhao Wu and
                  Liaojun Pang},
  title        = {Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme
                  with Sender Traceability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103384},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103384},
  doi          = {10.1016/J.JISA.2022.103384},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LimYCPHL22,
  author       = {Yirang Lim and
                  MinA Youn and
                  Hyunji Chung and
                  Jungheum Park and
                  Graeme Horsman and
                  Sangjin Lee},
  title        = {Characterizing client-side caches of audiovisual content sharing services:
                  Findings and suggestions for forensics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103102},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103102},
  doi          = {10.1016/J.JISA.2021.103102},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LimYCPHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LimbasiyaSD22,
  author       = {Trupil Limbasiya and
                  Sanjay K. Sahay and
                  Debasis Das},
  title        = {{SAMPARK:} Secure and lightweight communication protocols for smart
                  parking management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103381},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103381},
  doi          = {10.1016/J.JISA.2022.103381},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LimbasiyaSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinPSLHLLLC22,
  author       = {Ying{-}Dar Lin and
                  Jehoshua{-}Hanky Pratama and
                  Didik Sudyana and
                  Yuan{-}Cheng Lai and
                  Ren{-}Hung Hwang and
                  Po{-}Ching Lin and
                  Hsuan{-}Yu Lin and
                  Wei{-}Bin Lee and
                  Chen{-}Kuo Chiang},
  title        = {{ELAT:} Ensemble Learning with Adversarial Training in defending against
                  evaded intrusions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103348},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103348},
  doi          = {10.1016/J.JISA.2022.103348},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinPSLHLLLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinWLNHL22,
  author       = {Ying{-}Dar Lin and
                  Ze{-}Yu Wang and
                  Po{-}Ching Lin and
                  Van{-}Linh Nguyen and
                  Ren{-}Hung Hwang and
                  Yuan{-}Cheng Lai},
  title        = {Multi-datasource machine learning in intrusion detection: Packet flows,
                  system logs and host statistics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103248},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103248},
  doi          = {10.1016/J.JISA.2022.103248},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinWLNHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuHGLJ22,
  author       = {Jiaju Liu and
                  Yun Hu and
                  Xiaojun Guo and
                  Tianxing Liang and
                  Weikun Jin},
  title        = {Differential privacy performance evaluation under the condition of
                  non-uniform noise distribution},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103366},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103366},
  doi          = {10.1016/J.JISA.2022.103366},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuHGLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuHXSN22,
  author       = {Tian Liu and
                  Xueyang Hu and
                  Hairuo Xu and
                  Tao Shu and
                  Diep N. Nguyen},
  title        = {High-accuracy low-cost privacy-preserving federated learning in IoT
                  systems via adaptive perturbation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103309},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103309},
  doi          = {10.1016/J.JISA.2022.103309},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuHXSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuLLSCZHP22,
  author       = {Jianyi Liu and
                  Ying Liu and
                  Jingwen Li and
                  Wenxin Sun and
                  Jie Cheng and
                  Ru Zhang and
                  Xingjie Huang and
                  Jin Pang},
  title        = {Two statistical traffic features for certain {APT} group identification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103207},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103207},
  doi          = {10.1016/J.JISA.2022.103207},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuLLSCZHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuTTWS22,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Peter Shaojui Wang and
                  Qin{-}Wen Su},
  title        = {Extension of elliptic curve Qu-Vanstone certificates and their applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103176},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103176},
  doi          = {10.1016/J.JISA.2022.103176},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuTTWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuYHZ22,
  author       = {Yuming Liu and
                  Wang Yong and
                  Feng Hao and
                  Wang Zeyu},
  title        = {GwPFV: {A} novel packet forwarding verification mechanism based on
                  gateways in SDN-based storage environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103354},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103354},
  doi          = {10.1016/J.JISA.2022.103354},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuYHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuZHZ22,
  author       = {Sheng Liu and
                  Yu{-}Jian Zhuang and
                  Li Huang and
                  Xiaoyi Zhou},
  title        = {Exploiting {LSB} Self-quantization for Plaintext-related Image Encryption
                  in the Zero-trust Cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103138},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103138},
  doi          = {10.1016/J.JISA.2022.103138},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuZHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuengoCGHC22,
  author       = {Elena Almaraz Luengo and
                  Marcos Brian Leiva Cerna and
                  Luis Javier Garc{\'{\i}}a{-}Villalba and
                  Darren Hurley{-}Smith and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  title        = {Sensitivity and uniformity in statistical randomness tests},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103322},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103322},
  doi          = {10.1016/J.JISA.2022.103322},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LuengoCGHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaCKC22,
  author       = {Yi{-}Wei Ma and
                  Jiann{-}Liang Chen and
                  Wen{-}Han Kuo and
                  Yu{-}Chen Chen},
  title        = {[email protected]: An intelligent framework for defending against
                  malware attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103092},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103092},
  doi          = {10.1016/J.JISA.2021.103092},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaCKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaJGL22,
  author       = {Sudong Ma and
                  Chenhui Jin and
                  Jie Guan and
                  Shuai Liu},
  title        = {Improved differential attacks on the reduced-round {SNOW-V} and SNOW-Vi
                  stream cipher},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103379},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103379},
  doi          = {10.1016/J.JISA.2022.103379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaJGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaoWGXCZB22,
  author       = {Jianghan Mao and
                  Chenyu Wang and
                  Yanhui Guo and
                  Guoai Xu and
                  Shoufeng Cao and
                  Xuanwen Zhang and
                  Zixiang Bi},
  title        = {A novel model for voice command fingerprinting using deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103085},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103085},
  doi          = {10.1016/J.JISA.2021.103085},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaoWGXCZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Martinez-DiazLR22,
  author       = {Ismel Mart{\'{\i}}nez{-}D{\'{\i}}az and
                  Carlos Miguel Leg{\'{o}}n{-}P{\'{e}}rez and
                  Omar Rojas and
                  Guillermo Sosa G{\'{o}}mez and
                  Diego Oliva},
  title        = {Local Search Trajectories over S-box space},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103272},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103272},
  doi          = {10.1016/J.JISA.2022.103272},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Martinez-DiazLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MelandNBS22,
  author       = {Per H{\aa}kon Meland and
                  Dag Atle Nesheim and
                  Karin Bernsmed and
                  Guttorm Sindre},
  title        = {Assessing cyber threats for storyless systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103050},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103050},
  doi          = {10.1016/J.JISA.2021.103050},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MelandNBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MenasriaLD22,
  author       = {Soumia Menasria and
                  Mingming Lu and
                  Abdelghani Dahou},
  title        = {{PGAN} framework for synthesizing sensor data privately},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103204},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103204},
  doi          = {10.1016/J.JISA.2022.103204},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MenasriaLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohammadiRS22,
  author       = {Mahin Mohammadi and
                  Reza Rawassizadeh and
                  Abbas Sheikhtaheri},
  title        = {A consumer-centered security framework for sharing health data in
                  social networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103303},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103303},
  doi          = {10.1016/J.JISA.2022.103303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MohammadiRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MurtazaTTARH22,
  author       = {Malik Hamza Murtaza and
                  Hasan Tahir and
                  Shahzaib Tahir and
                  Zahoor Ahmed Alizai and
                  Qaiser Riaz and
                  Mehdi Hussain},
  title        = {A portable hardware security module and cryptographic key generator},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103332},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103332},
  doi          = {10.1016/J.JISA.2022.103332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MurtazaTTARH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NafiMBO22,
  author       = {Mohammed Nafi and
                  Mohamed{-}Lamine Messai and
                  Samia Bouzefrane and
                  Mawloud Omar},
  title        = {{IFKMS:} Inverse Function-based Key Management Scheme for IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103370},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103370},
  doi          = {10.1016/J.JISA.2022.103370},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NafiMBO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NagunwaKF22,
  author       = {Thomas Nagunwa and
                  Paul Kearney and
                  Shereen Fouad},
  title        = {A machine learning approach for detecting fast flux phishing hostnames},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103125},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103125},
  doi          = {10.1016/J.JISA.2022.103125},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NagunwaKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraC22,
  author       = {Hassan N. Noura and
                  Ali Chehab},
  title        = {Efficient binary diffusion matrix structures for dynamic key-dependent
                  cryptographic algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103264},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103264},
  doi          = {10.1016/J.JISA.2022.103264},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NouraC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraMC22,
  author       = {Hassan N. Noura and
                  Reem Melki and
                  Ali Chehab},
  title        = {Network coding and {MPTCP:} Enhancing security and performance in
                  an {SDN} environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103165},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103165},
  doi          = {10.1016/J.JISA.2022.103165},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NouraMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRL22,
  author       = {Matthew Nunes and
                  Pete Burnap and
                  Philipp Reinecke and
                  Kaelon Lloyd},
  title        = {Bane or Boon: Measuring the effect of evasive malware on system call
                  classifiers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103202},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103202},
  doi          = {10.1016/J.JISA.2022.103202},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NunesBRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Padayachee22,
  author       = {Keshnee Padayachee},
  title        = {Understanding the effects of situational crime prevention and personality
                  factors on insider compliance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103338},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103338},
  doi          = {10.1016/J.JISA.2022.103338},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Padayachee22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaulaMGPGF22,
  author       = {Alexandro de O. Paula and
                  Rodolfo Ipolito Meneguette and
                  Felipe T. Giuntini and
                  Maycon L. M. Peixoto and
                  Vin{\'{\i}}cius P. Gon{\c{c}}alves and
                  Geraldo P. Rocha Filho},
  title        = {{STRAYER:} {A} Smart Grid adapted automation architecture against
                  cyberattacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103195},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103195},
  doi          = {10.1016/J.JISA.2022.103195},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PaulaMGPGF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengCCLZSZTZZLX22,
  author       = {Junfeng Peng and
                  Ziwei Cai and
                  Zhenyu Chen and
                  Xujiang Liu and
                  Mianyu Zheng and
                  Chufeng Song and
                  Xiongyong Zhu and
                  Yi Teng and
                  Ruilin Zhang and
                  Yanqin Zhou and
                  Xuyang Lv and
                  Jun Xu},
  title        = {An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled
                  approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103364},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103364},
  doi          = {10.1016/J.JISA.2022.103364},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PengCCLZSZTZZLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PeretzDK22,
  author       = {Yossi Peretz and
                  Maya Dotan and
                  Aytan Kamienny},
  title        = {An algorithm for simultaneous nonsymmetric algebraic Riccati equations
                  over finite fields},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103178},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103178},
  doi          = {10.1016/J.JISA.2022.103178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PeretzDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PraseedT22,
  author       = {Amit Praseed and
                  P. Santhi Thilagam},
  title        = {{HTTP} request pattern based signatures for early application layer
                  DDoS detection: {A} firewall agnostic approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103090},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103090},
  doi          = {10.1016/J.JISA.2021.103090},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PraseedT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QinZZLHY22,
  author       = {Chuan Qin and
                  Wei Ming Zhang and
                  Hang Zhou and
                  Jiayang Liu and
                  Yuan He and
                  Nenghai Yu},
  title        = {Robustness enhancement against adversarial steganography via steganalyzer
                  outputs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103252},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103252},
  doi          = {10.1016/J.JISA.2022.103252},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/QinZZLHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiuTTMC22,
  author       = {Yiqin Qiu and
                  Hui Tian and
                  Lili Tang and
                  Wojciech Mazurczyk and
                  Chin{-}Chen Chang},
  title        = {Steganalysis of adaptive multi-rate speech streams with distributed
                  representations of codewords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103250},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103250},
  doi          = {10.1016/J.JISA.2022.103250},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QuinteroPVLC22,
  author       = {Antonia M. Reina Quintero and
                  Salvador Mart{\'{\i}}nez Perez and
                  {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca and
                  Mar{\'{\i}}a Teresa G{\'{o}}mez{-}L{\'{o}}pez and
                  Jordi Cabot},
  title        = {A domain-specific language for the specification of {UCON} policies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103006},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103006},
  doi          = {10.1016/J.JISA.2021.103006},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/QuinteroPVLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahmanMB22,
  author       = {Md. Mijanur Rahman and
                  Tanjarul Islam Mishu and
                  Md. Al{-}Amin Bhuiyan},
  title        = {Performance analysis of a parameterized minutiae-based approach for
                  securing fingerprint templates in biometric authentication systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103209},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103209},
  doi          = {10.1016/J.JISA.2022.103209},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RahmanMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RamanM22,
  author       = {M. R. Gauthama Raman and
                  Aditya P. Mathur},
  title        = {AICrit: {A} unified framework for real-time anomaly detection in water
                  treatment plants},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103046},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103046},
  doi          = {10.1016/J.JISA.2021.103046},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RamanM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RezaeiAFA22,
  author       = {Aref Rezaei and
                  Yasaman Ahmadiadli and
                  Leili Farzinvash and
                  Mohammad Asadpour},
  title        = {Low distortion and adaptive image steganography by enhancing DBSCAN,
                  Sobel operator, and {XOR} coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103343},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103343},
  doi          = {10.1016/J.JISA.2022.103343},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RezaeiAFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RiahiNMCC22,
  author       = {Arbia Riahi and
                  Enrico Natalizio and
                  Sahbi Mazlout and
                  Yacine Challal and
                  Zied Chtourou},
  title        = {Privacy preservation using game theory in e-health application},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103158},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103158},
  doi          = {10.1016/J.JISA.2022.103158},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RiahiNMCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SafkhaniRBSB22,
  author       = {Masoumeh Safkhani and
                  Samad Rostampour and
                  Ygal Bendavid and
                  Sadegh Sadeghi and
                  Nasour Bagheri},
  title        = {Improving RFID/IoT-based generalized ultra-lightweight mutual authentication
                  protocols},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103194},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103194},
  doi          = {10.1016/J.JISA.2022.103194},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SafkhaniRBSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaglamNH22,
  author       = {Rahime Belen Saglam and
                  Jason R. C. Nurse and
                  Duncan Hodges},
  title        = {Personal information: Perceptions, types and evolution},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103163},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103163},
  doi          = {10.1016/J.JISA.2022.103163},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SaglamNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaraswatPBVTS22,
  author       = {Deepti Saraswat and
                  Farnazbanu Patel and
                  Pronaya Bhattacharya and
                  Ashwin Verma and
                  Sudeep Tanwar and
                  Ravi Sharma},
  title        = {\emph{UpHaaR}: Blockchain-based charity donation scheme to handle
                  financial irregularities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103245},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103245},
  doi          = {10.1016/J.JISA.2022.103245},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SaraswatPBVTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SardarU22,
  author       = {Alamgir Sardar and
                  Saiyed Umer},
  title        = {Implementation of face recognition system using BioCryptosystem as
                  template protection scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103317},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103317},
  doi          = {10.1016/J.JISA.2022.103317},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SardarU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SendhilA22,
  author       = {R. Sendhil and
                  A. Amuthan},
  title        = {Verifiable quaternion fully homomorphic encryption scheme for mitigating
                  false data injection attacks by privacy preservation in fog environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103383},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103383},
  doi          = {10.1016/J.JISA.2022.103383},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SendhilA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SeyhanA22,
  author       = {K{\"{u}}bra Seyhan and
                  Sedat Akleylek},
  title        = {Classification of random number generator applications in IoT: {A}
                  comprehensive taxonomy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103365},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103365},
  doi          = {10.1016/J.JISA.2022.103365},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SeyhanA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SezerTN22,
  author       = {Bora Bugra Sezer and
                  Sel{\c{c}}uk Topal and
                  Urfat Nuriyev},
  title        = {{TPPSUPPLY} : {A} traceable and privacy-preserving blockchain system
                  architecture for the supply chain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103116},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103116},
  doi          = {10.1016/J.JISA.2022.103116},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SezerTN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShafaiMAEE22,
  author       = {Walid El Shafai and
                  Ahmed K. Mesrega and
                  Hossam Eldin H. Ahmed and
                  Nirmeen A. El{-}Bahnasawy and
                  Fathi E. Abd El{-}Samie},
  title        = {An efficient multimedia compression-encryption scheme using latin
                  squares for securing Internet-of-things networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103039},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103039},
  doi          = {10.1016/J.JISA.2021.103039},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShafaiMAEE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShahSNJH22,
  author       = {Dawood Shah and
                  Tariq Shah and
                  Yasir Naseer and
                  Sajjad Shaukat Jamal and
                  Sadam Hussain},
  title        = {Cryptographically strong {S-P} boxes and their application in steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103174},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103174},
  doi          = {10.1016/J.JISA.2022.103174},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShahSNJH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShahidAAAK22,
  author       = {Waleed Bin Shahid and
                  Baber Aslam and
                  Haider Abbas and
                  Hammad Afzal and
                  Saad Bin Khalid},
  title        = {A deep learning assisted personalized deception system for countering
                  web application attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103169},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103169},
  doi          = {10.1016/J.JISA.2022.103169},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShahidAAAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharifCSR22,
  author       = {Amir Sharif and
                  Roberto Carbone and
                  Giada Sciarretta and
                  Silvio Ranise},
  title        = {Best current practices for OAuth/OIDC Native Apps: {A} study of their
                  adoption in popular providers and top-ranked Android clients},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103097},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103097},
  doi          = {10.1016/J.JISA.2021.103097},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharifCSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaRB22,
  author       = {Madhu Sharma and
                  Ranjeet Kumar Ranjan and
                  Vishal Bharti},
  title        = {A pseudo-random bit generator based on chaotic maps enhanced with
                  a bit-XOR operation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103299},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103299},
  doi          = {10.1016/J.JISA.2022.103299},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShawD22,
  author       = {Surbhi Shaw and
                  Ratna Dutta},
  title        = {Post-quantum secure identity-based signature achieving forward secrecy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103275},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103275},
  doi          = {10.1016/J.JISA.2022.103275},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShawD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShenSWZY22,
  author       = {Yizhou Shen and
                  Shigen Shen and
                  Zongda Wu and
                  Haiping Zhou and
                  Shui Yu},
  title        = {Signaling game-based availability assessment for edge computing-assisted
                  IoT systems with malware dissemination},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103140},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103140},
  doi          = {10.1016/J.JISA.2022.103140},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShenSWZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShiYMZ22,
  author       = {Ming Shi and
                  Yang Yang and
                  Jian Meng and
                  Weiming Zhang},
  title        = {Reversible data hiding with enhancing contrast and preserving brightness
                  in medical image},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103324},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103324},
  doi          = {10.1016/J.JISA.2022.103324},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShiYMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghC22,
  author       = {Jaimandeep Singh and
                  Naveen Kumar Chaudhary},
  title        = {OAuth 2.0 : Architectural design augmentation for mitigation of common
                  security vulnerabilities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103091},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103091},
  doi          = {10.1016/J.JISA.2021.103091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SisaudiaV22,
  author       = {Varsha Sisaudia and
                  Virendra P. Vishwakarma},
  title        = {A secure gray-scale image watermarking technique in fractional {DCT}
                  domain using zig-zag scrambling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103296},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103296},
  doi          = {10.1016/J.JISA.2022.103296},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SisaudiaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SonLMAD22,
  author       = {Tran The Son and
                  Chando Lee and
                  Hoa Le Minh and
                  Nauman Aslam and
                  Vuong Cong Dat},
  title        = {An enhancement for image-based malware classification using machine
                  learning with low dimension normalized input images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103308},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103308},
  doi          = {10.1016/J.JISA.2022.103308},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SonLMAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SongM22,
  author       = {Fagen Song and
                  Tinghuai Ma},
  title        = {A location privacy protection method in spatial crowdsourcing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103095},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103095},
  doi          = {10.1016/J.JISA.2021.103095},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SongM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Soria-LorenteBN22,
  author       = {Anier Soria{-}Lorente and
                  Stefan Berres and
                  Yenner J. D{\'{\i}}az N{\'{u}}{\~{n}}ez and
                  Ernesto Avila{-}Domenech},
  title        = {Hiding data inside images using orthogonal moments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103192},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103192},
  doi          = {10.1016/J.JISA.2022.103192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Soria-LorenteBN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SuomalainenJHRY22,
  author       = {Jani Suomalainen and
                  Jukka Julku and
                  Antti Heikkinen and
                  Seppo J. Rantala and
                  Anastasia Yastrebova},
  title        = {Security-driven prioritization for tactical mobile networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103198},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103198},
  doi          = {10.1016/J.JISA.2022.103198},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SuomalainenJHRY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TanveerAKAE22,
  author       = {Muhammad Tanveer and
                  Musheer Ahmad and
                  Hany S. Khalifa and
                  Ahmed Alkhayyat and
                  Ahmed A. Abd El{-}Latif},
  title        = {A new anonymous authentication framework for secure smart grids applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103336},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103336},
  doi          = {10.1016/J.JISA.2022.103336},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TanveerAKAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TehB22,
  author       = {Je Sen Teh and
                  Alex Biryukov},
  title        = {Differential cryptanalysis of {WARP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103316},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103316},
  doi          = {10.1016/J.JISA.2022.103316},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TehB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TehTJY22,
  author       = {Je Sen Teh and
                  Li Jing Tham and
                  Norziana Jamil and
                  Wun{-}She Yap},
  title        = {New differential cryptanalysis results for the lightweight block cipher
                  {BORON}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103129},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103129},
  doi          = {10.1016/J.JISA.2022.103129},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TehTJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TianC22,
  author       = {Chuanjun Tian and
                  Guanrong Chen},
  title        = {An infinite perfect-secrecy system with non-uniformly distributed
                  keys},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103256},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103256},
  doi          = {10.1016/J.JISA.2022.103256},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TianC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TkachenkoTF22,
  author       = {Iuliia Tkachenko and
                  Alain Tr{\'{e}}meau and
                  Thierry Fournel},
  title        = {Authentication of rotogravure print-outs using a regular test pattern},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103133},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103133},
  doi          = {10.1016/J.JISA.2022.103133},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TkachenkoTF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TsengFL22,
  author       = {Yi{-}Fan Tseng and
                  Chun{-}I Fan and
                  Zi{-}Cheng Liu},
  title        = {Fast keyword search over encrypted data with short ciphertext in clouds},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103320},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103320},
  doi          = {10.1016/J.JISA.2022.103320},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TsengFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UllahJHDUF22,
  author       = {Shamsher Ullah and
                  Jiangbin Zheng and
                  Muhammad Tanveer Hussain and
                  Nizamud Din and
                  Farhan Ullah and
                  Muhammad Umar Farooq},
  title        = {A perspective trend of hyperelliptic curve cryptosystem for lighted
                  weighted environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103346},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103346},
  doi          = {10.1016/J.JISA.2022.103346},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UllahJHDUF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UlusoyKE22,
  author       = {Sirri Erdem Ulusoy and
                  Orhun Kara and
                  Mehmet {\"{O}}nder Efe},
  title        = {Plaintext recovery and tag guessing attacks on authenticated encryption
                  algorithm {COLM}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103342},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103342},
  doi          = {10.1016/J.JISA.2022.103342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UlusoyKE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ValandarABI22,
  author       = {Milad Yousefi Valandar and
                  Peyman Ayubi and
                  Milad Jafari Barani and
                  Behzad Yosefnezhad Irani},
  title        = {A chaotic video steganography technique for carrying different types
                  of secret messages},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103160},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103160},
  doi          = {10.1016/J.JISA.2022.103160},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ValandarABI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VallabhadasS22,
  author       = {Dilip Kumar Vallabhadas and
                  Mulagala Sandhya},
  title        = {Securing multimodal biometric template using local random projection
                  and homomorphic encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103339},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103339},
  doi          = {10.1016/J.JISA.2022.103339},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VallabhadasS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VeroniNX22,
  author       = {Eleni Veroni and
                  Christoforos Ntantogian and
                  Christos Xenakis},
  title        = {A large-scale analysis of Wi-Fi passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103190},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103190},
  doi          = {10.1016/J.JISA.2022.103190},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VeroniNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VouvoutsisCP22,
  author       = {Vasilis Vouvoutsis and
                  Fran Casino and
                  Constantinos Patsakis},
  title        = {On the effectiveness of binary emulation in malware classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103258},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103258},
  doi          = {10.1016/J.JISA.2022.103258},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VouvoutsisCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VuVL22,
  author       = {Duy{-}Hien Vu and
                  Trong{-}Sinh Vu and
                  The{-}Dung Luong},
  title        = {An efficient and practical approach for privacy-preserving Naive Bayes
                  classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103215},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103215},
  doi          = {10.1016/J.JISA.2022.103215},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VuVL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangGF22,
  author       = {Yifeng Wang and
                  Yuanbo Guo and
                  Chen Fang},
  title        = {An end-to-end method for advanced persistent threats reconstruction
                  in large-scale networks based on alert and log correlation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103373},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103373},
  doi          = {10.1016/J.JISA.2022.103373},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangGF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangJXKH22,
  author       = {Yifan Wang and
                  Xiaoying Jia and
                  Yongbo Xia and
                  Muhammad Khurram Khan and
                  Debiao He},
  title        = {A blockchain-based conditional privacy-preserving authentication scheme
                  for edge computing services},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103334},
  doi          = {10.1016/J.JISA.2022.103334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangJXKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCH22,
  author       = {Xu Wang and
                  Liyao Li and
                  Ching{-}Chun Chang and
                  Yongfeng Huang},
  title        = {Multi-level reversible data hiding for crypto-imagery via a block-wise
                  substitution-transposition cipher},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103067},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103067},
  doi          = {10.1016/J.JISA.2021.103067},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCWD22,
  author       = {Shangping Wang and
                  Huan Li and
                  Juanjuan Chen and
                  Jifang Wang and
                  Yingjuan Deng},
  title        = {{DAG} blockchain-based lightweight authentication and authorization
                  scheme for IoT devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103134},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103134},
  doi          = {10.1016/J.JISA.2022.103134},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCWD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCWR22,
  author       = {Yixiang Wang and
                  Jiqiang Liu and
                  Xiaolin Chang and
                  Jianhua Wang and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {{AB-FGSM:} AdaBelief optimizer and FGSM-based approach to generate
                  adversarial examples},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103227},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103227},
  doi          = {10.1016/J.JISA.2022.103227},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangPNY22,
  author       = {Xiangyang Wang and
                  Fanchen Peng and
                  Panpan Niu and
                  Hongying Yang},
  title        = {Statistical image watermark decoder using {NSM-HMT} in {NSCT-FGPCET}
                  magnitude domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103312},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103312},
  doi          = {10.1016/J.JISA.2022.103312},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangPNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangQ22,
  author       = {Qianhui Wang and
                  Quan Qian},
  title        = {Malicious code classification based on opcode sequences and textCNN
                  network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103151},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103151},
  doi          = {10.1016/J.JISA.2022.103151},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangSTNY22,
  author       = {Xiangyang Wang and
                  Xin Shen and
                  Jia{-}lin Tian and
                  Pan{-}pan Niu and
                  Hongying Yang},
  title        = {Locally optimum image watermark detector based on statistical modeling
                  of SWT-EFMs magnitudes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103105},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103105},
  doi          = {10.1016/J.JISA.2021.103105},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangSTNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWWWHS22,
  author       = {Bo Wang and
                  Shiqi Wu and
                  Fei Wei and
                  Yue Wang and
                  Jiayao Hou and
                  Xue Sui},
  title        = {Virtual sample generation for few-shot source camera identification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103153},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103153},
  doi          = {10.1016/J.JISA.2022.103153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWWWHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZH22,
  author       = {Huanran Wang and
                  Weizhe Zhang and
                  Hui He},
  title        = {You are what the permissions told me! Android malware detection based
                  on hybrid tactics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103159},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103159},
  doi          = {10.1016/J.JISA.2022.103159},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZZ22,
  author       = {Quanyv Wang and
                  Xiaoqiang Zhang and
                  Xiaohu Zhao},
  title        = {Image encryption algorithm based on improved Zigzag transformation
                  and quaternary {DNA} coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103340},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103340},
  doi          = {10.1016/J.JISA.2022.103340},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZXWF22,
  author       = {Qiyu Wu and
                  Fucai Zhou and
                  Jian Xu and
                  Qiang Wang and
                  Da Feng},
  title        = {Secure and efficient multifunctional data aggregation without trusted
                  authority in edge-enhanced IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103270},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103270},
  doi          = {10.1016/J.JISA.2022.103270},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZXWF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZZX22,
  author       = {Hao{-}Tian Wu and
                  Tao Zhou and
                  Zhenwei Zhuang and
                  Chuhua Xian},
  title        = {Reversible transformation of tetrahedral mesh models for data protection
                  and information hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103161},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103161},
  doi          = {10.1016/J.JISA.2022.103161},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiaoW22,
  author       = {Haiyan Xiao and
                  Lifang Wang},
  title        = {The differential fault analysis on block cipher {KLEIN-96}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103205},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103205},
  doi          = {10.1016/J.JISA.2022.103205},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiaoW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongBILMM22,
  author       = {Pulei Xiong and
                  Scott Buffett and
                  Shahrear Iqbal and
                  Philippe Lamontagne and
                  Mohammad Saiful Islam Mamun and
                  Heather Molyneaux},
  title        = {Towards a robust and trustworthy machine learning system development:
                  An engineering perspective},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103121},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103121},
  doi          = {10.1016/J.JISA.2022.103121},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiongBILMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongCFZ22,
  author       = {Xiangguang Xiong and
                  Yi Chen and
                  Mengting Fan and
                  Siyao Zhong},
  title        = {Adaptive reversible data hiding algorithm for interpolated images
                  using sorting and coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103137},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103137},
  doi          = {10.1016/J.JISA.2022.103137},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiongCFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuTYWKFW22,
  author       = {Rongze Xu and
                  Zhanyong Tang and
                  Guixin Ye and
                  Huanting Wang and
                  Xin Ke and
                  Dingyi Fang and
                  Zheng Wang},
  title        = {Detecting code vulnerabilities by learning from large-scale open source
                  repositories},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103293},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103293},
  doi          = {10.1016/J.JISA.2022.103293},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuTYWKFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuXLZHZ22,
  author       = {Runqing Xu and
                  Zejun Xiang and
                  Da Lin and
                  Shasha Zhang and
                  Debiao He and
                  Xiangyong Zeng},
  title        = {High-throughput block cipher implementations with {SIMD}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103333},
  doi          = {10.1016/J.JISA.2022.103333},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuXLZHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YanFTYD22,
  author       = {Xixi Yan and
                  Suwei Feng and
                  Yongli Tang and
                  Pei Yin and
                  Dazhi Deng},
  title        = {Blockchain-based verifiable and dynamic multi-keyword ranked searchable
                  encryption scheme in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103353},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103353},
  doi          = {10.1016/J.JISA.2022.103353},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YanFTYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangHA22,
  author       = {Gi{-}Chul Yang and
                  Qinwen Hu and
                  Muhammad Rizwan Asghar},
  title        = {{TIM:} Secure and usable authentication for smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103374},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103374},
  doi          = {10.1016/J.JISA.2022.103374},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLWZD22,
  author       = {Luhui Yang and
                  Guangjie Liu and
                  Jinwei Wang and
                  Jiangtao Zhai and
                  Yuewei Dai},
  title        = {A semantic element representation model for malicious domain name
                  detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103148},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103148},
  doi          = {10.1016/J.JISA.2022.103148},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLWZD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangSLQ22,
  author       = {Yang Yang and
                  Jianguo Sun and
                  Zechao Liu and
                  Yuqing Qiao},
  title        = {Practical revocable and multi-authority {CP-ABE} scheme from {RLWE}
                  for Cloud Computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103108},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103108},
  doi          = {10.1016/J.JISA.2022.103108},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangSLQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWXTW22,
  author       = {Xiaodong Yang and
                  Jiaqi Wang and
                  Wanting Xi and
                  Tian Tian and
                  Caifen Wang},
  title        = {A blockchain-based keyword search scheme with dual authorization for
                  electronic health record sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103154},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103154},
  doi          = {10.1016/J.JISA.2022.103154},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWXTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWY22,
  author       = {Cheng{-}Hsing Yang and
                  Chi{-}Yao Weng and
                  Yu{-}Zhen Yang},
  title        = {{TPEIP:} Thumbnail preserving encryption based on sum preserving for
                  image privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103352},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103352},
  doi          = {10.1016/J.JISA.2022.103352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangZZZLX22,
  author       = {Liqun Yang and
                  You Zhai and
                  Yipeng Zhang and
                  Yufei Zhao and
                  Zhoujun Li and
                  Tongge Xu},
  title        = {A new methodology for anomaly detection of attacks in {IEC} 61850-based
                  substation system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103262},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103262},
  doi          = {10.1016/J.JISA.2022.103262},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangZZZLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YeohTC22,
  author       = {Wei{-}Zhu Yeoh and
                  Je Sen Teh and
                  Jiageng Chen},
  title        = {Automated enumeration of block cipher differentials: An optimized
                  branch-and-bound {GPU} framework},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103087},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103087},
  doi          = {10.1016/J.JISA.2021.103087},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YeohTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YiTY22,
  author       = {Yufeng Yi and
                  Wuzheng Tan and
                  Yaxi Yang},
  title        = {Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search
                  of large-scale databases},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103335},
  doi          = {10.1016/J.JISA.2022.103335},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YiTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuW22,
  author       = {Huifang Yu and
                  Han Wang},
  title        = {Elliptic curve threshold signature scheme for blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103345},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103345},
  doi          = {10.1016/J.JISA.2022.103345},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuZL22,
  author       = {Huifang Yu and
                  Shuai Zhang and
                  Yue Liu},
  title        = {Certificateless multivariate ring signcryption scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103220},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103220},
  doi          = {10.1016/J.JISA.2022.103220},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuanCTMJL22,
  author       = {Chong Yuan and
                  Jingxuan Cai and
                  Donghai Tian and
                  Rui Ma and
                  Xiaoqi Jia and
                  Wenmao Liu},
  title        = {Towards time evolved malware identification using two-head neural
                  network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103098},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103098},
  doi          = {10.1016/J.JISA.2021.103098},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuanCTMJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuanMRXH22,
  author       = {Manli Yuan and
                  Yi Mu and
                  Fatemeh Rezaeibagha and
                  Li Xu and
                  Xinyi Huang},
  title        = {Controllable software licensing system for sub-licensing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103061},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103061},
  doi          = {10.1016/J.JISA.2021.103061},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuanMRXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YueZWYBH22,
  author       = {Xiaohan Yue and
                  Shuaishuai Zeng and
                  Xibo Wang and
                  Lixin Yang and
                  Shi Bai and
                  Yuan He},
  title        = {A practical privacy-preserving communication scheme for CAMs in {C-ITS}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103103},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103103},
  doi          = {10.1016/J.JISA.2021.103103},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YueZWYBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZaidiCPS22,
  author       = {Ahmad Zairi bin Zaidi and
                  Chun Yong Chong and
                  Rajendran Parthiban and
                  Ali Safaa Sadiq},
  title        = {A framework of dynamic selection method for user classification in
                  touch-based continuous mobile device authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103217},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103217},
  doi          = {10.1016/J.JISA.2022.103217},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZaidiCPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZengPZZC22,
  author       = {ZengRi Zeng and
                  Wei Peng and
                  Detian Zeng and
                  Chong Zeng and
                  Yifan Chen},
  title        = {Intrusion detection framework based on causal reasoning for DDoS},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103124},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103124},
  doi          = {10.1016/J.JISA.2022.103124},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZengPZZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaiSM22,
  author       = {Zhonghao Zhai and
                  Subin Shen and
                  Yan{-}qin Mao},
  title        = {{BPKI:} {A} secure and scalable blockchain-based public key infrastructure
                  system for web services},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103226},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103226},
  doi          = {10.1016/J.JISA.2022.103226},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaiSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLLS22,
  author       = {Yi Zhang and
                  Guoqiang Liu and
                  Chao Li and
                  Xuan Shen},
  title        = {Impossible differential cryptanalysis of {FBC-128}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103279},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103279},
  doi          = {10.1016/J.JISA.2022.103279},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLX22,
  author       = {Wenzheng Zhang and
                  Shiyun Liu and
                  Zhe Xia},
  title        = {A distributed privacy-preserving data aggregation scheme for smart
                  grid with fine-grained access control},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103118},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103118},
  doi          = {10.1016/J.JISA.2022.103118},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangWBL22,
  author       = {Jinbao Zhang and
                  Jiehua Wang and
                  Ge Bin and
                  Jianhua Li},
  title        = {An efficient differential fault attack against {SIMON} key schedule},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103155},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103155},
  doi          = {10.1016/J.JISA.2022.103155},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangWBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangWZZ22,
  author       = {Meiling Zhang and
                  Liusheng Wang and
                  Bingyu Zhao and
                  Dong Zheng},
  title        = {Bit-policy based chosen-plaintext collision attack on reused-mask
                  {AES}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103222},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103222},
  doi          = {10.1016/J.JISA.2022.103222},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangWZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaoWZW22,
  author       = {Xiaojie Zhao and
                  Shangping Wang and
                  Yaling Zhang and
                  Yu Wang},
  title        = {Attribute-based access control scheme for data sharing on hyperledger
                  fabric},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103182},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103182},
  doi          = {10.1016/J.JISA.2022.103182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaoWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhuTWZ22,
  author       = {Ding Zhu and
                  Xiaojun Tong and
                  Zhu Wang and
                  Miao Zhang},
  title        = {A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic
                  System},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {69},
  pages        = {103289},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103289},
  doi          = {10.1016/J.JISA.2022.103289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhuTWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZouCTW22,
  author       = {Binghui Zou and
                  Chunjie Cao and
                  Fangjian Tao and
                  Longjuan Wang},
  title        = {IMCLNet: {A} lightweight deep neural network for Image-based Malware
                  Classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103313},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103313},
  doi          = {10.1016/J.JISA.2022.103313},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZouCTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0001FLY21,
  author       = {Zhijun Wu and
                  Wenzhi Feng and
                  Jin Lei and
                  Meng Yue},
  title        = {{I-CIFA:} An improved collusive interest flooding attack in named
                  data networking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102912},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102912},
  doi          = {10.1016/J.JISA.2021.102912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0001FLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0002SRSAAA21,
  author       = {Khalid Mahmood and
                  Salman Shamshad and
                  Minahil Rana and
                  Akasha Shafiq and
                  Shafiq Ahmad and
                  Muhammad Arslan Akram and
                  Ruhul Amin},
  title        = {{PUF} enable lightweight key-exchange and mutual authentication protocol
                  for multi-server based {D2D} communication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102900},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102900},
  doi          = {10.1016/J.JISA.2021.102900},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/0002SRSAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0003L0ZZGL21,
  author       = {Hongmin Li and
                  Tie Li and
                  Wei Feng and
                  Jing Zhang and
                  Jun Zhang and
                  Lixia Gan and
                  Chunlai Li},
  title        = {A novel image encryption scheme based on non-adjacent parallelable
                  permutation and dynamic DNA-level two-way diffusion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102844},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102844},
  doi          = {10.1016/J.JISA.2021.102844},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/0003L0ZZGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0009WFLWL021,
  author       = {Haifeng Li and
                  Yuxin Wang and
                  Xingbing Fu and
                  Caihui Lan and
                  Caifen Wang and
                  Fagen Li and
                  He Guo},
  title        = {{PSCPAC:} Post-quantum secure certificateless public auditing scheme
                  in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102927},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102927},
  doi          = {10.1016/J.JISA.2021.102927},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0009WFLWL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0034G21,
  author       = {Zheng Wang and
                  Yang Guo},
  title        = {Neural networks based domain name generation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102948},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102948},
  doi          = {10.1016/J.JISA.2021.102948},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0034G21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0294WZXFSH21,
  author       = {Wei Wang and
                  Lianhai Wang and
                  Peijun Zhang and
                  Shujiang Xu and
                  Kunlun Fu and
                  Lianxin Song and
                  Shanshan Hu},
  title        = {A privacy protection scheme for telemedicine diagnosis based on double
                  blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102845},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102845},
  doi          = {10.1016/J.JISA.2021.102845},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/0294WZXFSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AbusittaLF21,
  author       = {Adel Abusitta and
                  Miles Q. Li and
                  Benjamin C. M. Fung},
  title        = {Malware classification and composition analysis: {A} survey of recent
                  developments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102828},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102828},
  doi          = {10.1016/J.JISA.2021.102828},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AbusittaLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AcharyaD21,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  title        = {Constructing provable secure broadcast encryption scheme with dealership},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102736},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102736},
  doi          = {10.1016/J.JISA.2020.102736},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AcharyaD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AgarwalH21,
  author       = {Himanshu Agarwal and
                  Farooq Husain},
  title        = {Development of payload capacity enhanced robust video watermarking
                  scheme based on symmetry of circle using lifting wavelet transform
                  and {SURF}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102846},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102846},
  doi          = {10.1016/J.JISA.2021.102846},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AgarwalH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AgarwalPRM21,
  author       = {Abhishek Agarwal and
                  Ayush Prasad and
                  Rishabh Rustogi and
                  Sweta Mishra},
  title        = {Detection and mitigation of fraudulent resource consumption attacks
                  in cloud using deep learning approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {56},
  pages        = {102672},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102672},
  doi          = {10.1016/J.JISA.2020.102672},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AgarwalPRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadKAKC21,
  author       = {Khaleel Ahmad and
                  Afsar Kamal and
                  Khairol Amali Bin Ahmad and
                  Manju Khari and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {Fast hybrid-MixNet for security and privacy using {NTRU} algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102872},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102872},
  doi          = {10.1016/J.JISA.2021.102872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadKAKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadKAKC21a,
  author       = {Khaleel Ahmad and
                  Afsar Kamal and
                  Khairol Amali Bin Ahmad and
                  Manju Khari and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {Corrigendum to Fast hybrid-MixNet for security and privacy using {NTRU}
                  algorithm: [Journal of Information Security and Applications, Volume
                  60, August 2021, Start page-End page/102872]},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102917},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102917},
  doi          = {10.1016/J.JISA.2021.102917},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadKAKC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlayaS21,
  author       = {Bechir Alaya and
                  Lamaa Sellami},
  title        = {Clustering method and symmetric/asymmetric cryptography scheme adapted
                  to securing urban {VANET} networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102779},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102779},
  doi          = {10.1016/J.JISA.2021.102779},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlayaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AminPS21,
  author       = {Ruhul Amin and
                  Isha Pali and
                  Venkatasamy Sureshkumar},
  title        = {Software-Defined Network enabled Vehicle to Vehicle secured data transmission
                  protocol in VANETs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102729},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102729},
  doi          = {10.1016/J.JISA.2020.102729},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AminPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AmmarTYM21,
  author       = {Ikhlass Ammar and
                  Yamen El Touati and
                  Moez Yeddes and
                  John Mullins},
  title        = {Bounded opacity for timed systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102926},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102926},
  doi          = {10.1016/J.JISA.2021.102926},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AmmarTYM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnC21,
  author       = {Haoyang An and
                  Jiageng Chen},
  title        = {ElearnChain: {A} privacy-preserving consortium blockchain system for
                  e-learning educational records},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103013},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103013},
  doi          = {10.1016/J.JISA.2021.103013},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnthiWRBW21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Matilda Rhode and
                  Pete Burnap and
                  Adam Wedgbury},
  title        = {Adversarial attacks on machine learning cybersecurity defences in
                  Industrial Control Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102717},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102717},
  doi          = {10.1016/J.JISA.2020.102717},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Antwi-BoasiakoZ21,
  author       = {Emmanuel Antwi{-}Boasiako and
                  Shijie Zhou and
                  Yongjian Liao and
                  Qihe Liu and
                  Yuyu Wang and
                  Kwabena Owusu{-}Agyemang},
  title        = {Privacy preservation in Distributed Deep Learning: {A} survey on Distributed
                  Deep Learning, privacy preservation techniques used and interesting
                  research directions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102949},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102949},
  doi          = {10.1016/J.JISA.2021.102949},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Antwi-BoasiakoZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AparnaBSVSRPE21,
  author       = {H. Aparna and
                  B. Bhumijaa and
                  R. Santhiyadevi and
                  K. Vaishanavi and
                  M. Sathanarayanan and
                  Amirtharajan Rengarajan and
                  Padmapriya Praveenkumar and
                  Ahmed A. Abd El{-}Latif},
  title        = {Double layered Fridrich structure to conserve medical data privacy
                  using quantum cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102972},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102972},
  doi          = {10.1016/J.JISA.2021.102972},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AparnaBSVSRPE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AraujoAA0HK21,
  author       = {Frederico Araujo and
                  Gbadebo Ayoade and
                  Khaled Al{-}Naami and
                  Yang Gao and
                  Kevin W. Hamlen and
                  Latifur Khan},
  title        = {Crook-sourced intrusion detection as a service},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102880},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102880},
  doi          = {10.1016/J.JISA.2021.102880},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AraujoAA0HK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ArifRMAIF21,
  author       = {Juliza Mohamad Arif and
                  Mohd Faizal Ab Razak and
                  Sharfah Ratibah Tuan Mat and
                  Suryanti Awang and
                  Nor Syahidatul Nadiah Binti Ismail and
                  Ahmad Firdaus},
  title        = {Android mobile malware detection using fuzzy {AHP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102929},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102929},
  doi          = {10.1016/J.JISA.2021.102929},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ArifRMAIF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ArunpandianD21,
  author       = {S. Arunpandian and
                  S. S. Dhenakaran},
  title        = {A novel key and image concealing with static-dynamic pattern using
                  modified periodic table},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103019},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103019},
  doi          = {10.1016/J.JISA.2021.103019},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ArunpandianD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BarretoFS21,
  author       = {Luciano Barreto and
                  Joni da Silva Fraga and
                  Frank Siqueira},
  title        = {An intrusion tolerant identity provider with user attributes confidentiality},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103045},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103045},
  doi          = {10.1016/J.JISA.2021.103045},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BarretoFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BerguigLH21,
  author       = {Yousra Berguig and
                  Jalal Laassiri and
                  Sanae Hanaoui},
  title        = {Anonymous and lightweight secure authentication protocol for mobile
                  Agent system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103007},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103007},
  doi          = {10.1016/J.JISA.2021.103007},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BerguigLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhavinTSTK21,
  author       = {Makwana Bhavin and
                  Sudeep Tanwar and
                  Navneet Sharma and
                  Sudhanshu Tyagi and
                  Neeraj Kumar},
  title        = {Blockchain and quantum blind signature-based hybrid scheme for healthcare
                  5.0 applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {56},
  pages        = {102673},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102673},
  doi          = {10.1016/J.JISA.2020.102673},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BhavinTSTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BisogniILN21,
  author       = {Carmen Bisogni and
                  Gerardo Iovane and
                  Riccardo Emanuele Landi and
                  Michele Nappi},
  title        = {{ECB2:} {A} novel encryption scheme using face biometrics for signing
                  blockchain transactions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102814},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102814},
  doi          = {10.1016/J.JISA.2021.102814},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BisogniILN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BouchaalaGS21,
  author       = {Mariem Bouchaala and
                  Cherif Ghazel and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {{TRAK-CPABE:} {A} novel Traceable, Revocable and Accountable Ciphertext-Policy
                  Attribute-Based Encryption scheme in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102914},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102914},
  doi          = {10.1016/J.JISA.2021.102914},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BouchaalaGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BoutetC21,
  author       = {Antoine Boutet and
                  Mathieu Cunche},
  title        = {Privacy protection for Wi-Fi location positioning systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102635},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102635},
  doi          = {10.1016/J.JISA.2020.102635},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BoutetC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BraekenCT21,
  author       = {An Braeken and
                  Ji{-}Jian Chin and
                  Syh{-}Yuan Tan},
  title        = {{ECQV-IBI:} Identity-based identification with implicit certification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103027},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103027},
  doi          = {10.1016/J.JISA.2021.103027},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BraekenCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BrignoliCCDLMRR21,
  author       = {Mauro Alberto Brignoli and
                  Alessio P. Caforio and
                  Francesco Caturano and
                  Maurizio D'Arienzo and
                  Marco Latini and
                  Walter Matta and
                  Simon Pietro Romano and
                  B. Ruggiero},
  title        = {A distributed security tomography framework to assess the exposure
                  of {ICT} infrastructures to network threats},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102833},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102833},
  doi          = {10.1016/J.JISA.2021.102833},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BrignoliCCDLMRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CalderoniPP21,
  author       = {Luca Calderoni and
                  Paolo Palmieri and
                  Constantinos Patsakis},
  title        = {Introduction to the special issue on privacy and security for location-based
                  services and devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102800},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102800},
  doi          = {10.1016/J.JISA.2021.102800},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CalderoniPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaSKP21,
  author       = {Jeonghun Cha and
                  Sushil Kumar Singh and
                  Tae Woo Kim and
                  Jong Hyuk Park},
  title        = {Blockchain-empowered cloud architecture based on secret sharing for
                  smart city},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102686},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102686},
  doi          = {10.1016/J.JISA.2020.102686},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaSKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChanCG21,
  author       = {Wai Kok Chan and
                  Ji{-}Jian Chin and
                  Vik Tor Goh},
  title        = {Simple and scalable blockchain with privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102700},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102700},
  doi          = {10.1016/J.JISA.2020.102700},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChanCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaouchDDMBO21,
  author       = {Asma Chaouch and
                  Laurent{-}St{\'{e}}phane Didier and
                  Fangan{-}Yssouf Dosso and
                  Nadia El Mrabet and
                  Belgacem Bouallegue and
                  Bouraoui Ouni},
  title        = {Two hardware implementations for modular multiplication in the {AMNS:}
                  Sequential and semi-parallel},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102770},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102770},
  doi          = {10.1016/J.JISA.2021.102770},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaouchDDMBO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChatterjeeGCGS21,
  author       = {Agneet Chatterjee and
                  Soulib Ghosh and
                  Anuran Chakraborty and
                  Sudipta Kumar Ghosal and
                  Ram Sarkar},
  title        = {A two-phase gradient based feature embedding approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102898},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102898},
  doi          = {10.1016/J.JISA.2021.102898},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChatterjeeGCGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChatterjeeN21,
  author       = {Moitrayee Chatterjee and
                  Akbar Siami Namin},
  title        = {A fuzzy Dempster-Shafer classifier for detecting Web spams},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102793},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102793},
  doi          = {10.1016/J.JISA.2021.102793},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChatterjeeN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCM21,
  author       = {Yu{-}Chen Chen and
                  Jiann{-}Liang Chen and
                  Yi{-}Wei Ma},
  title        = {[email protected] Intelligent technical support scam detection system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102921},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102921},
  doi          = {10.1016/J.JISA.2021.102921},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenGHC21,
  author       = {Jiahui Chen and
                  Wensheng Gan and
                  Muchuang Hu and
                  Chien{-}Ming Chen},
  title        = {On the construction of a post-quantum blockchain for smart city},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102780},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102780},
  doi          = {10.1016/J.JISA.2021.102780},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenGHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenH21,
  author       = {Xiaofeng Chen and
                  Chaoqun Hong},
  title        = {An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting
                  Modification Direction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102702},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102702},
  doi          = {10.1016/J.JISA.2020.102702},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenHWLC21,
  author       = {Peng Chen and
                  Dezhi Han and
                  Tien{-}Hsiung Weng and
                  Kuan{-}Ching Li and
                  Arcangelo Castiglione},
  title        = {A novel Byzantine fault tolerance consensus for Green IoT with intelligence
                  based on reinforcement},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102821},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102821},
  doi          = {10.1016/J.JISA.2021.102821},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenHWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenMRMAABK21,
  author       = {Mengji Chen and
                  Taj Malook and
                  Ateeq Ur Rehman and
                  Yar Muhammad and
                  Mohammad Dahman Alshehri and
                  Aamir Akbar and
                  Muhammad Bilal and
                  Muazzam Ali Khan},
  title        = {Blockchain-Enabled healthcare system for detection of diabetes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102771},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102771},
  doi          = {10.1016/J.JISA.2021.102771},
  timestamp    = {Tue, 26 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenMRMAABK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CherifiOA21,
  author       = {Feriel Cherifi and
                  Mawloud Omar and
                  Kamal Amroun},
  title        = {An efficient biometric-based continuous authentication scheme with
                  {HMM} prehensile movements modeling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102739},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102739},
  doi          = {10.1016/J.JISA.2020.102739},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CherifiOA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChiW21,
  author       = {Po{-}Wen Chi and
                  Ming{-}Hung Wang},
  title        = {Deniable search of encrypted cloud-storage data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102806},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102806},
  doi          = {10.1016/J.JISA.2021.102806},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChiuMJ21,
  author       = {Wei{-}Yang Chiu and
                  Weizhi Meng and
                  Christian Damsgaard Jensen},
  title        = {My data, my control: {A} secure data sharing and access scheme over
                  blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103020},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103020},
  doi          = {10.1016/J.JISA.2021.103020},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChiuMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DabraBK21,
  author       = {Vivek Dabra and
                  Anju Bala and
                  Saru Kumari},
  title        = {Flaw and amendment of a two-party authenticated key agreement protocol
                  for post-quantum environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102889},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102889},
  doi          = {10.1016/J.JISA.2021.102889},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DabraBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DasGK21,
  author       = {Tanmoy Kanti Das and
                  Subhojit Ghosh and
                  Ebha Koley},
  title        = {Prevention and detection of {FDIA} on power-network protection scheme
                  using multiple support set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103054},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103054},
  doi          = {10.1016/J.JISA.2021.103054},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DasGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DebnathCKD21,
  author       = {Sumit Kumar Debnath and
                  Tanmay Choudhury and
                  Nibedita Kundu and
                  Kunal Dey},
  title        = {Post-quantum secure multi-party private set-intersection in star network
                  topology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102731},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102731},
  doi          = {10.1016/J.JISA.2020.102731},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DebnathCKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeebakA21,
  author       = {Bakkiam David Deebak and
                  Fadi M. Al{-}Turjman},
  title        = {Robust Lightweight Privacy-Preserving and Session Scheme Interrogation
                  for Fog Computing Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102689},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102689},
  doi          = {10.1016/J.JISA.2020.102689},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeebakA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeebakA21a,
  author       = {Bakkiam David Deebak and
                  Fadi M. Al{-}Turjman},
  title        = {Privacy-preserving in smart contracts using blockchain and artificial
                  intelligence for cyber risk measurements},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102749},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102749},
  doi          = {10.1016/J.JISA.2021.102749},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeebakA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DingGWJG21,
  author       = {Lin Ding and
                  Dawu Gu and
                  Lei Wang and
                  Chenhui Jin and
                  Jie Guan},
  title        = {A real-time related key attack on the {WG-16} stream cipher for securing
                  4G-LTE networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103015},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103015},
  doi          = {10.1016/J.JISA.2021.103015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DingGWJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EddineFFM21,
  author       = {Merzougui Salah Eddine and
                  Mohamed Amine Ferrag and
                  Othmane Friha and
                  Leandros A. Maglaras},
  title        = {{EASBF:} An efficient authentication scheme over blockchain for fog
                  computing-enabled internet of vehicles},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102802},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102802},
  doi          = {10.1016/J.JISA.2021.102802},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/EddineFFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ErdodiSZ21,
  author       = {L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
                  {\AA}vald {\AA}slaugson Sommervoll and
                  Fabio Massimo Zennaro},
  title        = {Simulating {SQL} injection vulnerability exploitation using Q-learning
                  reinforcement learning agents},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102903},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102903},
  doi          = {10.1016/J.JISA.2021.102903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ErdodiSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EttianeCE21,
  author       = {Raja Ettiane and
                  Abdelaali Chaoub and
                  Rachid Elkouch},
  title        = {Toward securing the control plane of 5G mobile networks against DoS
                  threats: Attack scenarios and promising solutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102943},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102943},
  doi          = {10.1016/J.JISA.2021.102943},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/EttianeCE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FanKY21,
  author       = {Chun{-}I Fan and
                  Arijit Karati and
                  Pei{-}Shan Yang},
  title        = {Reliable file transfer protocol with producer anonymity for Named
                  Data Networking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102851},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102851},
  doi          = {10.1016/J.JISA.2021.102851},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FanKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarzadniaSN21,
  author       = {Ehsan Farzadnia and
                  Hossein Shirazi and
                  Alireza Nowroozi},
  title        = {A novel sophisticated hybrid method for intrusion detection using
                  the artificial immune system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102721},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102721},
  doi          = {10.1016/J.JISA.2020.102721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FarzadniaSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FehisNK21,
  author       = {Saad Fehis and
                  Omar Nouali and
                  M. Tahar Kechadi},
  title        = {Secure encryption key management as a SecaaS based on Chinese wall
                  security policy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102975},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102975},
  doi          = {10.1016/J.JISA.2021.102975},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FehisNK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FerrettiLMCPT21,
  author       = {Luca Ferretti and
                  Francesco Longo and
                  Giovanni Merlino and
                  Michele Colajanni and
                  Antonio Puliafito and
                  Nachiket Tapas},
  title        = {Verifiable and auditable authorizations for smart industries and industrial
                  Internet-of-Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102848},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102848},
  doi          = {10.1016/J.JISA.2021.102848},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FerrettiLMCPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Fischer-HubnerA21,
  author       = {Simone Fischer{-}H{\"{u}}bner and
                  Cristina Alcaraz and
                  Afonso Ferreira and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Javier L{\'{o}}pez and
                  Evangelos P. Markatos and
                  Lejla Islami and
                  Mahdi Akil},
  title        = {Stakeholder perspectives and requirements on cybersecurity in Europe},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102916},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102916},
  doi          = {10.1016/J.JISA.2021.102916},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Fischer-HubnerA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GassaraR21,
  author       = {Amal Gassara and
                  Ismael Bouassida Rodriguez},
  title        = {Describing correct UAVs cooperation architectures applied on an anti-terrorism
                  scenario},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102775},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102775},
  doi          = {10.1016/J.JISA.2021.102775},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GassaraR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GhaiTD21,
  author       = {Deepika Ghai and
                  Shailendra Tiwari and
                  N. N. Das},
  title        = {Bottom-boosting differential evolution based digital image security
                  analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102811},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102811},
  doi          = {10.1016/J.JISA.2021.102811},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GhaiTD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GountiaR21,
  author       = {Debasis Gountia and
                  Sudip Roy},
  title        = {Security model for protecting intellectual property of state-of-the-art
                  microfluidic biochips},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102773},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102773},
  doi          = {10.1016/J.JISA.2021.102773},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GountiaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloFMAZ21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Mario Faiella and
                  Ib{\'{e}}ria Medeiros and
                  Rui Azevedo and
                  Susana Gonzalez Zarzosa},
  title        = {{ETIP:} An Enriched Threat Intelligence Platform for improving {OSINT}
                  correlation, analysis, visualization and sharing capabilities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102715},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102715},
  doi          = {10.1016/J.JISA.2020.102715},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloFMAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuerberRL21,
  author       = {Christophe Guerber and
                  Micka{\"{e}}l Royer and
                  Nicolas Larrieu},
  title        = {Machine Learning and Software Defined Network to secure communications
                  in a swarm of drones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102940},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102940},
  doi          = {10.1016/J.JISA.2021.102940},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuerberRL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaGGAGS21,
  author       = {Sejal Gupta and
                  Ritu Garg and
                  Nitin Gupta and
                  Waleed S. Alnumay and
                  Uttam Ghosh and
                  Pradip Kumar Sharma},
  title        = {Energy-efficient dynamic homomorphic security scheme for fog computing
                  in IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102768},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102768},
  doi          = {10.1016/J.JISA.2021.102768},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaGGAGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaTK21,
  author       = {Rajesh Gupta and
                  Sudeep Tanwar and
                  Neeraj Kumar},
  title        = {Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under
                  imperfect {CSI}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102812},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102812},
  doi          = {10.1016/J.JISA.2021.102812},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaberfeldHL21,
  author       = {Carl Haberfeld and
                  Md. Shafaeat Hossain and
                  Lisa Lancor},
  title        = {Open code biometric tap pad for smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102688},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102688},
  doi          = {10.1016/J.JISA.2020.102688},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HaberfeldHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaqS21,
  author       = {Tanveer ul Haq and
                  Tariq Shah},
  title        = {4D mixed chaotic system and its application to {RGB} image encryption
                  using substitution-diffusion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102931},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102931},
  doi          = {10.1016/J.JISA.2021.102931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HaqS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HasanAKT21,
  author       = {Shaikha Hasan and
                  Mazen Ali and
                  Sherah Kurnia and
                  Ramayah Thurasamy},
  title        = {Evaluating the cyber security readiness of organizations and its influence
                  on performance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102726},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102726},
  doi          = {10.1016/J.JISA.2020.102726},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HasanAKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HazzaaSAC21,
  author       = {Firas Hazzaa and
                  Antesar M. Shabut and
                  Nada Hussein M. Ali and
                  Marcian N. Cirstea},
  title        = {Security Scheme Enhancement for Voice over Wireless Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102798},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102798},
  doi          = {10.1016/J.JISA.2021.102798},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HazzaaSAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Hernandez-Castro21,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  David F. Barrero and
                  Mar{\'{\i}}a D. R.{-}Moreno},
  title        = {{BASECASS:} {A} methodology for CAPTCHAs security assurance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103018},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103018},
  doi          = {10.1016/J.JISA.2021.103018},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Hernandez-Castro21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HijawiAAHF21,
  author       = {Wadi' Hijawi and
                  Ja'far Alqatawna and
                  Ala' M. Al{-}Zoubi and
                  Mohammad A. Hassonah and
                  Hossam Faris},
  title        = {Android botnet detection using machine learning models based on a
                  comprehensive static analysis approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102735},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102735},
  doi          = {10.1016/J.JISA.2020.102735},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HijawiAAHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HongF21,
  author       = {Yuxiang Hong and
                  Steven Furnell},
  title        = {Understanding cybersecurity behavioral habits: Insights from situational
                  support},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102710},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102710},
  doi          = {10.1016/J.JISA.2020.102710},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HongF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HozhabrAJ21,
  author       = {Maryam Hozhabr and
                  Parvaneh Asghari and
                  Hamid Haj Seyyed Javadi},
  title        = {Dynamic secure multi-keyword ranked search over encrypted cloud data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102902},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102902},
  doi          = {10.1016/J.JISA.2021.102902},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HozhabrAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HsuHXZL21,
  author       = {Chingfang Hsu and
                  Lein Harn and
                  Zhe Xia and
                  Maoyuan Zhang and
                  Quanrun Li},
  title        = {Design of ideal secret sharing based on new results on representable
                  quadripartite matroids},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102724},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102724},
  doi          = {10.1016/J.JISA.2020.102724},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HsuHXZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuaZZW21,
  author       = {Siliang Hua and
                  Huiguo Zhang and
                  Jingya Zhang and
                  Shuchang Wang},
  title        = {Optimization and implementation of the number theoretic transform
                  butterfly unit for large integer multiplication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102857},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102857},
  doi          = {10.1016/J.JISA.2021.102857},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuaZZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangCLL21,
  author       = {Peng{-}Cheng Huang and
                  Chinchen Chang and
                  Yung{-}Hui Li and
                  Yanjun Liu},
  title        = {Enhanced (n, n)-threshold {QR} code secret sharing scheme based on
                  error correction mechanism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102719},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102719},
  doi          = {10.1016/J.JISA.2020.102719},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangCLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangTLY21,
  author       = {Junjie Huang and
                  Liang Tan and
                  Wenjuan Li and
                  Keping Yu},
  title        = {RON-enhanced blockchain propagation mechanism for edge-enabled smart
                  cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102936},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102936},
  doi          = {10.1016/J.JISA.2021.102936},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuangTLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangW21,
  author       = {Hai Huang and
                  Luyao Wang},
  title        = {Efficient privacy-preserving face verification scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103055},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103055},
  doi          = {10.1016/J.JISA.2021.103055},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HussainUKKCK21,
  author       = {Saddam Hussain and
                  Insaf Ullah and
                  Hizbullah Khattak and
                  Muhammad Asghar Khan and
                  Chien{-}Ming Chen and
                  Saru Kumari},
  title        = {A lightweight and provable secure identity-based generalized proxy
                  signcryption {(IBGPS)} scheme for Industrial Internet of Things (IIoT)},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102625},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102625},
  doi          = {10.1016/J.JISA.2020.102625},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HussainUKKCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HusseinSMO21,
  title        = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable
                  Video Streaming in Fog Computing" Journal of Information Security
                  and Applications 51 {(2020)} 102412},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102807},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102807},
  doi          = {10.1016/J.JISA.2021.102807},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IqbalHAKR21,
  author       = {Nadeem Iqbal and
                  Muhammad Hanif and
                  Sagheer Abbas and
                  Muhammad Adnan Khan and
                  Zia Ul Rehman},
  title        = {Dynamic 3D scrambled image based {RGB} image encryption scheme using
                  hyperchaotic system and {DNA} encoding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102809},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102809},
  doi          = {10.1016/J.JISA.2021.102809},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IqbalHAKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IslamB21,
  author       = {SK Hafizul Islam and
                  Swagatam Basu},
  title        = {{PB-3PAKA:} Password-based three-party authenticated key agreement
                  protocol for mobile devices in post-quantum environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103026},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103026},
  doi          = {10.1016/J.JISA.2021.103026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IslamB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ItoSSLI21,
  author       = {Ryoma Ito and
                  Rentaro Shiba and
                  Kosei Sakamoto and
                  Fukang Liu and
                  Takanori Isobe},
  title        = {Bit-wise cryptanalysis on {AND-RX} permutation Friet-PC},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102860},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102860},
  doi          = {10.1016/J.JISA.2021.102860},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ItoSSLI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JahangirS21,
  author       = {Saira Jahangir and
                  Tariq Shah},
  title        = {A novel multiple color image encryption scheme based on algebra \emph{M}(2,
                  \emph{F}\({}_{\mbox{2}}\)[\emph{u}]/{\unicode{12296}}\emph{u}\({}^{\mbox{8}}\){\unicode{12297}})
                  and chaotic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102831},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102831},
  doi          = {10.1016/J.JISA.2021.102831},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JahangirS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JanY0W21,
  author       = {Mian Ahmad Jan and
                  Kuo{-}Hui Yeh and
                  Zhiyuan Tan and
                  Yulei Wu},
  title        = {Blockchain for edge-enabled smart cities applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102937},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102937},
  doi          = {10.1016/J.JISA.2021.102937},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JanY0W21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JananiB21,
  author       = {T. Janani and
                  M. Brindha},
  title        = {A secure medical image transmission scheme aided by quantum representation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102832},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102832},
  doi          = {10.1016/J.JISA.2021.102832},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JananiB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JavanmardiSMNPP21,
  author       = {Saeed Javanmardi and
                  Mohammad Shojafar and
                  Reza Mohammadi and
                  Amin Nazari and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {{FUPE:} {A} security driven task scheduling approach for SDN-based
                  IoT-Fog networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102853},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102853},
  doi          = {10.1016/J.JISA.2021.102853},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JavanmardiSMNPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiangYFQH21,
  author       = {Shuai Jiang and
                  Hong Yao and
                  Cai Fu and
                  Yekui Qian and
                  Lansheng Han},
  title        = {Function-level obfuscation detection method based on Graph Convolutional
                  Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102953},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102953},
  doi          = {10.1016/J.JISA.2021.102953},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiangYFQH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KallelCCKO21,
  author       = {Slim Kallel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Ahmed Hadj Kacem and
                  Lotfi Ben Othmane},
  title        = {Special issue on risk and security of smart systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102925},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102925},
  doi          = {10.1016/J.JISA.2021.102925},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KallelCCKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamalI21,
  author       = {Ahmad Akmal Aminuddin Mohd Kamal and
                  Keiichi Iwamura},
  title        = {Searchable encryption using secret sharing scheme that realizes direct
                  search of encrypted documents and disjunctive search of multiple keywords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102824},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102824},
  doi          = {10.1016/J.JISA.2021.102824},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KamalI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamilO21,
  author       = {Ismaila Adeniyi Kamil and
                  Sunday Oyinlola Ogundoyin},
  title        = {A lightweight certificateless authentication scheme and group key
                  agreement with dynamic updating mechanism for LTE-V-based internet
                  of vehicles in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102994},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102994},
  doi          = {10.1016/J.JISA.2021.102994},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KamilO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KarLL21,
  author       = {Jayaprakash Kar and
                  Xiaoguang Liu and
                  Fagen Li},
  title        = {{CL-ASS:} An efficient and low-cost certificateless aggregate signature
                  scheme for wireless sensor networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102905},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102905},
  doi          = {10.1016/J.JISA.2021.102905},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KarLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kasim21,
  author       = {{\"{O}}mer Kasim},
  title        = {An ensemble classification-based approach to detect attack level of
                  {SQL} injections},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102852},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102852},
  doi          = {10.1016/J.JISA.2021.102852},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Kasim21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KaurK21,
  author       = {Damandeep Kaur and
                  Devender Kumar},
  title        = {Cryptanalysis and improvement of a two-factor user authentication
                  scheme for smart home},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102787},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102787},
  doi          = {10.1016/J.JISA.2021.102787},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KaurK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KekulEA21,
  author       = {Hakan Kek{\"{u}}l and
                  Burhan Ergen and
                  Halil Arslan},
  title        = {A multiclass hybrid approach to estimating software vulnerability
                  vectors and severity score},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103028},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103028},
  doi          = {10.1016/J.JISA.2021.103028},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KekulEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KellyGB21,
  author       = {Daniel Kelly and
                  Frank G. Glavin and
                  Enda Barrett},
  title        = {Denial of wallet - Defining a looming threat to serverless computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102843},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102843},
  doi          = {10.1016/J.JISA.2021.102843},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KellyGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhalidMAJ21,
  author       = {Rabiya Khalid and
                  Muhammad Waseem Malik and
                  Turki Ali Alghamdi and
                  Nadeem Javaid},
  title        = {A consortium blockchain based energy trading scheme for Electric Vehicles
                  in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102998},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102998},
  doi          = {10.1016/J.JISA.2021.102998},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhalidMAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanBBJA21,
  author       = {Faraz Ahmad Khan and
                  Ahmed Bouridane and
                  Said Boussakta and
                  Richard Jiang and
                  Somaya Almaadeed},
  title        = {Secure facial recognition in the encrypted domain using a local ternary
                  pattern approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102810},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102810},
  doi          = {10.1016/J.JISA.2021.102810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanBBJA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanK21,
  author       = {Jan Sher Khan and
                  Sema Ko{\c{c}} Kayhan},
  title        = {Chaos and compressive sensing based novel image encryption scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102711},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102711},
  doi          = {10.1016/J.JISA.2020.102711},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimLAP21,
  author       = {Hyoseung Kim and
                  Youngkyung Lee and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical dynamic group signature with efficient concurrent joins
                  and batch verifications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103003},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103003},
  doi          = {10.1016/J.JISA.2021.103003},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimLAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kiperberg21,
  author       = {Michael Kiperberg},
  title        = {Preventing malicious communication using virtualization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102871},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102871},
  doi          = {10.1016/J.JISA.2021.102871},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Kiperberg21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KonyarS21,
  author       = {Mehmet Zeki Konyar and
                  Serdar Burak Solak},
  title        = {Efficient data hiding method for videos based on adaptive inverted
                  {LSB332} and secure frame selection with enhanced Vigenere cipher},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103037},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103037},
  doi          = {10.1016/J.JISA.2021.103037},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KonyarS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kumar21,
  author       = {Sachin Kumar},
  title        = {Image data security using Quasigroup combined with Fibonacci Q-transformation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102941},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102941},
  doi          = {10.1016/J.JISA.2021.102941},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Kumar21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunangNSS21,
  author       = {Yesi Novaria Kunang and
                  Siti Nurmaini and
                  Deris Stiawan and
                  Bhakti Yudho Suprapto},
  title        = {Attack classification of an intrusion detection system using deep
                  learning and hyperparameter optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102804},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102804},
  doi          = {10.1016/J.JISA.2021.102804},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunangNSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunduDM21,
  author       = {Nibedita Kundu and
                  Sumit Kumar Debnath and
                  Dheerendra Mishra},
  title        = {A secure and efficient group signature scheme based on multivariate
                  public key cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102776},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102776},
  doi          = {10.1016/J.JISA.2021.102776},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunduDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KuribayashiW21,
  author       = {Minoru Kuribayashi and
                  KokSheik Wong},
  title        = {StealthPDF: Data hiding method for {PDF} file with no visual degradation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102875},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102875},
  doi          = {10.1016/J.JISA.2021.102875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KuribayashiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaiLLJ21,
  author       = {Yen{-}Lung Lai and
                  Minyi Li and
                  Shiuan{-}Ni Liang and
                  Zhe Jin},
  title        = {Lossless fuzzy extractor enabled secure authentication using low entropy
                  noisy sources},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102695},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102695},
  doi          = {10.1016/J.JISA.2020.102695},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaiLLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaiphrakpamWBBB21,
  author       = {Dolendro Singh Laiphrakpam and
                  Leepeng Singh Waikhom and
                  Digambar Brahma and
                  Pratikshit Baruah and
                  Sarthak Biswas},
  title        = {Image compression-encryption scheme using {SPIHT} and chaotic systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103010},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103010},
  doi          = {10.1016/J.JISA.2021.103010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaiphrakpamWBBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LakshmiSP21,
  author       = {V. S. Lakshmi and
                  Deepthi Sundaran and
                  Deepthi P. P.},
  title        = {Collusion resistant secret sharing scheme for secure data storage
                  and processing over cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102869},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102869},
  doi          = {10.1016/J.JISA.2021.102869},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LakshmiSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaskawiecCKV21,
  author       = {Sebastian Laskawiec and
                  Michal Choras and
                  Rafal Kozik and
                  Vijayakumar Varadarajan},
  title        = {Intelligent operator: Machine learning based decision support and
                  explainer for human operators and service providers in the fog, cloud
                  and edge networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {56},
  pages        = {102685},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102685},
  doi          = {10.1016/J.JISA.2020.102685},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LaskawiecCKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeC21,
  author       = {Tian{-}Fu Lee and
                  Wei{-}Yu Chen},
  title        = {Lightweight fog computing-based authentication protocols using physically
                  unclonable functions for internet of medical things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102817},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102817},
  doi          = {10.1016/J.JISA.2021.102817},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiCHCN21,
  author       = {Ying Li and
                  Jiaxing Cheng and
                  Cheng Huang and
                  Zhouguo Chen and
                  Weina Niu},
  title        = {NEDetector: Automatically extracting cybersecurity neologisms from
                  hacker forums},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102784},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102784},
  doi          = {10.1016/J.JISA.2021.102784},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiCHCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiGZWFY21,
  author       = {Hao Li and
                  Min Gao and
                  Fengtao Zhou and
                  Yueyang Wang and
                  Qilin Fan and
                  Linda Yang},
  title        = {Fusing hypergraph spectral features for shilling attack detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103051},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103051},
  doi          = {10.1016/J.JISA.2021.103051},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiGZWFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLDW21,
  author       = {Yanbin Li and
                  Yu Liu and
                  Yongheng Dai and
                  Pengda Wang},
  title        = {A party-adaptive variant of LowGear},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102763},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102763},
  doi          = {10.1016/J.JISA.2021.102763},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLW21,
  author       = {Peng Li and
                  Junzuo Lai and
                  Yongdong Wu},
  title        = {Event-oriented linkable and traceable anonymous authentication and
                  its application to voting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102865},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102865},
  doi          = {10.1016/J.JISA.2021.102865},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiTB21,
  author       = {Yue Li and
                  Benedetta Tondi and
                  Mauro Barni},
  title        = {Spread-Transform Dither Modulation Watermarking of Deep Neural Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103004},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103004},
  doi          = {10.1016/J.JISA.2021.103004},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiWQYGWQ21,
  author       = {Haiyu Li and
                  Tao Wang and
                  Zirui Qiao and
                  Bo Yang and
                  Yueyang Gong and
                  Jingyi Wang and
                  Guoyong Qiu},
  title        = {Blockchain-based searchable encryption with efficient result verification
                  and fair payment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102791},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102791},
  doi          = {10.1016/J.JISA.2021.102791},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiWQYGWQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinWGY21,
  author       = {Yijian Lin and
                  Xiaoming Wang and
                  Qingqing Gan and
                  Mengting Yao},
  title        = {A secure cross-domain authentication scheme with perfect forward security
                  and complete anonymity in fog computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103022},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103022},
  doi          = {10.1016/J.JISA.2021.103022},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinWGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuJWRZ21,
  author       = {Lidong Liu and
                  Donghua Jiang and
                  Xingyuan Wang and
                  Xianwei Rong and
                  Renxiu Zhang},
  title        = {2D Logistic-Adjusted-Chebyshev map for visual color image encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102854},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102854},
  doi          = {10.1016/J.JISA.2021.102854},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuJWRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuTTM21,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  title        = {Designated-ciphertext searchable encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102709},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102709},
  doi          = {10.1016/J.JISA.2020.102709},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuTTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LizardoBNCA21,
  author       = {Andr{\'{e}} Lizardo and
                  Raul Barbosa and
                  Samuel Neves and
                  Jaime Correia and
                  Filipe Ara{\'{u}}jo},
  title        = {End-to-end secure group communication for the Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102772},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102772},
  doi          = {10.1016/J.JISA.2021.102772},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LizardoBNCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Logrippo21,
  author       = {Luigi Logrippo},
  title        = {Multi-level models for data security in networks and in the Internet
                  of things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102778},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102778},
  doi          = {10.1016/J.JISA.2021.102778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Logrippo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LvYZHT21,
  author       = {Lingling Lv and
                  Zhipeng Yang and
                  Lei Zhang and
                  Quanzhen Huang and
                  Zhihong Tian},
  title        = {Multi-party transaction framework for drone services based on alliance
                  blockchain in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102792},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102792},
  doi          = {10.1016/J.JISA.2021.102792},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LvYZHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaitraSSG21,
  author       = {Tanmoy Maitra and
                  Shiwangi Singh and
                  Ritwik Saurabh and
                  Debasis Giri},
  title        = {Analysis and enhancement of secure three-factor user authentication
                  using Chebyshev Chaotic Map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102915},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102915},
  doi          = {10.1016/J.JISA.2021.102915},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaitraSSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MandalD21,
  author       = {Mriganka Mandal and
                  Ratna Dutta},
  title        = {Identity-based outsider anonymous cloud data outsourcing with simultaneous
                  individual transmission for IoT environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102870},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102870},
  doi          = {10.1016/J.JISA.2021.102870},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MandalD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MannaPD21,
  author       = {Michele La Manna and
                  Pericle Perazzo and
                  Gianluca Dini},
  title        = {{SEA-BREW:} {A} scalable Attribute-Based Encryption revocable scheme
                  for low-bitrate IoT wireless networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102692},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102692},
  doi          = {10.1016/J.JISA.2020.102692},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MannaPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MathurPKNJ21,
  author       = {Akshay Mathur and
                  Laxmi Mounika Podila and
                  Keyur Kulkarni and
                  Quamar Niyaz and
                  Ahmad Y. Javaid},
  title        = {NATICUSdroid: {A} malware detection framework for Android using native
                  and custom permissions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102696},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102696},
  doi          = {10.1016/J.JISA.2020.102696},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MathurPKNJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MedjekTDR21,
  author       = {Faiza Medjek and
                  Djamel Tandjaoui and
                  Nabil Djedjig and
                  Imed Romdhani},
  title        = {Multicast {DIS} attack mitigation in RPL-based IoT-LLNs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102939},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102939},
  doi          = {10.1016/J.JISA.2021.102939},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MedjekTDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MillarMRM21,
  author       = {Stuart Millar and
                  Niall McLaughlin and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and
                  Paul Miller},
  title        = {Multi-view deep learning for zero-day Android malware detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102718},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102718},
  doi          = {10.1016/J.JISA.2020.102718},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MillarMRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraA21,
  author       = {Zeesha Mishra and
                  Bibhudendra Acharya},
  title        = {High throughput novel architectures of {TEA} family for high speed
                  IoT and {RFID} applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102906},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102906},
  doi          = {10.1016/J.JISA.2021.102906},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraIZ21,
  author       = {Nimish Mishra and
                  SK Hafizul Islam and
                  Sherali Zeadally},
  title        = {A comprehensive review on collision-resistant hash functions on lattices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102782},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102782},
  doi          = {10.1016/J.JISA.2021.102782},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraIZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraR21,
  author       = {Dheerendra Mishra and
                  Saurabh Rana},
  title        = {A provably secure content distribution framework for portable {DRM}
                  systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102928},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102928},
  doi          = {10.1016/J.JISA.2021.102928},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell21,
  author       = {Chris J. Mitchell},
  title        = {Yet another insecure group key distribution scheme using secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102713},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102713},
  doi          = {10.1016/J.JISA.2020.102713},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mohit21,
  author       = {Prerna Mohit},
  title        = {An efficient mutual authentication and privacy prevention scheme for
                  e-healthcare monitoring},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102992},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102992},
  doi          = {10.1016/J.JISA.2021.102992},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mohit21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MokbalWWZF21,
  author       = {Fawaz Mahiuob Mohammed Mokbal and
                  Dan Wang and
                  Xiaoxi Wang and
                  Wenbin Zhao and
                  Lihua Fu},
  title        = {{XGBXSS:} An Extreme Gradient Boosting Detection Framework for Cross-Site
                  Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters
                  Optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102813},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102813},
  doi          = {10.1016/J.JISA.2021.102813},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MokbalWWZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MondalSHBAA21,
  author       = {Dipankar Kumar Mondal and
                  Bikash Chandra Singh and
                  Haibo Hu and
                  Shivazi Biswas and
                  Md. Zulfikar Alom and
                  Mohammad Abdul Azim},
  title        = {SeizeMaliciousURL: {A} novel learning approach to detect malicious
                  URLs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102967},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102967},
  doi          = {10.1016/J.JISA.2021.102967},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MondalSHBAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MousaviG21,
  author       = {Seyyed Keyvan Mousavi and
                  Ali Ghaffari},
  title        = {Data cryptography in the Internet of Things using the artificial bee
                  colony algorithm in a smart irrigation system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102945},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102945},
  doi          = {10.1016/J.JISA.2021.102945},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MousaviG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MukherjeeSM21,
  author       = {Subhadip Mukherjee and
                  Sunita Sarkar and
                  Somnath Mukhopadhyay},
  title        = {Pencil shell matrix based image steganography with elevated embedding
                  capacity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102955},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102955},
  doi          = {10.1016/J.JISA.2021.102955},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MukherjeeSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NaseerSS21,
  author       = {Yasir Naseer and
                  Tariq Shah and
                  Dawood Shah},
  title        = {A novel hybrid permutation substitution base colored image encryption
                  scheme for multimedia data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102829},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102829},
  doi          = {10.1016/J.JISA.2021.102829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NaseerSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NavdetiBG21,
  author       = {Chandrakant Navdeti and
                  Indrajit Banerjee and
                  Chandan Giri},
  title        = {Privacy preservation and secure data sharing scheme in fog based vehicular
                  ad-hoc network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103014},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103014},
  doi          = {10.1016/J.JISA.2021.103014},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NavdetiBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NayakT21,
  author       = {Sanjeet Kumar Nayak and
                  Somanath Tripathy},
  title        = {{SEPS:} Efficient public-key based secure search over outsourced data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102932},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102932},
  doi          = {10.1016/J.JISA.2021.102932},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NayakT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NayarTE21,
  author       = {Gayathri R. Nayar and
                  Tony Thomas and
                  Sabu Emmanuel},
  title        = {Graph based secure cancelable palm vein biometrics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102991},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102991},
  doi          = {10.1016/J.JISA.2021.102991},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NayarTE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NespoliLM21,
  author       = {Pantaleone Nespoli and
                  Daniel D{\'{\i}}az L{\'{o}}pez and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol},
  title        = {Cyberprotection in IoT environments: {A} dynamic rule-based solution
                  to defend smart devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102878},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102878},
  doi          = {10.1016/J.JISA.2021.102878},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NespoliLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NikniaCK21,
  author       = {Ahad Niknia and
                  Miguel Correia and
                  Jaber Karimpour},
  title        = {Secure cloud-of-clouds storage with space-efficient secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102826},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102826},
  doi          = {10.1016/J.JISA.2021.102826},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NikniaCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NishaB21,
  author       = {O. S. Jannath Nisha and
                  Somasundaram Mary Saira Bhanu},
  title        = {Detection of malicious Android applications using Ontology-based intelligent
                  model in mobile cloud environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102751},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102751},
  doi          = {10.1016/J.JISA.2021.102751},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NishaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraMC21,
  author       = {Hassan N. Noura and
                  Reem Melki and
                  Ali Chehab},
  title        = {Efficient data confidentiality scheme for 5G wireless {NOMA} communications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102781},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102781},
  doi          = {10.1016/J.JISA.2021.102781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NouraMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NtantogianBAPX21,
  author       = {Christoforos Ntantogian and
                  Panagiotis Bountakas and
                  Dimitris Antonaropoulos and
                  Constantinos Patsakis and
                  Christos Xenakis},
  title        = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection
                  and eXPloitation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102752},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102752},
  doi          = {10.1016/J.JISA.2021.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Olukoya21,
  author       = {Oluwafemi Olukoya},
  title        = {Distilling blockchain requirements for digital investigation platforms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102969},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102969},
  doi          = {10.1016/J.JISA.2021.102969},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Olukoya21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PanjaR21,
  author       = {Somnath Panja and
                  Bimal Roy},
  title        = {A secure end-to-end verifiable e-voting system using blockchain and
                  cloud server},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102815},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102815},
  doi          = {10.1016/J.JISA.2021.102815},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PanjaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PareekP21,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {Secure and efficient revocable key-aggregate cryptosystem for multiple
                  non-predefined non-disjoint aggregate sets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102799},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102799},
  doi          = {10.1016/J.JISA.2021.102799},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PareekP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PareekP21a,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {{KAPRE:} Key-aggregate proxy re-encryption for secure and flexible
                  data sharing in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103009},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103009},
  doi          = {10.1016/J.JISA.2021.103009},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PareekP21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ParishST21,
  author       = {Zach Parish and
                  Amirali Salehi{-}Abari and
                  Julie Thorpe},
  title        = {A study on priming methods for graphical passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102913},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102913},
  doi          = {10.1016/J.JISA.2021.102913},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ParishST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatidarS21,
  author       = {Arpita Patidar and
                  Gaurav Somani},
  title        = {Serving while attacked: DDoS attack effect minimization using page
                  separation and container allocation strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102818},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102818},
  doi          = {10.1016/J.JISA.2021.102818},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatidarS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatsakisC21,
  author       = {Constantinos Patsakis and
                  Fran Casino},
  title        = {Exploiting statistical and structural features for the detection of
                  Domain Generation Algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102725},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102725},
  doi          = {10.1016/J.JISA.2020.102725},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatsakisC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaulIS21,
  author       = {Mahit Kumar Paul and
                  Md. Rabiul Islam and
                  A. H. M. Sarowar Sattar},
  title        = {An efficient perturbation approach for multivariate data in sensitive
                  and reliable data mining},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102954},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102954},
  doi          = {10.1016/J.JISA.2021.102954},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PaulIS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengCQGJL21,
  author       = {Jin{-}cheng Peng and
                  Yunhe Cui and
                  Qing Qian and
                  Chun Guo and
                  Chaohui Jiang and
                  Saifei Li},
  title        = {{ADVICE:} Towards adaptive scheduling for data collection and DDoS
                  detection in {SDN}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103017},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103017},
  doi          = {10.1016/J.JISA.2021.103017},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PengCQGJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PolapSY21,
  author       = {Dawid Polap and
                  Gautam Srivastava and
                  Keping Yu},
  title        = {Agent architecture of an intelligent medical system based on federated
                  learning and blockchain technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102748},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102748},
  doi          = {10.1016/J.JISA.2021.102748},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PolapSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PrasadP21,
  author       = {Shilpee Prasad and
                  B. R. Purushothama},
  title        = {{CCA} secure and efficient proxy re-encryption scheme without bilinear
                  pairing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102703},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102703},
  doi          = {10.1016/J.JISA.2020.102703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PrasadP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QinTZZ21,
  author       = {Shiyue Qin and
                  Zhenhua Tan and
                  Bin Zhang and
                  Fucai Zhou},
  title        = {Distributed secret sharing scheme based on the high-dimensional rotation
                  paraboloid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102797},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102797},
  doi          = {10.1016/J.JISA.2021.102797},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QinTZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QureshiASMJ21,
  author       = {Kashif Naseer Qureshi and
                  Adi Alhudhaif and
                  Adeel Abass Shah and
                  Saqib Majeed and
                  Gwanggil Jeon},
  title        = {Trust and priority-based drone assisted routing and mobility and service-oriented
                  solution for the internet of vehicles networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102864},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102864},
  doi          = {10.1016/J.JISA.2021.102864},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QureshiASMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RabieBK21,
  author       = {Tamer Rabie and
                  Mohammed Baziyad and
                  Ibrahim Kamel},
  title        = {Secure high payload steganography: {A} model-based approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103043},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103043},
  doi          = {10.1016/J.JISA.2021.103043},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RabieBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ReddyBNNGS21,
  author       = {Dukka Karun Kumar Reddy and
                  Himansu Sekhar Behera and
                  Janmenjoy Nayak and
                  Bighnaraj Naik and
                  Uttam Ghosh and
                  Pradip Kumar Sharma},
  title        = {Exact greedy algorithm based split finding approach for intrusion
                  detection in fog-enabled IoT environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102866},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102866},
  doi          = {10.1016/J.JISA.2021.102866},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ReddyBNNGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenCW21,
  author       = {Yanzhen Ren and
                  Sen Cai and
                  Lina Wang},
  title        = {Secure {AAC} steganography scheme based on multi-view statistical
                  distortion (SofMvD)},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102863},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102863},
  doi          = {10.1016/J.JISA.2021.102863},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenLSYZ21,
  author       = {Yanli Ren and
                  Xiangyu Li and
                  Shifeng Sun and
                  Xingliang Yuan and
                  Xinpeng Zhang},
  title        = {Privacy-preserving batch verification signature scheme based on blockchain
                  for Vehicular Ad-Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102698},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102698},
  doi          = {10.1016/J.JISA.2020.102698},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RezaeiMH21,
  author       = {Tina Rezaei and
                  Farnoush Manavi and
                  Ali Hamzeh},
  title        = {A {PE} header-based method for malware detection using clustering
                  and deep embedding techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102876},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102876},
  doi          = {10.1016/J.JISA.2021.102876},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RezaeiMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RhahlaAA21,
  author       = {Mouna Rhahla and
                  Sahar Allegue and
                  Takoua Abdellatif},
  title        = {Guidelines for {GDPR} compliance in Big Data systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102896},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102896},
  doi          = {10.1016/J.JISA.2021.102896},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RhahlaAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RodriguezMBS21,
  author       = {Jes{\'{u}}s Garc{\'{\i}}a Rodr{\'{\i}}guez and
                  Rafael Torres Moreno and
                  Jorge Bernal Bernab{\'{e}} and
                  Antonio F. Skarmeta},
  title        = {Implementation and evaluation of a privacy-preserving distributed
                  {ABC} scheme based on multi-signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102971},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102971},
  doi          = {10.1016/J.JISA.2021.102971},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RodriguezMBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RoySRPN21,
  author       = {Satyabrata Roy and
                  Manu Shrivastava and
                  Umashankar Rawat and
                  Chirag Vinodkumar Pandey and
                  Sanjeet Kumar Nayak},
  title        = {{IESCA:} An efficient image encryption scheme using 2-D cellular automata},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102919},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102919},
  doi          = {10.1016/J.JISA.2021.102919},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RoySRPN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RyuPC21,
  author       = {Gwonsang Ryu and
                  Hosung Park and
                  Daeseon Choi},
  title        = {Adversarial attacks by attaching noise markers on the face against
                  deep face recognition},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102874},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102874},
  doi          = {10.1016/J.JISA.2021.102874},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RyuPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SK21,
  author       = {Ajish S and
                  K. S. Anil Kumar},
  title        = {Secure mobile internet voting system using biometric authentication
                  and wavelet based {AES}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102908},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102908},
  doi          = {10.1016/J.JISA.2021.102908},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SabirGM21,
  author       = {Shazia Sabir and
                  Vandana Guleria and
                  Deep Chandra Mishra},
  title        = {Security of multiple {RGB} images in the time domain and frequency
                  domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103005},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103005},
  doi          = {10.1016/J.JISA.2021.103005},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SabirGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaharanLBG21,
  author       = {Shweta Saharan and
                  Vijay Laxmi and
                  Bruhadeshwar Bezawada and
                  Manoj Singh Gaur},
  title        = {\emph{Scaling {\&} fuzzing: } Personal image privacy from automated
                  attacks in mobile cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102850},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102850},
  doi          = {10.1016/J.JISA.2021.102850},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SaharanLBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahinKAK21,
  author       = {Durmus {\"{O}}zkan Sahin and
                  Oguz Emre Kural and
                  Sedat Akleylek and
                  Erdal Kili{\c{c}}},
  title        = {Permission-based Android malware analysis by using dimension reduction
                  with {PCA} and {LDA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102995},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102995},
  doi          = {10.1016/J.JISA.2021.102995},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SahinKAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahuSSH21,
  author       = {Aditya Kumar Sahu and
                  Gandharba Swain and
                  Monalisa Sahu and
                  J. Hemalatha},
  title        = {Multi-directional block based {PVD} and modulus function image steganography
                  to avoid {FOBP} and {IEP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102808},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102808},
  doi          = {10.1016/J.JISA.2021.102808},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SahuSSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SailMMB21,
  author       = {Soufiane Sail and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Inmaculada Medina{-}Bulo and
                  Halima Bouden},
  title        = {Preserving authentication and availability security services through
                  Multivariate Statistical Network Monitoring},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102785},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102785},
  doi          = {10.1016/J.JISA.2021.102785},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SailMMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaleemIAMH21,
  author       = {Muhammad Asad Saleem and
                  SK Hafizul Islam and
                  Shafiq Ahmed and
                  Khalid Mahmood and
                  Majid Hussain},
  title        = {Provably secure biometric-based client-server secure communication
                  over unreliable networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102769},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102769},
  doi          = {10.1016/J.JISA.2021.102769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SaleemIAMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SarahBD21,
  author       = {Izza Sarah and
                  Mustapha Benssalah and
                  Karim Drouiche},
  title        = {An enhanced scalable and secure {RFID} authentication protocol for
                  {WBAN} within an IoT environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102705},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102705},
  doi          = {10.1016/J.JISA.2020.102705},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SarahBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SenguptaL21,
  author       = {Binanda Sengupta and
                  Anantharaman Lakshminarayanan},
  title        = {DistriTrust: Distributed and low-latency access validation in zero-trust
                  architecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103023},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103023},
  doi          = {10.1016/J.JISA.2021.103023},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SenguptaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SethiYKB21,
  author       = {Kamalakanta Sethi and
                  Venu Madhav Yatam and
                  Rahul Kumar and
                  Padmalochan Bera},
  title        = {Attention based multi-agent intrusion detection systems using reinforcement
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102923},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102923},
  doi          = {10.1016/J.JISA.2021.102923},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SethiYKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SeyhanNACI21,
  author       = {K{\"{u}}bra Seyhan and
                  Tu N. Nguyen and
                  Sedat Akleylek and
                  Korhan Cengiz and
                  SK Hafizul Islam},
  title        = {Bi-GISIS {KE:} Modified key exchange protocol with reusable keys for
                  IoT security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102788},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102788},
  doi          = {10.1016/J.JISA.2021.102788},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SeyhanNACI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShahASTTK21,
  author       = {Jay Shah and
                  Sarthak Agarwal and
                  Arpit Shukla and
                  Sudeep Tanwar and
                  Sudhanshu Tyagi and
                  Neeraj Kumar},
  title        = {Blockchain-based scheme for the mobile number portability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102764},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102764},
  doi          = {10.1016/J.JISA.2021.102764},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShahASTTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaJM21,
  author       = {Pratima Sharma and
                  Rajni Jindal and
                  Dutta Borah Malaya},
  title        = {Blockchain-based decentralized architecture for cloud storage system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102970},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102970},
  doi          = {10.1016/J.JISA.2021.102970},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaWG21,
  author       = {Rahul Sharma and
                  Mohammad Wazid and
                  Prosanta Gope},
  title        = {A blockchain based secure communication framework for community interaction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102790},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102790},
  doi          = {10.1016/J.JISA.2021.102790},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghA21,
  author       = {Roop Singh and
                  Alaknanda Ashok},
  title        = {An optimized robust watermarking technique using {CKGSA} in frequency
                  domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102734},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102734},
  doi          = {10.1016/J.JISA.2020.102734},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghSSM21,
  author       = {Nongmeikapam Brajabidhu Singh and
                  Moirangthem Marjit Singh and
                  Arindam Sarkar and
                  Jyotsna Kumar Mandal},
  title        = {A novel wide {\&} deep transfer learning stacked {GRU} framework
                  for network intrusion detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102899},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102899},
  doi          = {10.1016/J.JISA.2021.102899},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghSSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SlimanOTSR21,
  author       = {Layth Sliman and
                  Tasnime Omrani and
                  Zahir Tari and
                  Abed Ellatif Samhat and
                  Rhouma Rhouma},
  title        = {Towards an ultra lightweight block ciphers for Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102897},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102897},
  doi          = {10.1016/J.JISA.2021.102897},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SlimanOTSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoniPISK21,
  author       = {Preeti Soni and
                  Arup Kumar Pal and
                  SK Hafizul Islam and
                  Aadarsh Singh and
                  Priyanshu Kumar},
  title        = {Provably secure and biometric-based secure access of e-Governance
                  services using mobile devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103016},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103016},
  doi          = {10.1016/J.JISA.2021.103016},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SoniPISK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SowjanyaDR21,
  author       = {K. Sowjanya and
                  Mou Dasgupta and
                  Sangram Ray},
  title        = {Elliptic Curve Cryptography based authentication scheme for Internet
                  of Medical Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102761},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102761},
  doi          = {10.1016/J.JISA.2021.102761},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SowjanyaDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SravaniS21,
  author       = {Mesala M. Sravani and
                  Ananiah Durai Sundararajan},
  title        = {Attacks on cryptosystems implemented via {VLSI:} {A} review},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102861},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102861},
  doi          = {10.1016/J.JISA.2021.102861},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SravaniS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StudiawanS21,
  author       = {Hudan Studiawan and
                  Ferdous Sohel},
  title        = {Anomaly detection in a forensic timeline with deep autoencoders},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103002},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103002},
  doi          = {10.1016/J.JISA.2021.103002},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/StudiawanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Suzen21,
  author       = {Ahmet Ali S{\"{u}}zen},
  title        = {{UNI-CAPTCHA:} {A} Novel Robust and Dynamic User-Non-Interaction {CAPTCHA}
                  Model Based on Hybrid biLSTM+Softmax},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103036},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103036},
  doi          = {10.1016/J.JISA.2021.103036},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Suzen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SyrrisG21,
  author       = {Vasileios Syrris and
                  Dimitris Geneiatakis},
  title        = {On machine learning effectiveness for malware detection in Android
                  {OS} using static analysis data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102794},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102794},
  doi          = {10.1016/J.JISA.2021.102794},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SyrrisG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TaftiMB21,
  author       = {Forough Sadat Mirkarimzade Tafti and
                  Shahriar Mohammadi and
                  Mehdi Babagoli},
  title        = {A new {NFC} mobile payment protocol using improved {GSM} based authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102997},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102997},
  doi          = {10.1016/J.JISA.2021.102997},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TaftiMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TosunS21,
  author       = {Tolun Tosun and
                  Erkay Savas},
  title        = {{FSDS:} {A} practical and fully secure document similarity search
                  over encrypted data with lightweight client},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102830},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102830},
  doi          = {10.1016/J.JISA.2021.102830},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TosunS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Trujillo-Rasua21,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Secure memory erasure in the presence of man-in-the-middle attackers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102730},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102730},
  doi          = {10.1016/J.JISA.2020.102730},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Trujillo-Rasua21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TsafackINNKABE21,
  author       = {Nestor Tsafack and
                  Abdullah M. Iliyasu and
                  Jean De Dieu Nkapkop and
                  Zeric Tabekoueng Njitacke and
                  Jacques Kengne and
                  Bassem Abd{-}El{-}Atty and
                  Akram Belazi and
                  Ahmed A. Abd El{-}Latif},
  title        = {A memristive {RLC} oscillator dynamics applied to image encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102944},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102944},
  doi          = {10.1016/J.JISA.2021.102944},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TsafackINNKABE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UllahAH21,
  author       = {Ikram Ullah and
                  Naveed Ahmed Azam and
                  Umar Hayat},
  title        = {Efficient and secure substitution box and random number generators
                  over Mordell elliptic curves},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {56},
  pages        = {102619},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102619},
  doi          = {10.1016/J.JISA.2020.102619},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UllahAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VarandaSCOR21,
  author       = {Artur Varanda and
                  Leonel Santos and
                  Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and
                  Adail Oliveira and
                  Carlos Rabad{\~{a}}o},
  title        = {Log pseudonymization: Privacy maintenance in practice},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103021},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103021},
  doi          = {10.1016/J.JISA.2021.103021},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VarandaSCOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VermaBST21,
  author       = {Ashwin Verma and
                  Pronaya Bhattacharya and
                  Deepti Saraswat and
                  Sudeep Tanwar},
  title        = {\emph{NyaYa}: Blockchain-based electronic law record management scheme
                  for judicial investigations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103025},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103025},
  doi          = {10.1016/J.JISA.2021.103025},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VermaBST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VijayI21,
  author       = {M. Vijay and
                  G. Indumathi},
  title        = {Deep belief network-based hybrid model for multimodal biometric system
                  for futuristic security applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102707},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102707},
  doi          = {10.1016/J.JISA.2020.102707},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VijayI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wang0DZW21,
  author       = {Huili Wang and
                  Wenping Ma and
                  Fuyang Deng and
                  Haibin Zheng and
                  Qianhong Wu},
  title        = {Dynamic threshold {ECDSA} signature and application to asset custody
                  in blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102805},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102805},
  doi          = {10.1016/J.JISA.2021.102805},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Wang0DZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangDD21,
  author       = {Rui Wang and
                  Guoqiang Deng and
                  Xue{-}Feng Duan},
  title        = {An image encryption scheme based on double chaotic cyclic shift and
                  Josephus problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102699},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102699},
  doi          = {10.1016/J.JISA.2020.102699},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangGLCLX21,
  author       = {Yu Wang and
                  Gaopeng Gou and
                  Chang Liu and
                  Mingxin Cui and
                  Zhen Li and
                  Gang Xiong},
  title        = {Survey of security supervision on blockchain from the perspective
                  of technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102859},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102859},
  doi          = {10.1016/J.JISA.2021.102859},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangGLCLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangMHHD21,
  author       = {Xiaochao Wang and
                  Ding Ma and
                  Kun Hu and
                  Jianping Hu and
                  Ling Du},
  title        = {Mapping based Residual Convolution Neural Network for Non-embedding
                  and Blind Image Watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102820},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102820},
  doi          = {10.1016/J.JISA.2021.102820},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangMHHD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangS21,
  author       = {Mengli Wang and
                  Lipeng Song},
  title        = {Efficient defense strategy against spam and phishing email: An evolutionary
                  game model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102947},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102947},
  doi          = {10.1016/J.JISA.2021.102947},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiaFGWTW21,
  author       = {Zhuoqun Xia and
                  Zhenwei Fang and
                  Ke Gu and
                  Jin Wang and
                  Jingjing Tan and
                  Guanghui Wang},
  title        = {Effective charging identity authentication scheme based on fog computing
                  in {V2G} networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102649},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102649},
  doi          = {10.1016/J.JISA.2020.102649},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiaFGWTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuHZ21,
  author       = {Bingfeng Xu and
                  Gaofeng He and
                  Haiting Zhu},
  title        = {ME-Box: {A} reliable method to detect malicious encrypted traffic},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {59},
  pages        = {102823},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102823},
  doi          = {10.1016/J.JISA.2021.102823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuSD21,
  author       = {Congyuan Xu and
                  Jizhong Shen and
                  Xin Du},
  title        = {Low-rate DoS attack detection method based on hybrid deep neural networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102879},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102879},
  doi          = {10.1016/J.JISA.2021.102879},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XueSWHWL21,
  author       = {Mingfu Xue and
                  Shichang Sun and
                  Zhiyu Wu and
                  Can He and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {SocialGuard: An adversarial example based privacy-preserving technique
                  for social images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {102993},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102993},
  doi          = {10.1016/J.JISA.2021.102993},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XueSWHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XueYHWL21,
  author       = {Mingfu Xue and
                  Chengxiang Yuan and
                  Can He and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {NaturalAE: Natural and robust physical adversarial examples for object
                  detectors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102694},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102694},
  doi          = {10.1016/J.JISA.2020.102694},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XueYHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YadavPS21,
  author       = {Anil Yadav and
                  Sujata Pandey and
                  Rajat Kumar Singh},
  title        = {Lightweight capability-token for consent-based authentication protocol
                  for smart sensor nodes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103024},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103024},
  doi          = {10.1016/J.JISA.2021.103024},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YadavPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YaminUUK21,
  author       = {Muhammad Mudassar Yamin and
                  Mohib Ullah and
                  Habib Ullah and
                  Basel Katt},
  title        = {Weaponized {AI} for cyber attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102722},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102722},
  doi          = {10.1016/J.JISA.2020.102722},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YaminUUK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangKW21,
  author       = {Ching{-}Nung Yang and
                  Chung{-}Lun Kao and
                  Chang{-}Ji Wang},
  title        = {Two-dimensional diagonal layer hash chain based key pre-distribution
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103038},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103038},
  doi          = {10.1016/J.JISA.2021.103038},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLWBZD21,
  author       = {Luhui Yang and
                  Guangjie Liu and
                  Jinwei Wang and
                  Huiwen Bai and
                  Jiangtao Zhai and
                  Yuewei Dai},
  title        = {Fast3DS: {A} real-time full-convolutional malicious domain name detection
                  system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102933},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102933},
  doi          = {10.1016/J.JISA.2021.102933},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLWBZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangTL21,
  author       = {Ching{-}Nung Yang and
                  Po{-}Yu Tsai and
                  Yanxiao Liu},
  title        = {A (\emph{k, n}) secret document sharing with meaningful shares},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102973},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102973},
  doi          = {10.1016/J.JISA.2021.102973},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWLK21,
  author       = {Ching{-}Nung Yang and
                  Xiaotian Wu and
                  Hsuan{-}Yu Lin and
                  Cheonshik Kim},
  title        = {Intragroup and intergroup secret image sharing based on homomorphic
                  Lagrange interpolation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102910},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102910},
  doi          = {10.1016/J.JISA.2021.102910},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWSZ21,
  author       = {Wencheng Yang and
                  Song Wang and
                  Muhammad Shahzad and
                  Wei Zhou},
  title        = {A cancelable biometric authentication system based on feature-adaptive
                  random projection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102704},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102704},
  doi          = {10.1016/J.JISA.2020.102704},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Yavuz21,
  author       = {Erdem Yavuz},
  title        = {A new parallel processing architecture for accelerating image encryption
                  based on chaos},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103056},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103056},
  doi          = {10.1016/J.JISA.2021.103056},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Yavuz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YilmazCAH21,
  author       = {Yagiz Yilmaz and
                  Or{\c{c}}un {\c{C}}etin and
                  Budi Arief and
                  Julio C. Hernandez{-}Castro},
  title        = {Investigating the impact of ransomware splash screens},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102934},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102934},
  doi          = {10.1016/J.JISA.2021.102934},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YilmazCAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YouLG21,
  author       = {Zhaoning You and
                  Yan Liu and
                  Tiegang Gao},
  title        = {A lossless self-recovery watermarking scheme with {JPEG-LS} compression},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102733},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102733},
  doi          = {10.1016/J.JISA.2020.102733},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YouLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCJ21,
  author       = {Jiyan Zhang and
                  Ting Cui and
                  Chenhui Jin},
  title        = {A generic framework for decomposing block cipher structure with secret
                  components},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102855},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102855},
  doi          = {10.1016/J.JISA.2021.102855},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCKAKR21,
  author       = {Yanbin Zhang and
                  Ke Cheng and
                  Fazlullah Khan and
                  Ryan Alturki and
                  Rahim Khan and
                  Ateeq Ur Rehman},
  title        = {A mutual authentication scheme for establishing secure device-to-device
                  communication sessions in the edge-enabled smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102683},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102683},
  doi          = {10.1016/J.JISA.2020.102683},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCKAKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangGGS21,
  author       = {Lei Zhang and
                  Yajun Guo and
                  Xiaowei Guo and
                  Xiaowei Shao},
  title        = {Does the layout of the Android unlock pattern affect the security
                  and usability of the password?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {103011},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103011},
  doi          = {10.1016/J.JISA.2021.103011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangGGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouDW21,
  author       = {Yu Zhou and
                  Xinfeng Dong and
                  Yongzhuang Wei},
  title        = {On the transparency order relationships between one Boolean function
                  and its decomposition functions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102738},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102738},
  doi          = {10.1016/J.JISA.2020.102738},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhuG21,
  author       = {Hui Zhu and
                  Christian Gehrmann},
  title        = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102924},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102924},
  doi          = {10.1016/J.JISA.2021.102924},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhuG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhuGZ21,
  author       = {Hegui Zhu and
                  Yujia Guo and
                  Libo Zhang},
  title        = {An improved convolution Merkle tree-based blockchain electronic medical
                  record secure storage scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102952},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102952},
  doi          = {10.1016/J.JISA.2021.102952},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhuGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Acharya20,
  author       = {Kamalesh Acharya},
  title        = {Secure and efficient public key multi-channel broadcast encryption
                  schemes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102436},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102436},
  doi          = {10.1016/J.JISA.2019.102436},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Acharya20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmedASAM20,
  author       = {Kazi Wasif Ahmed and
                  Md Momin Al Aziz and
                  Md. Nazmus Sadat and
                  Dima Alhadidi and
                  Noman Mohammed},
  title        = {Nearest neighbour search over encrypted data using intel {SGX}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102579},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102579},
  doi          = {10.1016/J.JISA.2020.102579},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmedASAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Al-WesabiMN20,
  author       = {Fahd N. Al{-}Wesabi and
                  Khalid Mahmood and
                  Nadhem Nemri},
  title        = {A zero watermarking approach for content authentication and tampering
                  detection of Arabic text based on fourth level order and word mechanism
                  of Markov model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102473},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102473},
  doi          = {10.1016/J.JISA.2020.102473},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Al-WesabiMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlEroudAAA20,
  author       = {Ahmed Aleroud and
                  Emad Abu{-}Shanab and
                  Ahmad Al{-}Aiad and
                  Yazan Alshboul},
  title        = {An examination of susceptibility to spear phishing cyber attacks in
                  non-English speaking communities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102614},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102614},
  doi          = {10.1016/J.JISA.2020.102614},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlEroudAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlbahraniML20,
  author       = {Ekhlas Abbas Albahrani and
                  Amal Abdulbaqi Maryoosh and
                  Sadeq H. Lafta},
  title        = {Block image encryption based on modified playfair and chaotic system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102445},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102445},
  doi          = {10.1016/J.JISA.2019.102445},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlbahraniML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlhadawiLZA20,
  author       = {Hussam S. Alhadawi and
                  Dragan Lambic and
                  Mohamad Fadli Zolkipli and
                  Musheer Ahmad},
  title        = {Globalized firefly algorithm and chaos for designing substitution
                  box},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102671},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102671},
  doi          = {10.1016/J.JISA.2020.102671},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlhadawiLZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliGKCIG20,
  author       = {Zeeshan Ali and
                  Anwar Ghani and
                  Imran Khan and
                  Shehzad Ashraf Chaudhry and
                  SK Hafizul Islam and
                  Debasis Giri},
  title        = {A robust authentication and access control protocol for securing wireless
                  healthcare sensor networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102502},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102502},
  doi          = {10.1016/J.JISA.2020.102502},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AliGKCIG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AoufiDG20,
  author       = {Souhila Aoufi and
                  Abdelouahid Derhab and
                  Mohamed Guerroumi},
  title        = {Survey of false data injection in smart power grid: Attacks, countermeasures
                  and challenges},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102518},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102518},
  doi          = {10.1016/J.JISA.2020.102518},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AoufiDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AriefKP20,
  author       = {Raditya Arief and
                  Nima Khakzad and
                  Wolter Pieters},
  title        = {Mitigating cyberattack related domino effects in process plants via
                  {ICS} segmentation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102450},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102450},
  doi          = {10.1016/J.JISA.2020.102450},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AriefKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AskariH20,
  author       = {Sikdar Md. S. Askari and
                  Md. Anwar Hussain},
  title        = {{IFDTC4.5:} Intuitionistic fuzzy logic based decision tree for E-transactional
                  fraud detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102469},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102469},
  doi          = {10.1016/J.JISA.2020.102469},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AskariH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AskarinWP20,
  author       = {Mohammad Mogharen Askarin and
                  KokSheik Wong and
                  Rapha{\"{e}}l C.{-}W. Phan},
  title        = {Reduced contact lifting of latent fingerprints from curved surfaces},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102520},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102520},
  doi          = {10.1016/J.JISA.2020.102520},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AskarinWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AsvijaEB20,
  author       = {B. Asvija and
                  Rajagopal Eswari and
                  M. B. Bijoy},
  title        = {Bayesian attack graphs for platform virtualized infrastructures in
                  clouds},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102455},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102455},
  doi          = {10.1016/J.JISA.2020.102455},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AsvijaEB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AyebieS20,
  author       = {Edoukou Berenger Ayebie and
                  El Mamoun Souidi},
  title        = {Rank-metric code-based mutual authentication protocol for {RFID}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102598},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102598},
  doi          = {10.1016/J.JISA.2020.102598},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AyebieS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AyubSAMK20,
  author       = {Muhammad Faizan Ayub and
                  Muhammad Asad Saleem and
                  Izwa Altaf and
                  Khalid Mahmood and
                  Saru Kumari},
  title        = {Fuzzy extraction and {PUF} based three party authentication protocol
                  using {USB} as mass storage device},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102585},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102585},
  doi          = {10.1016/J.JISA.2020.102585},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AyubSAMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AyubiSR20,
  author       = {Peyman Ayubi and
                  Saeed Setayeshi and
                  Amir Masoud Rahmani},
  title        = {Deterministic chaos game: {A} new fractal based pseudo-random number
                  generator and its cryptographic application},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102472},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102472},
  doi          = {10.1016/J.JISA.2020.102472},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AyubiSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BabaghayouLALF20,
  author       = {Messaoud Babaghayou and
                  Nabila Labraoui and
                  Ado Adamou Abba Ari and
                  Nasreddine Lagraa and
                  Mohamed Amine Ferrag},
  title        = {Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc
                  networks: {A} survey},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102618},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102618},
  doi          = {10.1016/J.JISA.2020.102618},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BabaghayouLALF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BanerjeeRODCRP20,
  author       = {Soumya Banerjee and
                  Sandip Roy and
                  Vanga Odelu and
                  Ashok Kumar Das and
                  Samiran Chattopadhyay and
                  Joel J. P. C. Rodrigues and
                  Youngho Park},
  title        = {Multi-Authority CP-ABE-Based user access control scheme with constant-size
                  key and ciphertext for IoT deployment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102503},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102503},
  doi          = {10.1016/J.JISA.2020.102503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BanerjeeRODCRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BaraniAVI20,
  author       = {Milad Jafari Barani and
                  Peyman Ayubi and
                  Milad Yousefi Valandar and
                  Behzad Yosefnezhad Irani},
  title        = {A new Pseudo random number generator based on generalized Newton complex
                  map with dynamic key},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102509},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102509},
  doi          = {10.1016/J.JISA.2020.102509},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BaraniAVI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BarrereHNEP20,
  author       = {Mart{\'{\i}}n Barr{\`{e}}re and
                  Chris Hankin and
                  Nicolas Nicolaou and
                  Demetrios G. Eliades and
                  Thomas Parisini},
  title        = {Measuring cyber-physical security in industrial control systems via
                  minimum-effort attack strategies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102471},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102471},
  doi          = {10.1016/J.JISA.2020.102471},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BarrereHNEP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BelhamraS20,
  author       = {Mohamed Amine Belhamra and
                  El Mamoun Souidi},
  title        = {Steganography over Redundant Residue Number System Codes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102434},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102434},
  doi          = {10.1016/J.JISA.2019.102434},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BelhamraS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BerlatoC20,
  author       = {Stefano Berlato and
                  Mariano Ceccato},
  title        = {A large-scale study on the adoption of anti-debugging and anti-tampering
                  protections in android apps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102463},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102463},
  doi          = {10.1016/J.JISA.2020.102463},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BerlatoC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bidgoly20,
  author       = {Amir Jalaly Bidgoly},
  title        = {Robustness verification of soft security systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102632},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102632},
  doi          = {10.1016/J.JISA.2020.102632},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Bidgoly20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BokharaieJ20,
  author       = {Vahhab Samadi Bokharaie and
                  A. Jahanian},
  title        = {Side-channel leakage assessment metrics and methodologies at design
                  cycle: {A} case study for a cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102561},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102561},
  doi          = {10.1016/J.JISA.2020.102561},
  timestamp    = {Fri, 13 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BokharaieJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BouakkazS20,
  author       = {Samra Bouakkaz and
                  Fouzi Semchedine},
  title        = {A certificateless ring signature scheme with batch verification for
                  applications in {VANET}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102669},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102669},
  doi          = {10.1016/J.JISA.2020.102669},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BouakkazS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BoussahaCBB20,
  author       = {Ryma Boussaha and
                  Yacine Challal and
                  Abdelmadjid Bouabdallah and
                  Malika Bessedik},
  title        = {Optimized in-network authentication against pollution attacks in software-defined-named
                  data networking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102409},
  doi          = {10.1016/J.JISA.2019.102409},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BoussahaCBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Broumandnia20,
  author       = {Ali Broumandnia},
  title        = {Image encryption algorithm based on the finite fields in chaotic maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102553},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102553},
  doi          = {10.1016/J.JISA.2020.102553},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Broumandnia20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CaesarS20,
  author       = {Matthias Caesar and
                  Jan Steffan},
  title        = {A location privacy analysis of Bluetooth mesh},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102563},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102563},
  doi          = {10.1016/J.JISA.2020.102563},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CaesarS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CalderoniBM20,
  author       = {Luca Calderoni and
                  Samantha Bandini and
                  Dario Maio},
  title        = {Privacy preservation in outsourced mobility traces through compact
                  data structures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102630},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102630},
  doi          = {10.1016/J.JISA.2020.102630},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CalderoniBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChSGMB20,
  author       = {Rupa Ch. and
                  Gautam Srivastava and
                  Thippa Reddy Gadekallu and
                  Praveen Kumar Reddy Maddikunta and
                  Sweta Bhattacharya},
  title        = {Security and privacy of {UAV} data using blockchain technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102670},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102670},
  doi          = {10.1016/J.JISA.2020.102670},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChSGMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCMTLR20,
  author       = {Zhanwen Chen and
                  Jiageng Chen and
                  Weizhi Meng and
                  Je Sen Teh and
                  Pei Li and
                  Bingqing Ren},
  title        = {Analysis of differential distribution of lightweight block cipher
                  based on parallel processing on {GPU}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102565},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102565},
  doi          = {10.1016/J.JISA.2020.102565},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCMTLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenCN20,
  author       = {Longbin Chen and
                  Li{-}Chiou Chen and
                  Nader Nassar},
  title        = {Carp: {A} cost-aware relaxed protocol for encrypted data stores},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102501},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102501},
  doi          = {10.1016/J.JISA.2020.102501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenLZH20,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Universal stego post-processing for enhancing image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102664},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102664},
  doi          = {10.1016/J.JISA.2020.102664},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenLZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenSLCW20,
  author       = {Yong{-}qing Chen and
                  Wei{-}jiao Sun and
                  Liyao Li and
                  Chin{-}Chen Chang and
                  Xu Wang},
  title        = {An efficient general data hiding scheme based on image interpolation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102584},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102584},
  doi          = {10.1016/J.JISA.2020.102584},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenSLCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChowdhuriJ20,
  author       = {Partha Chowdhuri and
                  Biswapati Jana},
  title        = {Hiding data in dual color images reversibly via weighted matrix},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102420},
  doi          = {10.1016/J.JISA.2019.102420},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChowdhuriJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CimatoGSAD20,
  author       = {Stelvio Cimato and
                  Gabriele Gianini and
                  Maryam Sepehri and
                  Rasool Asal and
                  Ernesto Damiani},
  title        = {A cryptographic cloud-based approach for the mitigation of the airline
                  cargo cancellation problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102462},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102462},
  doi          = {10.1016/J.JISA.2020.102462},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CimatoGSAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DaleziosSKG20,
  author       = {Nikolaos Dalezios and
                  Stavros Shiaeles and
                  Nicholas Kolokotronis and
                  Bogdan Ghita},
  title        = {Digital forensics cloud log unification: Implementing {CADF} in Apache
                  CloudStack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102555},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102555},
  doi          = {10.1016/J.JISA.2020.102555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DaleziosSKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DaneshgarA20,
  author       = {Fatemeh Faraji Daneshgar and
                  Maghsoud Abbaspour},
  title        = {A two-phase sequential pattern mining framework to detect stealthy
                  {P2P} botnets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102645},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102645},
  doi          = {10.1016/J.JISA.2020.102645},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DaneshgarA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DavidT20,
  author       = {Jisa David and
                  Ciza Thomas},
  title        = {Detection of distributed denial of service attacks based on information
                  theoretic approach in time series models},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102621},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102621},
  doi          = {10.1016/J.JISA.2020.102621},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DavidT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeviS20,
  author       = {Hidangmayum Saxena Devi and
                  Khumanthem Manglem Singh},
  title        = {Red-cyan anaglyph image watermarking using DWT, Hadamard transform
                  and singular value decomposition for copyright protection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102424},
  doi          = {10.1016/J.JISA.2019.102424},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DeviS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DhoogeWVT20,
  author       = {Laurens D'hooge and
                  Tim Wauters and
                  Bruno Volckaert and
                  Filip De Turck},
  title        = {Inter-dataset generalization strength of supervised machine learning
                  methods for intrusion detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102564},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102564},
  doi          = {10.1016/J.JISA.2020.102564},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DhoogeWVT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DjedjigTMR20,
  author       = {Nabil Djedjig and
                  Djamel Tandjaoui and
                  Faiza Medjek and
                  Imed Romdhani},
  title        = {Trust-aware and cooperative routing protocol for IoT security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102467},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102467},
  doi          = {10.1016/J.JISA.2020.102467},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DjedjigTMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DwivediAV20,
  author       = {Sanjeev Kumar Dwivedi and
                  Ruhul Amin and
                  Satyanarayana Vollala},
  title        = {Blockchain based secured information sharing protocol in supply chain
                  management system with key distribution mechanism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102554},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102554},
  doi          = {10.1016/J.JISA.2020.102554},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DwivediAV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ElmahdiYS20,
  author       = {Elbasher Elmahdi and
                  Seong{-}Moo Yoo and
                  Kumar Sharshembiev},
  title        = {Secure and reliable data forwarding using homomorphic encryption against
                  blackhole attacks in mobile ad hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102425},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102425},
  doi          = {10.1016/J.JISA.2019.102425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ElmahdiYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FalmariB20,
  author       = {Vinod Ramesh Falmari and
                  M. Brindha},
  title        = {Privacy preserving cloud based secure digital locker using Paillier
                  based difference function and chaos based cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102513},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102513},
  doi          = {10.1016/J.JISA.2020.102513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FalmariB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FeronLL20,
  author       = {Cyrielle Feron and
                  Lo{\"{\i}}c Lagadec and
                  Vianney Lap{\^{o}}tre},
  title        = {Automated exploration of homomorphic encryption scheme input parameters},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102627},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102627},
  doi          = {10.1016/J.JISA.2020.102627},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FeronLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FerragBY20,
  author       = {Mohamed Amine Ferrag and
                  Messaoud Babaghayou and
                  Mehmet Akif Yazici},
  title        = {Cyber security for fog-based smart grid {SCADA} systems: Solutions
                  and challenges},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102500},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102500},
  doi          = {10.1016/J.JISA.2020.102500},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FerragBY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FerragMMJ20,
  author       = {Mohamed Amine Ferrag and
                  Leandros A. Maglaras and
                  Sotiris Moschoyiannis and
                  Helge Janicke},
  title        = {Deep learning for cyber security intrusion detection: Approaches,
                  datasets, and comparative study},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102419},
  doi          = {10.1016/J.JISA.2019.102419},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FerragMMJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FouladiEA20,
  author       = {Ramin Fadaei Fouladi and
                  Orhan Ermis and
                  Emin Anarim},
  title        = {A DDoS attack detection and defense scheme using time-series analysis
                  for {SDN}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102587},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102587},
  doi          = {10.1016/J.JISA.2020.102587},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FouladiEA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FranciaGGS20,
  author       = {Matteo Francia and
                  Enrico Gallinucci and
                  Matteo Golfarelli and
                  Nicola Santolini},
  title        = {{DART:} De-Anonymization of personal gazetteers through social trajectories},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102634},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102634},
  doi          = {10.1016/J.JISA.2020.102634},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FranciaGGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaniQ20,
  author       = {Gulnawaz Gani and
                  Fasel Qadir},
  title        = {A robust copy-move forgery detection technique based on discrete cosine
                  transform and cellular automata},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102510},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102510},
  doi          = {10.1016/J.JISA.2020.102510},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaniQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoGC20,
  author       = {Hang Gao and
                  Tiegang Gao and
                  Renhong Cheng},
  title        = {Robust detection of median filtering based on data-pair histogram
                  feature and local configuration pattern},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102506},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102506},
  doi          = {10.1016/J.JISA.2020.102506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoHSLNX20,
  author       = {Xianwei Gao and
                  Changzhen Hu and
                  Chun Shan and
                  Baoxu Liu and
                  Zequn Niu and
                  Hui Xie},
  title        = {Malware classification for the cloud via semi-supervised transfer
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102661},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102661},
  doi          = {10.1016/J.JISA.2020.102661},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoHSLNX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoWL20,
  author       = {Juntao Gao and
                  Tong Wu and
                  Xuelian Li},
  title        = {Secure, fair and instant data trading scheme based on bitcoin},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102511},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102511},
  doi          = {10.1016/J.JISA.2020.102511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GaoWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GaoYHWW20,
  author       = {Xi Gao and
                  Lei Yu and
                  Houhua He and
                  Xiaoyu Wang and
                  Yiwen Wang},
  title        = {A research of security in website account binding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102444},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102444},
  doi          = {10.1016/J.JISA.2019.102444},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GaoYHWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GodquinBGGB20,
  author       = {Tanguy Godquin and
                  Morgan Barbier and
                  Chrystel Gaber and
                  Jean{-}Luc Grimault and
                  Jean{-}Marie Le Bars},
  title        = {Applied graph theory to security: {A} qualitative placement of security
                  solutions within IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102640},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102640},
  doi          = {10.1016/J.JISA.2020.102640},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GodquinBGGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloDGKF20,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Igor V. Kotenko and
                  Andrey Fedorchenko},
  title        = {Stateful RORI-based countermeasure selection using hypergraphs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102541},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102541},
  doi          = {10.1016/J.JISA.2020.102541},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloDGKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloDGKF20a,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Igor V. Kotenko and
                  Andrey Fedorchenko},
  title        = {Stateful RORI-based countermeasure selection using hypergraphs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102562},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102562},
  doi          = {10.1016/J.JISA.2020.102562},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloDGKF20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuleriaSM20,
  author       = {Vandana Guleria and
                  Shazia Sabir and
                  Deep Chandra Mishra},
  title        = {Security of multiple {RGB} images by {RSA} cryptosystem combined with
                  FrDCT and Arnold transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102524},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102524},
  doi          = {10.1016/J.JISA.2020.102524},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuleriaSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuriSE20,
  author       = {Mordechai Guri and
                  Yosef A. Solewicz and
                  Yuval Elovici},
  title        = {Speaker-to-speaker covert ultrasonic communication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102458},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102458},
  doi          = {10.1016/J.JISA.2020.102458},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GuriSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaqS20,
  author       = {Tanveer ul Haq and
                  Tariq Shah},
  title        = {Algebra-chaos amalgam and {DNA} transform based multiple digital image
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102592},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102592},
  doi          = {10.1016/J.JISA.2020.102592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HaqS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaqWZM20,
  author       = {Inam ul Haq and
                  Jian Wang and
                  Youwen Zhu and
                  Saad Maqbool},
  title        = {A survey of authenticated key agreement protocols for multi-server
                  architecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102639},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102639},
  doi          = {10.1016/J.JISA.2020.102639},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HaqWZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HasanR20,
  author       = {Md. Golam Moula Mehedi Hasan and
                  Mohammad Ashiqur Rahman},
  title        = {A signaling game approach to mitigate co-resident attacks in an IaaS
                  cloud environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102397},
  doi          = {10.1016/J.JISA.2019.102397},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HasanR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HathaliyaTE20,
  author       = {Jigna J. Hathaliya and
                  Sudeep Tanwar and
                  Richard Evans},
  title        = {Securing electronic healthcare records: {A} mobile-based biometric
                  authentication approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102528},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102528},
  doi          = {10.1016/J.JISA.2020.102528},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HathaliyaTE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouYZZH20,
  author       = {Hong{-}xia Hou and
                  Bo Yang and
                  Mingrui Zhang and
                  Yanwei Zhou and
                  Meijuan Huang},
  title        = {Fully secure wicked identity-based encryption resilient to continual
                  auxiliary- inputs leakage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102521},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102521},
  doi          = {10.1016/J.JISA.2020.102521},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouYZZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuLZLXT20,
  author       = {Hao Hu and
                  Jing Liu and
                  Yuchen Zhang and
                  Yuling Liu and
                  Xiaoyu Xu and
                  Jinglei Tan},
  title        = {Attack scenario reconstruction approach using attack graph and alert
                  data mining},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102522},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102522},
  doi          = {10.1016/J.JISA.2020.102522},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuLZLXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuYA20,
  author       = {Qinwen Hu and
                  Se{-}Young Yu and
                  Muhammad Rizwan Asghar},
  title        = {Analysing performance issues of open-source intrusion detection systems
                  in high-speed networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102426},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102426},
  doi          = {10.1016/J.JISA.2019.102426},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuYA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Islam20,
  author       = {SK Hafizul Islam},
  title        = {Provably secure two-party authenticated key agreement protocol for
                  post-quantum environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102468},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102468},
  doi          = {10.1016/J.JISA.2020.102468},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Islam20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IslamZ20,
  author       = {SK Hafizul Islam and
                  Sherali Zeadally},
  title        = {Provably secure identity-based two-party authenticated key agreement
                  protocol based on CBi-ISIS and Bi-ISIS problems on lattices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102540},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102540},
  doi          = {10.1016/J.JISA.2020.102540},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IslamZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IsmailI20,
  author       = {Umar Mukhtar Ismail and
                  Shareeful Islam},
  title        = {A unified framework for cloud security transparency and audit},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102594},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102594},
  doi          = {10.1016/J.JISA.2020.102594},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IsmailI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiWTFRWS20,
  author       = {Tiantian Ji and
                  Zhongru Wang and
                  Zhihong Tian and
                  Binxing Fang and
                  Qiang Ruan and
                  Haichen Wang and
                  Wei Shi},
  title        = {AFLPro: Direction sensitive fuzzing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102497},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102497},
  doi          = {10.1016/J.JISA.2020.102497},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiWTFRWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JithinS20,
  author       = {K. C. Jithin and
                  Syam Sankar},
  title        = {Colour image encryption algorithm combining, Arnold map, {DNA} sequence
                  operation, and a Mandelbrot set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102428},
  doi          = {10.1016/J.JISA.2019.102428},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JithinS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JonesJMX20,
  author       = {Kevin I. Jones and
                  Helge Janicke and
                  Leandros A. Maglaras and
                  Christos Xenakis},
  title        = {Introduction to the special issue of the journal of information security
                  and applications on" cyber security in {ICS} {\&} {SCADA} systems"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102542},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102542},
  doi          = {10.1016/J.JISA.2020.102542},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JonesJMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KandarD20,
  author       = {Shyamalendu Kandar and
                  Bibhas Chandra Dhara},
  title        = {A verifiable secret sharing scheme with combiner verification and
                  cheater identification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102430},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102430},
  doi          = {10.1016/J.JISA.2019.102430},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KandarD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kar20,
  author       = {Jayaprakash Kar},
  title        = {Provably secure certificateless deniable authenticated encryption
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102581},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102581},
  doi          = {10.1016/J.JISA.2020.102581},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Kar20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KareemR20,
  author       = {Suhad Muhajer Kareem and
                  Abdul Monem S. Rahma},
  title        = {A novel approach for the development of the Twofish algorithm based
                  on multi-level key space},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102410},
  doi          = {10.1016/J.JISA.2019.102410},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KareemR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KarimSA20,
  author       = {Nader Abdel Karim and
                  Zarina Shukur and
                  AbedElkarim M. AL{-}banna},
  title        = {{UIPA:} User authentication method based on user interface preferences
                  for account recovery process},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102466},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102466},
  doi          = {10.1016/J.JISA.2020.102466},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KarimSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kaur20,
  author       = {Gagandeep Kaur},
  title        = {A comparison of two hybrid ensemble techniques for network anomaly
                  detection in spark distributed environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102601},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102601},
  doi          = {10.1016/J.JISA.2020.102601},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Kaur20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanM20,
  author       = {Haibat Khan and
                  Keith M. Martin},
  title        = {A survey of subscription privacy on the 5G radio interface - The past,
                  present and future},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102537},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102537},
  doi          = {10.1016/J.JISA.2020.102537},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhattakTAADA20,
  author       = {Hasan Ali Khattak and
                  Komal Tehreem and
                  Ahmad Almogren and
                  Zoobia Ameer and
                  Ikram Ud Din and
                  Muhammad Adnan},
  title        = {Dynamic pricing in industrial internet of things: Blockchain application
                  for energy management in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102615},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102615},
  doi          = {10.1016/J.JISA.2020.102615},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhattakTAADA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KoCB20,
  author       = {Ili Ko and
                  Desmond Chambers and
                  Enda Barrett},
  title        = {Adaptable feature-selecting and threshold-moving complete autoencoder
                  for DDoS flood attack mitigation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102647},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102647},
  doi          = {10.1016/J.JISA.2020.102647},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KoCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KokAJ20,
  author       = {S. H. Kok and
                  Azween B. Abdullah and
                  N. Z. Jhanjhi},
  title        = {Evaluation metric for crypto-ransomware detection using machine learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102646},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102646},
  doi          = {10.1016/J.JISA.2020.102646},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KokAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KreimelEMST20,
  author       = {Philipp Kreimel and
                  Oliver Eigner and
                  Francesco Mercaldo and
                  Antonella Santone and
                  Paul Tavolato},
  title        = {Anomaly detection in substation networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102527},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102527},
  doi          = {10.1016/J.JISA.2020.102527},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KreimelEMST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarSAK20,
  author       = {Ashish Kumar and
                  Rahul Saha and
                  Mamoun Alazab and
                  Gulshan Kumar},
  title        = {A Lightweight Signcryption Method for Perception Layer in Internet-of-Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102662},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102662},
  doi          = {10.1016/J.JISA.2020.102662},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarSAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumariJAKA20,
  author       = {Adesh Kumari and
                  Srinivas Jangirala and
                  M. Yahya Abbasi and
                  Vinod Kumar and
                  Mansaf Alam},
  title        = {{ESEAP:} {ECC} based secure and efficient mutual authentication protocol
                  using smart card},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102443},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102443},
  doi          = {10.1016/J.JISA.2019.102443},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumariJAKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunduDMC20,
  author       = {Nibedita Kundu and
                  Sumit Kumar Debnath and
                  Dheerendra Mishra and
                  Tanmay Choudhury},
  title        = {Post-quantum digital signature scheme based on multivariate cubic
                  problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102512},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102512},
  doi          = {10.1016/J.JISA.2020.102512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunduDMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KushwahR20,
  author       = {Gopal Singh Kushwah and
                  Virender Ranga},
  title        = {Voting extreme learning machine based distributed denial of service
                  attack detection in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102532},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102532},
  doi          = {10.1016/J.JISA.2020.102532},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KushwahR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LawrenceACL20,
  author       = {Tandoh Lawrence and
                  Ikram Ali and
                  Tandoh Christopher and
                  Fagen Li},
  title        = {A bandwidth efficient HMAC-based authentication scheme for network
                  coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102658},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102658},
  doi          = {10.1016/J.JISA.2020.102658},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LawrenceACL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeKRWKL20,
  author       = {Hakjun Lee and
                  Dongwoo Kang and
                  Jihyeon Ryu and
                  Dongho Won and
                  Hyoungshick Kim and
                  Youngsook Lee},
  title        = {A three-factor anonymous user authentication scheme for Internet of
                  Things environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102494},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102494},
  doi          = {10.1016/J.JISA.2020.102494},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeKRWKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Li20,
  author       = {Hui Li},
  title        = {Pseudo-random scalar multiplication based on group isomorphism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102534},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102534},
  doi          = {10.1016/J.JISA.2020.102534},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Li20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiL20,
  author       = {Li Li and
                  Jiayong Liu},
  title        = {SecACS: Enabling lightweight secure auditable cloud storage with data
                  dynamics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102545},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102545},
  doi          = {10.1016/J.JISA.2020.102545},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiWLX20,
  author       = {Wenjuan Li and
                  Yu Wang and
                  Jin Li and
                  Yang Xiang},
  title        = {Toward supervised shape-based behavioral authentication on smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102591},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102591},
  doi          = {10.1016/J.JISA.2020.102591},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiWLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiXLY20,
  author       = {Yanan Li and
                  Ming Xia and
                  Xin Liu and
                  Gaobo Yang},
  title        = {Identification of various image retargeting techniques using hybrid
                  features},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102459},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102459},
  doi          = {10.1016/J.JISA.2020.102459},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiXLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LimS20,
  author       = {Lee Peng Lim and
                  Manmeet Mahinderjit Singh},
  title        = {Resolving the imbalance issue in short messaging service spam dataset
                  using cost-sensitive techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102558},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102558},
  doi          = {10.1016/J.JISA.2020.102558},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LimS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuHXMW20,
  author       = {Yongshuang Liu and
                  Haiping Huang and
                  Fu Xiao and
                  Reza Malekian and
                  Wenming Wang},
  title        = {Classification and recognition of encrypted {EEG} data based on neural
                  network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102567},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102567},
  doi          = {10.1016/J.JISA.2020.102567},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuHXMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LorenzoMMMS20,
  author       = {Andrea De Lorenzo and
                  Fabio Martinelli and
                  Eric Medvet and
                  Francesco Mercaldo and
                  Antonella Santone},
  title        = {Visualizing the outcome of dynamic analysis of Android malware with
                  VizMal},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102423},
  doi          = {10.1016/J.JISA.2019.102423},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LorenzoMMMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaFF20,
  author       = {Mimi Ma and
                  Shuqin Fan and
                  Dengguo Feng},
  title        = {Multi-user certificateless public key encryption with conjunctive
                  keyword search for cloud-based telemedicine},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102652},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102652},
  doi          = {10.1016/J.JISA.2020.102652},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaHFF20,
  author       = {Mimi Ma and
                  Debiao He and
                  Shuqin Fan and
                  Dengguo Feng},
  title        = {Certificateless searchable public key encryption scheme secure against
                  keyword guessing attacks for smart healthcare},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102429},
  doi          = {10.1016/J.JISA.2019.102429},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaHFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaLO20,
  author       = {Yunling Ma and
                  Chengqing Li and
                  Bo Ou},
  title        = {Cryptanalysis of an image block encryption algorithm based on chaotic
                  maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102566},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102566},
  doi          = {10.1016/J.JISA.2020.102566},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mandal20,
  author       = {Mriganka Mandal},
  title        = {Privacy-preserving fully anonymous ciphertext policy attribute-based
                  broadcast encryption with constant-size secret keys and fast decryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102666},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102666},
  doi          = {10.1016/J.JISA.2020.102666},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Mandal20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MasaeliJE20,
  author       = {Nafiseh Masaeli and
                  Hamid Haj Seyyed Javadi and
                  Seyed Hossein Erfani},
  title        = {Key pre-distribution scheme based on transversal design in large mobile
                  fog networks with multi-clouds},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102519},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102519},
  doi          = {10.1016/J.JISA.2020.102519},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MasaeliJE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MasmoudiMSAB20,
  author       = {Fatma Masmoudi and
                  Zakaria Maamar and
                  Mohamed Sellami and
                  Ali Ismail Awad and
                  Vanilson Arruda Bur{\'{e}}gio},
  title        = {A Guiding Framework for Vetting the Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102644},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102644},
  doi          = {10.1016/J.JISA.2020.102644},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MatousekRGH20,
  author       = {Petr Matousek and
                  Ondrej Rysav{\'{y}} and
                  Matej Gr{\'{e}}gr and
                  Vojtech Havlena},
  title        = {Flow based monitoring of {ICS} communication in the smart grid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102535},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102535},
  doi          = {10.1016/J.JISA.2020.102535},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MatousekRGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MeenaT20,
  author       = {Kunj Bihari Meena and
                  Vipin Tyagi},
  title        = {A copy-move image forgery detection technique based on tetrolet transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102481},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102481},
  doi          = {10.1016/J.JISA.2020.102481},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MeenaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mimura20,
  author       = {Mamoru Mimura},
  title        = {Adjusting lexical features of actual proxy logs for intrusion detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102408},
  doi          = {10.1016/J.JISA.2019.102408},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mimura20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mimura20a,
  author       = {Mamoru Mimura},
  title        = {Using fake text vectors to improve the sensitivity of minority class
                  for macro malware detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102600},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102600},
  doi          = {10.1016/J.JISA.2020.102600},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mimura20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraA20,
  author       = {Zeesha Mishra and
                  Bibhudendra Acharya},
  title        = {High throughput and low area architectures of secure IoT algorithm
                  for medical image encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102533},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102533},
  doi          = {10.1016/J.JISA.2020.102533},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraDYRVK20,
  author       = {Dheerendra Mishra and
                  Dharminder Dharminder and
                  Preeti Yadav and
                  Y. Sreenivasa Rao and
                  Pandi Vijayakumar and
                  Neeraj Kumar},
  title        = {A provably secure dynamic ID-based authenticated key agreement framework
                  for mobile edge computing without a trusted party},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102648},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102648},
  doi          = {10.1016/J.JISA.2020.102648},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraVG20,
  author       = {Preeti Mishra and
                  Ishita Verma and
                  Saurabh Gupta},
  title        = {KVMInspector: {KVM} Based introspection approach to detect malware
                  in cloud environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102460},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102460},
  doi          = {10.1016/J.JISA.2020.102460},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MishraVG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MoussailebNC20,
  author       = {Routa Moussaileb and
                  Renzo E. Navas and
                  Nora Cuppens},
  title        = {Watch out! Doxware on the way..},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102668},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102668},
  doi          = {10.1016/J.JISA.2020.102668},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MoussailebNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MusannaK20,
  author       = {Farhan Musanna and
                  Sanjeev Kumar},
  title        = {A novel image encryption algorithm using chaotic compressive sensing
                  and nonlinear exponential function},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102560},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102560},
  doi          = {10.1016/J.JISA.2020.102560},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MusannaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NejadMH20,
  author       = {Mohsen Yoosefi Nejad and
                  Mohammad Mosleh and
                  Saeed Rasouli Heikalabad},
  title        = {A blind quantum audio watermarking based on quantum discrete cosine
                  transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102495},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102495},
  doi          = {10.1016/J.JISA.2020.102495},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NejadMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NikooghadamAK20,
  author       = {Mahdi Nikooghadam and
                  Haleh Amintoosi and
                  Saru Kumari},
  title        = {A provably secure ECC-based roaming authentication scheme for global
                  mobility networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102588},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102588},
  doi          = {10.1016/J.JISA.2020.102588},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NikooghadamAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/OkumuraOS20,
  author       = {Naomi Okumura and
                  Kazuhiro Ogata and
                  Yoichi Shinoda},
  title        = {Formal analysis of {RFC} 8120 authentication protocol for {HTTP} under
                  different assumptions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102529},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102529},
  doi          = {10.1016/J.JISA.2020.102529},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/OkumuraOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/OliveroBMEM20,
  author       = {Miguel Angel Olivero and
                  Antonia Bertolino and
                  Francisco Jos{\'{e}} Dom{\'{\i}}nguez Mayo and
                  Mar{\'{\i}}a Jos{\'{e}} Escalona and
                  Ilaria Matteucci},
  title        = {Digital persona portrayal: Identifying pluridentity vulnerabilities
                  in digital life},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102492},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102492},
  doi          = {10.1016/J.JISA.2020.102492},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/OliveroBMEM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PakniatSE20,
  author       = {Nasrollah Pakniat and
                  Danial Shiraly and
                  Ziba Eslami},
  title        = {Certificateless authenticated encryption with keyword search: Enhanced
                  security model and a concrete construction for industrial IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102525},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102525},
  doi          = {10.1016/J.JISA.2020.102525},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PakniatSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PareekP20,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {Proxy re-encryption for fine-grained access control: Its applicability,
                  security under stronger notions and performance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102543},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102543},
  doi          = {10.1016/J.JISA.2020.102543},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PareekP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatelTGK20,
  author       = {Mohil Maheshkumar Patel and
                  Sudeep Tanwar and
                  Rajesh Gupta and
                  Neeraj Kumar},
  title        = {A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial
                  Institutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102583},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102583},
  doi          = {10.1016/J.JISA.2020.102583},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PatelTGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatilP20,
  author       = {Shravani Mahesh Patil and
                  B. R. Purushothama},
  title        = {Non-transitive and collusion resistant quorum controlled proxy re-encryption
                  scheme for resource constrained networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102411},
  doi          = {10.1016/J.JISA.2019.102411},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PatilP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatroSNA20,
  author       = {K. Abhimanyu Kumar Patro and
                  Ayushi Soni and
                  Pradeep Kumar Netam and
                  Bibhudendra Acharya},
  title        = {Multiple grayscale image encryption using cross-coupled chaotic maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102470},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102470},
  doi          = {10.1016/J.JISA.2020.102470},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatroSNA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PeltonenSA20,
  author       = {Aleksi Peltonen and
                  Mohit Sethi and
                  Tuomas Aura},
  title        = {Formal verification of misbinding attacks on secure device pairing
                  and bootstrapping},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102461},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102461},
  doi          = {10.1016/J.JISA.2020.102461},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PeltonenSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengCZCH20,
  author       = {Cong Peng and
                  Jianhua Chen and
                  Lu Zhou and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He},
  title        = {CsiIBS: {A} post-quantum identity-based signature scheme based on
                  isogenies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102504},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102504},
  doi          = {10.1016/J.JISA.2020.102504},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PengCZCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Powell20,
  author       = {Brian A. Powell},
  title        = {Detecting malicious logins as graph anomalies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102557},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102557},
  doi          = {10.1016/J.JISA.2020.102557},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Powell20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QurashiAK20,
  author       = {Mohammed Al Qurashi and
                  Constantinos Marios Angelopoulos and
                  Vasilios Katos},
  title        = {An architecture for resilient intrusion detection in ad-hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102530},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102530},
  doi          = {10.1016/J.JISA.2020.102530},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QurashiAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RabaninejadAAA20,
  author       = {Reyhaneh Rabaninejad and
                  Mahmoud Ahmadian{-}Attari and
                  Maryam Rajabzadeh Asaar and
                  Mohammad Reza Aref},
  title        = {A lightweight identity-based provable data possession supporting users'
                  identity privacy and traceability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102454},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102454},
  doi          = {10.1016/J.JISA.2020.102454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RabaninejadAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaghavendraK20,
  author       = {Raghavendra Raghuram Jinagde and
                  R. Sanjeev Kunte},
  title        = {Extended Local Ternary Co-relation Pattern: {A} novel feature descriptor
                  for face Anti-spoofing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102482},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102482},
  doi          = {10.1016/J.JISA.2020.102482},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaghavendraK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaghuvanshiKK20,
  author       = {Kamlesh Kumar Raghuvanshi and
                  Subodh Kumar and
                  Sunil Kumar},
  title        = {A data encryption model based on intertwining logistic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102622},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102622},
  doi          = {10.1016/J.JISA.2020.102622},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaghuvanshiKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahmanHMA20,
  author       = {Mohammad Ashiqur Rahman and
                  Md. Golam Moula Mehedi Hasan and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic analysis to defend against remote operating system
                  fingerprinting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102456},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102456},
  doi          = {10.1016/J.JISA.2020.102456},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RahmanHMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RawatD20,
  author       = {Arjun Rawat and
                  Maroti Deshmukh},
  title        = {Tree and elliptic curve based efficient and secure group key agreement
                  protocol},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102599},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102599},
  doi          = {10.1016/J.JISA.2020.102599},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RawatD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RomdhaneY20,
  author       = {Imene Romdhane and
                  Heba Yuksel},
  title        = {A low-complexity security technique in physical layer for fixed LiFi
                  communication systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102514},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102514},
  doi          = {10.1016/J.JISA.2020.102514},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RomdhaneY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RoyGRDC20,
  author       = {Satyabrata Roy and
                  Rohit Kumar Gupta and
                  Umashankar Rawat and
                  Nilanjan Dey and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {{PCHET:} An efficient programmable cellular automata based hybrid
                  encryption technique for multi-chat client-server applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102624},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102624},
  doi          = {10.1016/J.JISA.2020.102624},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RoyGRDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RtayliE20,
  author       = {Naoufal Rtayli and
                  Nourddine Enneya},
  title        = {Enhanced credit card fraud detection based on SVM-recursive feature
                  elimination and hyper-parameters optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102596},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102596},
  doi          = {10.1016/J.JISA.2020.102596},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RtayliE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahaRK20,
  author       = {Tushar Kanti Saha and
                  Deevashwer Rathee and
                  Takeshi Koshiba},
  title        = {Efficient protocols for private wildcards pattern matching},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102609},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102609},
  doi          = {10.1016/J.JISA.2020.102609},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SahaRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SangaviT20,
  author       = {V. Sangavi and
                  P. Thangavel},
  title        = {An exotic multi-dimensional conceptualization for medical image encryption
                  exerting Rossler system and Sine map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102626},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102626},
  doi          = {10.1016/J.JISA.2020.102626},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SangaviT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SazdarGMKW20,
  author       = {Amir Mahdi Sazdar and
                  Seyed Ali Ghorashi and
                  Vahideh Moghtadaiee and
                  Ahmad Khonsari and
                  David Windridge},
  title        = {A Low-complexity trajectory privacy preservation approach for indoor
                  fingerprinting positioning systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102515},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102515},
  doi          = {10.1016/J.JISA.2020.102515},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SazdarGMKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SeiboldSHE20,
  author       = {Clemens Seibold and
                  Wojciech Samek and
                  Anna Hilsmann and
                  Peter Eisert},
  title        = {Accurate and robust neural networks for face morphing attack detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102526},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102526},
  doi          = {10.1016/J.JISA.2020.102526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SeiboldSHE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SenM20,
  author       = {Amartya Sen and
                  Sanjay Madria},
  title        = {Application design phase risk assessment framework using cloud security
                  domains},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102617},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102617},
  doi          = {10.1016/J.JISA.2020.102617},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SenM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Sendi20,
  author       = {Alireza Shameli{-}Sendi},
  title        = {An efficient security data-driven approach for implementing risk assessment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102593},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102593},
  doi          = {10.1016/J.JISA.2020.102593},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Sendi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SethiPB20,
  author       = {Kamalakanta Sethi and
                  Ankit Pradhan and
                  Padmalochan Bera},
  title        = {Practical traceable multi-authority {CP-ABE} with outsourcing decryption
                  and access policy updation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102435},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102435},
  doi          = {10.1016/J.JISA.2019.102435},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SethiPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamshadRMKC20,
  author       = {Salman Shamshad and
                  Minahil Rana and
                  Khalid Mahmood and
                  Saru Kumari and
                  Chien{-}Ming Chen},
  title        = {A secure blockchain-based e-health records storage and sharing scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102590},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102590},
  doi          = {10.1016/J.JISA.2020.102590},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ShamshadRMKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamshirbandFCM20,
  author       = {Shahab Shamshirband and
                  Mahdis Fathi and
                  Anthony T. Chronopoulos and
                  Antonio Montieri and
                  Fabio Palumbo and
                  Antonio Pescap{\`{e}}},
  title        = {Computational intelligence intrusion detection techniques in mobile
                  cloud computing environments: Review, taxonomy, and open research
                  issues},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102582},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102582},
  doi          = {10.1016/J.JISA.2020.102582},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShamshirbandFCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShuaiLYXW20,
  author       = {Mengxia Shuai and
                  Bin Liu and
                  Nenghai Yu and
                  Ling Xiong and
                  Changhui Wang},
  title        = {Efficient and privacy-preserving authentication scheme for wireless
                  body area networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102499},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102499},
  doi          = {10.1016/J.JISA.2020.102499},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShuaiLYXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghDN20,
  author       = {Karanbir Singh and
                  Kanwalvir Singh Dhindsa and
                  Deepa Nehra},
  title        = {{T-CAD:} {A} threshold based collaborative DDoS attack detection in
                  multiple autonomous systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102457},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102457},
  doi          = {10.1016/J.JISA.2020.102457},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghKGSKS20,
  author       = {Indu Singh and
                  Narendra Kumar and
                  Srinivasa K. G. and
                  Tript Sharma and
                  Vaibhav Kumar and
                  Siddharth Singhal},
  title        = {Database intrusion detection using role and user behavior based risk
                  assessment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102654},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102654},
  doi          = {10.1016/J.JISA.2020.102654},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghKGSKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghRAS20,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  Richa Agrawal and
                  Samir Sheshank},
  title        = {Provably secure lattice based identity based unidirectional {PRE}
                  and {PRE+} schemes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102569},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102569},
  doi          = {10.1016/J.JISA.2020.102569},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghRAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SkopikLWVMFPKWT20,
  author       = {Florian Skopik and
                  Max Landauer and
                  Markus Wurzenberger and
                  Gernot Vormayr and
                  Jelena Milosevic and
                  Joachim Fabini and
                  Wolfgang Pr{\"{u}}ggler and
                  Oskar Kruschitz and
                  Benjamin Widmann and
                  Kevin Truckenthanner and
                  Stefan Rass and
                  Michael Simmer and
                  Christoph Zauner},
  title        = {synERGY: Cross-correlation of operational and contextual data to timely
                  detect and mitigate attacks to cyber-physical systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102544},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102544},
  doi          = {10.1016/J.JISA.2020.102544},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SkopikLWVMFPKWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SleemNC20,
  author       = {Lama Sleem and
                  Hassan N. Noura and
                  Rapha{\"{e}}l Couturier},
  title        = {Towards a secure {ITS:} Overview, challenges and solutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102637},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102637},
  doi          = {10.1016/J.JISA.2020.102637},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SleemNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SouzaCBH20,
  author       = {Nivio Paula de Souza and
                  Cec{\'{\i}}lia de Azevedo Castro C{\'{e}}sar and
                  Juliana de Melo Bezerra and
                  Celso Massaki Hirata},
  title        = {Extending {STPA} with {STRIDE} to identify cybersecurity loss scenarios},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102620},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102620},
  doi          = {10.1016/J.JISA.2020.102620},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SouzaCBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SowjanyaD20,
  author       = {K. Sowjanya and
                  Mou Dasgupta},
  title        = {A ciphertext-policy Attribute based encryption scheme for wireless
                  body area networks based on {ECC}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102559},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102559},
  doi          = {10.1016/J.JISA.2020.102559},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SowjanyaD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SurendranTE20,
  author       = {Roopak Surendran and
                  Tony Thomas and
                  Sabu Emmanuel},
  title        = {A {TAN} based hybrid model for android malware detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102483},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102483},
  doi          = {10.1016/J.JISA.2020.102483},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SurendranTE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SureshkumarAOK20,
  author       = {Venkatasamy Sureshkumar and
                  Ruhul Amin and
                  Mohammad S. Obaidat and
                  Isswarya Karthikeyan},
  title        = {An enhanced mutual authentication and key establishment protocol for
                  {TMIS} using chaotic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102539},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102539},
  doi          = {10.1016/J.JISA.2020.102539},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SureshkumarAOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SusiloTY20,
  author       = {Willy Susilo and
                  Joseph Tonien and
                  Guomin Yang},
  title        = {A generalised bound for the Wiener attack on {RSA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102531},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102531},
  doi          = {10.1016/J.JISA.2020.102531},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SusiloTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TanwarPE20,
  author       = {Sudeep Tanwar and
                  Karan Parekh and
                  Richard Evans},
  title        = {Blockchain-based electronic healthcare record system for healthcare
                  4.0 applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102407},
  doi          = {10.1016/J.JISA.2019.102407},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TanwarPE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TaoCZ20,
  author       = {Ye Tao and
                  Wenhua Cui and
                  Zhao Zhang},
  title        = {Spatiotemporal chaos in multiple dynamically coupled map lattices
                  and its application in a novel image encryption algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102650},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102650},
  doi          = {10.1016/J.JISA.2020.102650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TaoCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TehAS20,
  author       = {Je Sen Teh and
                  Moatsum Alawida and
                  You Cheng Sii},
  title        = {Implementation and practical problems of chaos-based cryptography
                  revisited},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102421},
  doi          = {10.1016/J.JISA.2019.102421},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TehAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ThokchomS20,
  author       = {Surmila Thokchom and
                  Dilip Kr. Saikia},
  title        = {Privacy preserving integrity checking of shared dynamic cloud data
                  with user revocation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102427},
  doi          = {10.1016/J.JISA.2019.102427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ThokchomS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TianMXL20,
  author       = {Guohua Tian and
                  Hua Ma and
                  Ying Xie and
                  Zhenhua Liu},
  title        = {Randomized deduplication with ownership management and data sharing
                  in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102432},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102432},
  doi          = {10.1016/J.JISA.2019.102432},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TianMXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TselikisDMM20,
  author       = {Christos Tselikis and
                  Christos Douligeris and
                  Leandros A. Maglaras and
                  Sarandis Mitropoulos},
  title        = {On the conference key distribution system with user anonymity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102556},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102556},
  doi          = {10.1016/J.JISA.2020.102556},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TselikisDMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VidhyaB20,
  author       = {R. Vidhya and
                  M. Brindha},
  title        = {A novel conditional Butterfly Network Topology based chaotic image
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102484},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102484},
  doi          = {10.1016/J.JISA.2020.102484},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VidhyaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WandaJ20,
  author       = {Putra Wanda and
                  Huang Jin Jie},
  title        = {DeepProfile: Finding fake profile in online social network using dynamic
                  {CNN}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102465},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102465},
  doi          = {10.1016/J.JISA.2020.102465},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WandaJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangG20,
  author       = {Dongping Wang and
                  Tiegang Gao},
  title        = {An efficient {USM} sharpening detection method for small-size {JPEG}
                  image},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102451},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102451},
  doi          = {10.1016/J.JISA.2020.102451},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangKC20,
  author       = {Yilan Wang and
                  Xiaobing Kang and
                  Yajun Chen},
  title        = {Robust and accurate detection of image copy-move forgery using {PCET-SVD}
                  and histogram of block similarity measures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102536},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102536},
  doi          = {10.1016/J.JISA.2020.102536},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangML20,
  author       = {Xiao{-}di Wang and
                  Weizhi Meng and
                  Yi{-}Ning Liu},
  title        = {Lightweight privacy-preserving data aggregation protocol against internal
                  attacks in smart grid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102628},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102628},
  doi          = {10.1016/J.JISA.2020.102628},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangNLLJ20,
  author       = {Jinwei Wang and
                  Qiye Ni and
                  Guangjie Liu and
                  Xiangyang Luo and
                  Sunil Kr. Jha},
  title        = {Image splicing detection based on convolutional neural network with
                  weight combination strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102523},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102523},
  doi          = {10.1016/J.JISA.2020.102523},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangNLLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWXWZ20,
  author       = {Chen Wang and
                  Andi Wang and
                  Jian Xu and
                  Qiang Wang and
                  Fucai Zhou},
  title        = {Outsourced privacy-preserving decision tree classification service
                  over encrypted data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102517},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102517},
  doi          = {10.1016/J.JISA.2020.102517},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWXWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangXLX20,
  author       = {Peng Wang and
                  Tao Xiang and
                  Xiaoguo Li and
                  Hong Xiang},
  title        = {Public key encryption with conjunctive keyword search on lattice},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102433},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102433},
  doi          = {10.1016/J.JISA.2019.102433},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangXLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZL20,
  author       = {Pengfei Wang and
                  Xu Zhou and
                  Kai Lu},
  title        = {Sabotaging the system boundary: {A} study of the inter-boundary vulnerability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102496},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102496},
  doi          = {10.1016/J.JISA.2020.102496},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangZLWZ20,
  author       = {Juan Wang and
                  Haoxi Zhang and
                  Fei Li and
                  Zuli Wang and
                  Jun Zhao},
  title        = {Intelligent vehicle knowledge representation and anomaly detection
                  using neural knowledge {DNA}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102498},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102498},
  doi          = {10.1016/J.JISA.2020.102498},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangZLWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wicker20,
  author       = {Stephen B. Wicker},
  title        = {eBook surveillance and the threat to freedom of association},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102643},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102643},
  doi          = {10.1016/J.JISA.2020.102643},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Wicker20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuYY20,
  author       = {Xiaotian Wu and
                  Ching{-}Nung Yang and
                  Yi{-}Yun Yang},
  title        = {A hybrid scheme for enhancing recovered image quality in polynomial
                  based secret image sharing by modify-and-recalculate strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102452},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102452},
  doi          = {10.1016/J.JISA.2020.102452},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WuYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongLLCN20,
  author       = {Xingxing Xiong and
                  Shubo Liu and
                  Dan Li and
                  Zhaohui Cai and
                  Xiaoguang Niu},
  title        = {Real-time and private spatio-temporal data aggregation with local
                  differential privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102633},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102633},
  doi          = {10.1016/J.JISA.2020.102633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiongLLCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongWSY20,
  author       = {Hu Xiong and
                  Yan Wu and
                  Chunhua Su and
                  Kuo{-}Hui Yeh},
  title        = {A secure and efficient certificateless batch verification scheme with
                  invalid signature identification for the internet of things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102507},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102507},
  doi          = {10.1016/J.JISA.2020.102507},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XiongWSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuHWVC20,
  author       = {Zhiyan Xu and
                  Debiao He and
                  Huaqun Wang and
                  Pandi Vijayakumar and
                  Kim{-}Kwang Raymond Choo},
  title        = {A novel proxy-oriented public auditing scheme for cloud-based medical
                  cyber physical systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102453},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102453},
  doi          = {10.1016/J.JISA.2020.102453},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XuHWVC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YadollahiENLC20,
  author       = {Mehdi Yadollahi and
                  Rasul Enayatifar and
                  Hossein Nematzadeh and
                  Malrey Lee and
                  Jae{-}Young Choi},
  title        = {A novel image security technique based on nucleic acid concepts},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {53},
  pages        = {102505},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102505},
  doi          = {10.1016/J.JISA.2020.102505},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YadollahiENLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLL20,
  author       = {Ching{-}Nung Yang and
                  Yi{-}Chin Lin and
                  Peng Li},
  title        = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual
                  cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102660},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102660},
  doi          = {10.1016/J.JISA.2020.102660},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangZZX20,
  author       = {Min Yang and
                  Shibin Zhang and
                  Hang Zhang and
                  Jinyue Xia},
  title        = {Corrigendum to "A New User Behavior Evaluation Method in Online Social
                  Network" Journal of Information Security and Applications Volume 48
                  {(2019)} 102371},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102405},
  doi          = {10.1016/J.JISA.2019.102405},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangZZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuL20,
  author       = {Huifang Yu and
                  Wen Li},
  title        = {A certificateless signature for multi-source network coding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102655},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102655},
  doi          = {10.1016/J.JISA.2020.102655},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCLJC20,
  author       = {Hongxia Zhang and
                  Xingshu Chen and
                  Xiao Lan and
                  Hongjian Jin and
                  Qi Cao},
  title        = {{BTCAS:} {A} Blockchain-Based Thoroughly Cross-Domain Authentication
                  Scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102538},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102538},
  doi          = {10.1016/J.JISA.2020.102538},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCLJC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTCHZ20,
  author       = {Xiaojun Zhang and
                  Yao Tang and
                  Sheng Cao and
                  Chao Huang and
                  Shuang Zheng},
  title        = {Enabling identity-based authorized encrypted diagnostic data sharing
                  for cloud-assisted E-health information systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102568},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102568},
  doi          = {10.1016/J.JISA.2020.102568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTCHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTSS20,
  author       = {Jing Zhang and
                  Rong Tan and
                  Chunhua Su and
                  Wen Si},
  title        = {Design and application of a personal credit information sharing platform
                  based on consortium blockchain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102659},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102659},
  doi          = {10.1016/J.JISA.2020.102659},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouHWCC20,
  author       = {Xiaoyu Zhou and
                  Wien Hong and
                  Shaowei Weng and
                  Tung{-}Shou Chen and
                  Jeanne Chen},
  title        = {Reversible and recoverable authentication method for demosaiced images
                  using adaptive coding technique},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102629},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102629},
  doi          = {10.1016/J.JISA.2020.102629},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouHWCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouWD20,
  author       = {Quanqiang Zhou and
                  Jinxia Wu and
                  Liangliang Duan},
  title        = {Recommendation attack detection based on deep learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102493},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102493},
  doi          = {10.1016/J.JISA.2020.102493},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouWXPX20,
  author       = {Fucai Zhou and
                  Qiang Wang and
                  Jian Xu and
                  Su Peng and
                  Zifeng Xu},
  title        = {Chameleon accumulator and its applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102422},
  doi          = {10.1016/J.JISA.2019.102422},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouWXPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZoppiCSB20,
  author       = {Tommaso Zoppi and
                  Andrea Ceccarelli and
                  Lorenzo Salani and
                  Andrea Bondavalli},
  title        = {On the educated selection of unsupervised algorithms via attacks and
                  anomaly classes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102474},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102474},
  doi          = {10.1016/J.JISA.2020.102474},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZoppiCSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZulkefliS20,
  author       = {Zakiah Zulkefli and
                  Manmeet Mahinderjit Singh},
  title        = {Sentient-based Access Control model: {A} mitigation technique for
                  Advanced Persistent Threats in Smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102431},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102431},
  doi          = {10.1016/J.JISA.2019.102431},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZulkefliS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HusseinSMO20,
  title        = {A hybrid security strategy (HS\({}^{\mbox{2}}\)) for reliable video
                  streaming in fog computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {51},
  pages        = {102412},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1016/j.jisa.2019.102412},
  doi          = {10.1016/J.JISA.2019.102412},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HusseinSMO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AghiliM19,
  author       = {Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {New authentication/ownership transfer protocol for {RFID} objects},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102401},
  doi          = {10.1016/J.JISA.2019.102401},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AghiliM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlOmariMMMLB19,
  author       = {Ruba AlOmari and
                  Miguel Vargas Martin and
                  Shane MacDonald and
                  Amit Maraj and
                  Ramiro Liscano and
                  Christopher Bellman},
  title        = {Inside out - {A} study of users' perceptions of password memorability
                  and recall},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {223--234},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.009},
  doi          = {10.1016/J.JISA.2019.05.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlOmariMMMLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlOmariT19,
  author       = {Ruba AlOmari and
                  Julie Thorpe},
  title        = {On password behaviours and attitudes in different populations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {79--89},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.008},
  doi          = {10.1016/J.JISA.2018.12.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlOmariT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliSCK19,
  author       = {Muhammad Ali and
                  Stavros Shiaeles and
                  Nathan L. Clarke and
                  Dimitrios Kontogeorgis},
  title        = {A proactive malicious software identification approach for digital
                  forensic examiners},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {139--155},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.013},
  doi          = {10.1016/J.JISA.2019.04.013},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AliSCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlloghaniAABMHA19,
  author       = {Mohamed Alloghani and
                  Mohammed M. Alani and
                  Dhiya Al{-}Jumeily and
                  Thar Baker and
                  Jamila Mustafina and
                  Abir Hussain and
                  Ahmed J. Aljaaf},
  title        = {A systematic review on the status and progress of homomorphic encryption
                  technologies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102362},
  doi          = {10.1016/J.JISA.2019.102362},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlloghaniAABMHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlmalkawiHAAA19,
  author       = {Islam T. Almalkawi and
                  Rami Halloush and
                  Ayoub Alsarhan and
                  Ahmed Yassin Al{-}Dubai and
                  Jamal N. Al{-}Karaki},
  title        = {A lightweight and efficient digital image encryption using hybrid
                  chaotic systems for wireless network applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102384},
  doi          = {10.1016/J.JISA.2019.102384},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlmalkawiHAAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlphonsaM19,
  author       = {M. M. Annie Alphonsa and
                  N. MohanaSundaram},
  title        = {A reformed grasshopper optimization with genetic principle for securing
                  medical data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {410--420},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.007},
  doi          = {10.1016/J.JISA.2019.05.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlphonsaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlshahraniT19,
  author       = {Mohammed Alshahrani and
                  Issa Traor{\'{e}}},
  title        = {Secure mutual authentication and automated access control for IoT
                  smart home using cumulative Keyed-hash chain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {156--175},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.003},
  doi          = {10.1016/J.JISA.2019.02.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlshahraniT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AltiganiHSB19,
  author       = {Abdelrahman Altigani and
                  Shafaatunnur Hasan and
                  Siti Mariyam Shamsuddin and
                  Bazara I. A. Barry},
  title        = {A multi-shape hybrid symmetric encryption algorithm to thwart attacks
                  based on the knowledge of the used cryptographic suite},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {210--221},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.013},
  doi          = {10.1016/J.JISA.2019.03.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AltiganiHSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnadaYKWS19,
  author       = {Hiroaki Anada and
                  Takanori Yasuda and
                  Junpei Kawamoto and
                  Jian Weng and
                  Kouichi Sakurai},
  title        = {{RSA} public keys with inside structure: Proofs of key generation
                  and identities for web-of-trust},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {10--19},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.006},
  doi          = {10.1016/J.JISA.2018.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnadaYKWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnandkumarK19,
  author       = {Ramakrishnan Anandkumar and
                  Ramanujam Kalpana},
  title        = {Designing a fast image encryption scheme using fractal function and
                  3D Henon Map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102390},
  doi          = {10.1016/J.JISA.2019.102390},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnandkumarK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AndradeY19,
  author       = {Roberto O. Andrade and
                  Sang Guun Yoo},
  title        = {Cognitive security: {A} comprehensive study of cognitive science in
                  cybersecurity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.008},
  doi          = {10.1016/J.JISA.2019.06.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AndradeY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AssidiAS19,
  author       = {Hafsa Assidi and
                  Edoukou Berenger Ayebie and
                  El Mamoun Souidi},
  title        = {An efficient code-based threshold ring signature scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {52--60},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.006},
  doi          = {10.1016/J.JISA.2019.01.006},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AssidiAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BakshiP19,
  author       = {Arvind Bakshi and
                  Anoop Kumar Patel},
  title        = {Secure telemedicine using {RONI} halftoned visual cryptography without
                  pixel expansion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {281--295},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.004},
  doi          = {10.1016/J.JISA.2019.03.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BakshiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BanikSL19,
  author       = {Arpita Banik and
                  Zeba Shamsi and
                  Dolendro Singh Laiphrakpam},
  title        = {An encryption scheme for securing multiple medical images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102398},
  doi          = {10.1016/J.JISA.2019.102398},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BanikSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhattacharjeeM19,
  author       = {Tapasi Bhattacharjee and
                  Santi P. Maity},
  title        = {Progressive and hierarchical share-in-share scheme over cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {108--120},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.003},
  doi          = {10.1016/J.JISA.2019.03.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BhattacharjeeM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BiswasATM19,
  author       = {Md. Rafiul Biswas and
                  Kazi Md. Rokibul Alam and
                  Shinsuke Tamura and
                  Yasuhiko Morimoto},
  title        = {A technique for {DNA} cryptography based on dynamic mechanisms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102363},
  doi          = {10.1016/J.JISA.2019.102363},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BiswasATM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Broumandnia19,
  author       = {Ali Broumandnia},
  title        = {Designing digital image encryption using 2D and 3D reversible modular
                  chaotic maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {188--198},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.004},
  doi          = {10.1016/J.JISA.2019.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Broumandnia19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BuckleyN19,
  author       = {Oliver Buckley and
                  Jason R. C. Nurse},
  title        = {The language of biometrics: Analysing public perceptions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {112--119},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.001},
  doi          = {10.1016/J.JISA.2019.05.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BuckleyN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BuriroCC19,
  author       = {Attaullah Buriro and
                  Bruno Crispo and
                  Mauro Conti},
  title        = {AnswerAuth: {A} bimodal behavioral biometric-based user authentication
                  scheme for smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {89--103},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.008},
  doi          = {10.1016/J.JISA.2018.11.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BuriroCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CartaFRS19,
  author       = {Salvatore Carta and
                  Gianni Fenu and
                  Diego Reforgiato Recupero and
                  Roberto Saia},
  title        = {Fraud detection for E-commerce transactions by employing a prudential
                  Multiple Consensus model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {13--22},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.007},
  doi          = {10.1016/J.JISA.2019.02.007},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/CartaFRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DabasS19,
  author       = {Neelam Dabas and
                  Ram Pal Singh},
  title        = {ELM-Kernel and reduced kernel {ELM} based watermarking scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {173--192},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.005},
  doi          = {10.1016/J.JISA.2019.03.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DabasS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DamopoulosK19,
  author       = {Dimitrios Damopoulos and
                  Georgios Kambourakis},
  title        = {Hands-Free one-Time and continuous authentication using glass wearable
                  devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {138--150},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.002},
  doi          = {10.1016/J.JISA.2019.02.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DamopoulosK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DanielRS19,
  author       = {Renu Mary Daniel and
                  Elijah Blessing Rajsingh and
                  Salaja Silas},
  title        = {An efficient eCK secure certificateless authenticated key agreement
                  scheme with security against public key replacement attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {156--172},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.003},
  doi          = {10.1016/J.JISA.2019.05.003},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DanielRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DattaDM19,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions
                  under Standard Static Assumptions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.009},
  doi          = {10.1016/J.JISA.2019.06.009},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DattaDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DengZZL19,
  author       = {Zhiliang Deng and
                  Ying Zhang and
                  Xiaorui Zhang and
                  Lingling Li},
  title        = {Privacy-preserving quantum multi-party computation based on circular
                  structure},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {120--124},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.011},
  doi          = {10.1016/J.JISA.2019.04.011},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DengZZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DyerDD19,
  author       = {James Dyer and
                  Martin E. Dyer and
                  Karim Djemame},
  title        = {Order-preserving encryption using approximate common divisors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102391},
  doi          = {10.1016/J.JISA.2019.102391},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DyerDD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ElsayedZ19,
  author       = {Marwa Elsayed and
                  Mohammad Zulkernine},
  title        = {Offering security diagnosis as a service for cloud SaaS applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {32--48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.006},
  doi          = {10.1016/J.JISA.2018.11.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ElsayedZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EssaidASM19,
  author       = {Mohamed Essaid and
                  Ismail Akharraz and
                  Abderrahim Saaidi and
                  Ali Mouhib},
  title        = {Image encryption scheme based on a new secure variant of Hill cipher
                  and 1D chaotic maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {173--187},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.006},
  doi          = {10.1016/J.JISA.2019.05.006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/EssaidASM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FatahbeygiT19,
  author       = {Ali Fatahbeygi and
                  Fardin Akhlaghian Tab},
  title        = {A highly robust and secure image watermarking based on classification
                  and visual cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {71--78},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.005},
  doi          = {10.1016/J.JISA.2019.01.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FatahbeygiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FatimaYLWAY19,
  author       = {Rubia Fatima and
                  Affan Yasin and
                  Lin Liu and
                  Jianmin Wang and
                  Wasif Afzal and
                  Awaid Yasin},
  title        = {Sharing information online rationally: An observation of user privacy
                  concerns and awareness using serious game},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.007},
  doi          = {10.1016/J.JISA.2019.06.007},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FatimaYLWAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FerreiraA19,
  author       = {Rui Ferreira and
                  Rui L. Aguiar},
  title        = {Repositioning privacy concerns: Web servers controlling {URL} metadata},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {121--137},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.010},
  doi          = {10.1016/J.JISA.2019.03.010},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FerreiraA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FocardiLW19,
  author       = {Riccardo Focardi and
                  Flaminia L. Luccio and
                  Heider A. M. Wahsheh},
  title        = {Usable security for {QR} code},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102369},
  doi          = {10.1016/J.JISA.2019.102369},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FocardiLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Frattolillo19,
  author       = {Franco Frattolillo},
  title        = {A multiparty watermarking protocol for cloud environments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {246--257},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.011},
  doi          = {10.1016/J.JISA.2019.05.011},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Frattolillo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GajbhiyeKSS19,
  author       = {Samta Gajbhiye and
                  Sanjeev Karmakar and
                  Monisha Sharma and
                  Sanjay Sharma},
  title        = {Bluetooth Secure Simple Pairing with enhanced security level},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {170--183},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.009},
  doi          = {10.1016/J.JISA.2018.11.009},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GajbhiyeKSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GhosalM19,
  author       = {Sudipta Kumar Ghosal and
                  Jyotsna Kumar Mandal},
  title        = {On the use of the Stirling Transform in image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {320--330},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.003},
  doi          = {10.1016/J.JISA.2018.04.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GhosalM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuWY19,
  author       = {Ke Gu and
                  Keming Wang and
                  Lulu Yang},
  title        = {Traceable attribute-based signature},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102400},
  doi          = {10.1016/J.JISA.2019.102400},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuerraCV19,
  author       = {Jorge L. Guerra and
                  Carlos Adri{\'{a}}n Catania and
                  Eduardo E. Veas},
  title        = {Active learning approach to label network traffic datasets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102388},
  doi          = {10.1016/J.JISA.2019.102388},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuerraCV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Guri19,
  author       = {Mordechai Guri},
  title        = {Optical air-gap exfiltration attack via invisible images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {222--230},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.004},
  doi          = {10.1016/J.JISA.2019.02.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Guri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HarmouchK19,
  author       = {Youssef Harmouch and
                  Rachid El Kouch},
  title        = {The benefit of using chaos in key schedule algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {143--155},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.001},
  doi          = {10.1016/J.JISA.2019.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HarmouchK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HasrounySBL19,
  author       = {Hamssa Hasrouny and
                  Abed Ellatif Samhat and
                  Carole Bassil and
                  Anis Laouiti},
  title        = {Misbehavior detection and efficient revocation within {VANET}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {193--209},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.001},
  doi          = {10.1016/J.JISA.2019.03.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HasrounySBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HeYHW19,
  author       = {Yongzhong He and
                  Xuejun Yang and
                  Binghui Hu and
                  Wei Wang},
  title        = {Dynamic privacy leakage analysis of Android third-party libraries},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {259--270},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.014},
  doi          = {10.1016/J.JISA.2019.03.014},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HeYHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HouJGS19,
  author       = {Jinqiu Hou and
                  Mingming Jiang and
                  Yuyan Guo and
                  Wangan Song},
  title        = {Efficient identity-based multi-bit proxy re-encryption over lattice
                  in the standard model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {329--334},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.015},
  doi          = {10.1016/J.JISA.2019.05.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HouJGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuAB19,
  author       = {Qinwen Hu and
                  Muhammad Rizwan Asghar and
                  Nevil Brownlee},
  title        = {Checking certificate revocation efficiently using certificate revocation
                  guard},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.012},
  doi          = {10.1016/J.JISA.2019.06.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HuAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuL19,
  author       = {Yan{-}Xiang Hu and
                  Yi{-}Ning Liu},
  title        = {A progressively essential secret image sharing scheme using hierarchy
                  shadow},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {371--376},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.003},
  doi          = {10.1016/J.JISA.2019.06.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiaCLYLLW19,
  author       = {Hongyong Jia and
                  Yue Chen and
                  Yan Li and
                  Xincheng Yan and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Bo Wang},
  title        = {Attributes revocation through ciphertext puncturation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.011},
  doi          = {10.1016/J.JISA.2019.06.011},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiaCLYLLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiangCYSZ19,
  author       = {Leqi Jiang and
                  Yi Cao and
                  Chengsheng Yuan and
                  Xingming Sun and
                  Xiaoli Zhu},
  title        = {An effective comparison protocol over encrypted data in cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102367},
  doi          = {10.1016/J.JISA.2019.102367},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiangCYSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JinCYZJS19,
  author       = {Chunhua Jin and
                  Guanhua Chen and
                  Changhui Yu and
                  Jianyang Zhao and
                  Ying Jin and
                  Jinsong Shan},
  title        = {Heterogeneous deniable authentication and its application to e-voting
                  systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {104--111},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.009},
  doi          = {10.1016/J.JISA.2019.04.009},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JinCYZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KabiriradE19,
  author       = {Saeideh Kabirirad and
                  Ziba Eslami},
  title        = {Improvement of (\emph{n, n})-multi-secret image sharing schemes based
                  on Boolean operations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {16--27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.018},
  doi          = {10.1016/J.JISA.2019.03.018},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KabiriradE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamalI19,
  author       = {A. H. M. Kamal and
                  Mohammad Mahfuzul Islam},
  title        = {A prediction error based histogram association and mapping technique
                  for data embedment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102368},
  doi          = {10.1016/J.JISA.2019.102368},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KamalI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamilO19,
  author       = {Ismaila Adeniyi Kamil and
                  Sunday Oyinlola Ogundoyin},
  title        = {An improved certificateless aggregate signature scheme without bilinear
                  pairings for vehicular ad hoc networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {184--200},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.004},
  doi          = {10.1016/J.JISA.2018.12.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KamilO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KandarCBD19,
  author       = {Shyamalendu Kandar and
                  Dhaibat Chaudhuri and
                  Apurbaa Bhattacharjee and
                  Bibhas Chandra Dhara},
  title        = {Image encryption using sequence generated by cyclic group},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {117--129},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.003},
  doi          = {10.1016/J.JISA.2018.12.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KandarCBD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KavianpourTS19,
  author       = {Sanaz Kavianpour and
                  Ali Tamimi and
                  Bharanidharan Shanmugam},
  title        = {A privacy-preserving model to control social interaction behaviors
                  in social network sites},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102402},
  doi          = {10.1016/J.JISA.2019.102402},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KavianpourTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanP19,
  author       = {Saad Khan and
                  Simon Parkinson},
  title        = {Discovering and utilising expert knowledge from security event logs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102375},
  doi          = {10.1016/J.JISA.2019.102375},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhosraviKKN19,
  author       = {Behrooz Khosravi and
                  Behnam Khosravi and
                  Bahman Khosravi and
                  Khashayar Nazarkardeh},
  title        = {A new method for pdf steganography in justified texts},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {61--70},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.003},
  doi          = {10.1016/J.JISA.2019.01.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhosraviKKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarGA19,
  author       = {Devender Kumar and
                  Harmanpreet Singh Grover and
                  Adarsh},
  title        = {A secure authentication protocol for wearable devices environment
                  using {ECC}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {8--15},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.008},
  doi          = {10.1016/J.JISA.2019.03.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarKJ19,
  author       = {Rajeev Kumar and
                  Dae{-}Soo Kim and
                  Ki{-}Hyun Jung},
  title        = {Enhanced {AMBTC} based data hiding method using hamming distance and
                  pixel value differencing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {94--103},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.007},
  doi          = {10.1016/J.JISA.2019.04.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarKKK19,
  author       = {Subodh Kumar and
                  Rajendra Kumar and
                  Sushil Kumar and
                  Sunil Kumar},
  title        = {Cryptographic construction using coupled map lattice as a diffusion
                  model to enhanced security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {70--83},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.011},
  doi          = {10.1016/J.JISA.2019.02.011},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarKKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarN19,
  author       = {Avishek Kumar and
                  Naveen K. Nishchal},
  title        = {Quick response code and interference-based optical asymmetric cryptosystem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {35--43},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.004},
  doi          = {10.1016/J.JISA.2019.01.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarN19a,
  author       = {Jalesh Kumar and
                  Shivananda Nirmala},
  title        = {Securing the regions comprising information in a document image with
                  novel key selection technique - a parallel approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {84--95},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.006},
  doi          = {10.1016/J.JISA.2019.03.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarN19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunzPGFP19,
  author       = {Michael Kunz and
                  Alexander Puchta and
                  Sebastian Groll and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Attribute quality management for dynamic identity and access management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {64--79},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.004},
  doi          = {10.1016/J.JISA.2018.11.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KunzPGFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiDCW19,
  author       = {Dongmei Li and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Haijiang Wang},
  title        = {Privacy-preserving outsourced image feature extraction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {59--64},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.020},
  doi          = {10.1016/J.JISA.2019.03.020},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiDCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiK19,
  author       = {Wenjuan Li and
                  Lam For Kwok},
  title        = {Challenge-based collaborative intrusion detection networks under passive
                  message fingerprint attack: {A} further analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {1--7},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.019},
  doi          = {10.1016/J.JISA.2019.03.019},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiXZ19,
  author       = {Shanshan Li and
                  Chunxiang Xu and
                  Yuan Zhang},
  title        = {{CSED:} Client-Side encrypted deduplication scheme based on proofs
                  of ownership for cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {250--258},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.015},
  doi          = {10.1016/J.JISA.2019.03.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiZRTLXC19,
  author       = {Pei Li and
                  Shihao Zhou and
                  Bingqing Ren and
                  Shuman Tang and
                  Ting Li and
                  Chang Xu and
                  Jiageng Chen},
  title        = {Efficient implementation of lightweight block ciphers on volta and
                  pascal architecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {235--245},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.006},
  doi          = {10.1016/J.JISA.2019.04.006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiZRTLXC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiZX19,
  author       = {Chengqing Li and
                  Yun Zhang and
                  Eric Yong Xie},
  title        = {When an attacker meets a cipher-image in 2018: {A} year in review},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102361},
  doi          = {10.1016/J.JISA.2019.102361},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiangZKR19,
  author       = {Pengfei Liang and
                  Leyou Zhang and
                  Li Kang and
                  Juan Ren},
  title        = {Privacy-preserving decentralized {ABE} for secure sharing of personal
                  health records in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {258--266},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.012},
  doi          = {10.1016/J.JISA.2019.05.012},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiangZKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuRGXW19,
  author       = {Yepeng Liu and
                  Yongjun Ren and
                  Chunpeng Ge and
                  Jinyue Xia and
                  Qirun Wang},
  title        = {A CCA-secure multi-conditional proxy broadcast re-encryption scheme
                  for cloud storage system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {125--131},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.002},
  doi          = {10.1016/J.JISA.2019.05.002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuRGXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LohachabK19,
  author       = {Ankur Lohachab and
                  Bidhan Karambir},
  title        = {{ECC} based inter-device authentication and authorization scheme using
                  {MQTT} for IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {1--12},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.005},
  doi          = {10.1016/J.JISA.2019.02.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LohachabK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MahatoYK19,
  author       = {Susmita Mahato and
                  Dilip Kumar Yadav and
                  Danish Ali Khan},
  title        = {A novel information hiding scheme based on social networking site
                  viewers' public comments},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {275--283},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.013},
  doi          = {10.1016/J.JISA.2019.05.013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MahatoYK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MalikWCYKWCH19,
  author       = {Asad Malik and
                  Hongxia Wang and
                  Tailong Chen and
                  Tianlong Yang and
                  Ahmad Neyaz Khan and
                  Hanzhou Wu and
                  Yanli Chen and
                  Yi Hu},
  title        = {Reversible data hiding in homomorphically encrypted image using interpolation
                  technique},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102374},
  doi          = {10.1016/J.JISA.2019.102374},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MalikWCYKWCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MandalaR19,
  author       = {Jyothi Mandala and
                  M. V. P. Chandra Sekhara Rao},
  title        = {Privacy preservation of data using crow search with adaptive awareness
                  probability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {157--169},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.005},
  doi          = {10.1016/J.JISA.2018.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MandalaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MansouriA19,
  author       = {Azadeh Mansouri and
                  Ahmad Mahmoudi Aznaveh},
  title        = {Toward a secure video watermarking in compressed domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102370},
  doi          = {10.1016/J.JISA.2019.102370},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MansouriA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MarksteinerVN19,
  author       = {Stefan Marksteiner and
                  Heribert Vallant and
                  Kai Nahrgang},
  title        = {Cyber security requirements engineering for low-voltage distribution
                  smart grid architectures using threat modeling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102389},
  doi          = {10.1016/J.JISA.2019.102389},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MarksteinerVN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Masoumi19,
  author       = {Massoud Masoumi},
  title        = {A highly efficient and secure hardware implementation of the advanced
                  encryption standard},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102371},
  doi          = {10.1016/J.JISA.2019.102371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Masoumi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McLarenBRT19,
  author       = {Peter McLaren and
                  William J. Buchanan and
                  Gordon Russell and
                  Zhiyuan Tan},
  title        = {Deriving ChaCha20 key streams from targeted memory analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102372},
  doi          = {10.1016/J.JISA.2019.102372},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/McLarenBRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MeghrajaniDM19,
  author       = {Yogesh K. Meghrajani and
                  Laxmi S. Desai and
                  Himanshu S. Mazumdar},
  title        = {Secure and efficient arithmetic-based multi-secret image sharing scheme
                  using universal share},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {267--274},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.010},
  doi          = {10.1016/J.JISA.2019.05.010},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MeghrajaniDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MizherSAM19,
  author       = {Manal A. Mizher and
                  Riza Sulaiman and
                  Ayman M. Abdalla and
                  Manar Abduljabbar Ahmad Mizher},
  title        = {An improved simple flexible cryptosystem for 3D objects with texture
                  maps and 2D images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {390--409},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.005},
  doi          = {10.1016/J.JISA.2019.06.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MizherSAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohammadA19,
  author       = {Rami Mustafa A. Mohammad and
                  Mohammed Abdulrahman Alqahtani},
  title        = {A comparison of machine learning techniques for file system forensics
                  analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {53--61},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.009},
  doi          = {10.1016/J.JISA.2019.02.009},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MohammadA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MohammadiMAK19,
  author       = {Sara Mohammadi and
                  Hamid Mirvaziri and
                  Mostafa Ghazizadeh Ahsaee and
                  Hadis Karimipour},
  title        = {Cyber intrusion detection by combined feature selection algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {80--88},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.007},
  doi          = {10.1016/J.JISA.2018.11.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MohammadiMAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MondalSK19,
  author       = {Bhaskar Mondal and
                  Shrey Singh and
                  Prabhakar Kumar},
  title        = {A secure image encryption scheme based on cellular automata and chaotic
                  skew tent map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {117--130},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.010},
  doi          = {10.1016/J.JISA.2019.01.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MondalSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MoosazadehE19,
  author       = {Mohammad Moosazadeh and
                  Gholamhossein Ekbatanifard},
  title        = {A new DCT-based robust image watermarking method using teaching-learning-Based
                  optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {28--38},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.001},
  doi          = {10.1016/J.JISA.2019.04.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MoosazadehE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MwitondiSZ19,
  author       = {Kassim S. Mwitondi and
                  Raed A. Said and
                  Shahrzad Zargari},
  title        = {A robust domain partitioning intrusion detection method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102360},
  doi          = {10.1016/J.JISA.2019.102360},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MwitondiSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NajafiL19,
  author       = {Esmaeil Najafi and
                  Khaled Loukhaoukha},
  title        = {Hybrid secure and robust image watermarking scheme based on {SVD}
                  and sharp frequency localized contourlet transform},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {144--156},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.002},
  doi          = {10.1016/J.JISA.2018.12.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NajafiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NasirAHF19,
  author       = {Akhyari Nasir and
                  Ruzaini Abdullah Arshah and
                  Mohd Rashid Ab Hamid and
                  Syahrul Fahmy},
  title        = {An analysis on the dimensions of information security culture concept:
                  {A} review},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {12--22},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.003},
  doi          = {10.1016/J.JISA.2018.11.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NasirAHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NazerianMN19,
  author       = {Fatemeh Nazerian and
                  Homayun Motameni and
                  Hossein Nematzadeh},
  title        = {Emergency role-based access control {(E-RBAC)} and analysis of model
                  specifications with alloy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {131--142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.008},
  doi          = {10.1016/J.JISA.2019.01.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NazerianMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NesaGB19,
  author       = {Nashreen Nesa and
                  Tania Ghosh and
                  Indrajit Banerjee},
  title        = {Design of a chaos-based encryption scheme for sensor data using a
                  novel logarithmic chaotic map},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {320--328},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.017},
  doi          = {10.1016/J.JISA.2019.05.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NesaGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NunesBRRL19,
  author       = {Matthew Nunes and
                  Pete Burnap and
                  Omer F. Rana and
                  Philipp Reinecke and
                  Kaelon Lloyd},
  title        = {Getting to the root of the problem: {A} detailed comparison of kernel
                  and user level data for dynamic malware analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102365},
  doi          = {10.1016/J.JISA.2019.102365},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NunesBRRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Pakniat19,
  author       = {Nasrollah Pakniat},
  title        = {Designated tester certificateless encryption with keyword search},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102394},
  doi          = {10.1016/J.JISA.2019.102394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Pakniat19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatroA19,
  author       = {K. Abhimanyu Kumar Patro and
                  Bibhudendra Acharya},
  title        = {An efficient colour image encryption scheme based on 1-D chaotic maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {23--41},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.006},
  doi          = {10.1016/J.JISA.2019.02.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatroA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PereiraHN19,
  author       = {Daniel Patrick Pereira and
                  Celso M. Hirata and
                  Simin Nadjm{-}Tehrani},
  title        = {A STAMP-based ontology approach to support safety and security analyses},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {302--319},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.014},
  doi          = {10.1016/J.JISA.2019.05.014},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PereiraHN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PetrenkoMS19,
  author       = {Kyrylo Petrenko and
                  Atefeh Mashatan and
                  Farid Shirazi},
  title        = {Assessing the quantum-resistant cryptographic agility of routing and
                  switching {IT} network infrastructure in a large-size financial organization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {151--163},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.007},
  doi          = {10.1016/J.JISA.2019.03.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PetrenkoMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PhamBF19,
  author       = {Hiep Cong Pham and
                  Linda Brennan and
                  Steven Furnell},
  title        = {Information security burnout: Identification of sources and mitigating
                  factors from security demands and resources},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {96--107},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.012},
  doi          = {10.1016/J.JISA.2019.03.012},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PhamBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PuthuparambilT19,
  author       = {Arun Babu Puthuparambil and
                  Jithin Jose Thomas},
  title        = {Freestyle, a randomized version of ChaCha for resisting offline brute-force
                  and dictionary attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102396},
  doi          = {10.1016/J.JISA.2019.102396},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PuthuparambilT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenzaML19,
  author       = {Diego Renza and
                  Sebasti{\'{a}}n Mendoza and
                  Dora M. Ballesteros L.},
  title        = {High-uncertainty audio signal encryption based on the Collatz conjecture},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {62--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.010},
  doi          = {10.1016/J.JISA.2019.02.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RenzaML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SabharwalG19,
  author       = {Tanupreet Sabharwal and
                  Rashmi Gupta},
  title        = {Human identification after plastic surgery using region based score
                  level fusion of local facial features},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102373},
  doi          = {10.1016/J.JISA.2019.102373},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SabharwalG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahaRK19,
  author       = {Tushar Kanti Saha and
                  Mayank Rathee and
                  Takeshi Koshiba},
  title        = {Efficient private database queries using ring-LWE somewhat homomorphic
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102406},
  doi          = {10.1016/J.JISA.2019.102406},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SahaRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SarmahK19,
  author       = {Dipti Kapoor Sarmah and
                  Anand J. Kulkarni},
  title        = {Improved Cohort Intelligence - {A} high capacity, swift and secure
                  approach on {JPEG} image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {90--106},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.002},
  doi          = {10.1016/J.JISA.2019.01.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SarmahK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SartoliN19,
  author       = {Sara Sartoli and
                  Akbar Siami Namin},
  title        = {Modeling adaptive access control policies using answer set programming},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {49--63},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.10.007},
  doi          = {10.1016/J.JISA.2018.10.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SartoliN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaxenaBG19,
  author       = {Anuj Shanker Saxena and
                  Debajyoti Bera and
                  Vikram Goyal},
  title        = {Modeling location obfuscation for continuous query},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {130--143},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.001},
  doi          = {10.1016/J.JISA.2018.12.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SaxenaBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchatzB19,
  author       = {Daniel Schatz and
                  Rabih Bashroush},
  title        = {Security predictions - {A} way to reduce uncertainty},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {107--116},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.009},
  doi          = {10.1016/J.JISA.2019.01.009},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SchatzB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShrivastavaH19,
  author       = {Rajesh Kumar Shrivastava and
                  Chittaranjan Hota},
  title        = {Profile-guided code identification and hardening using return oriented
                  programming},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102364},
  doi          = {10.1016/J.JISA.2019.102364},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShrivastavaH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghG19,
  author       = {Reena Singh and
                  Timothy A. Gonsalves},
  title        = {Making the value of data determine the security: {A} case study of
                  rural business process outsourcing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {104--116},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.005},
  doi          = {10.1016/J.JISA.2018.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghJK19,
  author       = {Umesh Kumar Singh and
                  Chanchala Joshi and
                  Dimitris Kanellopoulos},
  title        = {A framework for zero-day vulnerabilities detection and prioritization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {164--172},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.011},
  doi          = {10.1016/J.JISA.2019.03.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghK19,
  author       = {Dileep Kumar Singh and
                  Praveen Kaushik},
  title        = {Intrusion response prioritization based on fuzzy {ELECTRE} multiple
                  criteria decision making technique},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102359},
  doi          = {10.1016/J.JISA.2019.102359},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SinghK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SoniDT19,
  author       = {Badal Soni and
                  Pradip K. Das and
                  Dalton Meitei Thounaojam},
  title        = {Geometric transformation invariant block based copy-move forgery detection
                  using fast and efficient hybrid local features},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {44--51},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.007},
  doi          = {10.1016/J.JISA.2019.01.007},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SoniDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TabashIT19,
  author       = {Fatma K. Tabash and
                  Muhammed Izharuddin and
                  Mosab I. Tabash},
  title        = {Encryption techniques for {H.264/AVC} videos: {A} literature review},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {20--34},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.01.001},
  doi          = {10.1016/J.JISA.2019.01.001},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TabashIT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ThankiKT19,
  author       = {Rohit M. Thanki and
                  Ashish Kothari and
                  Deven Trivedi},
  title        = {Hybrid and blind watermarking scheme in DCuT - {RDWT} domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {231--249},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.017},
  doi          = {10.1016/J.JISA.2019.03.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ThankiKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TianYS19,
  author       = {Yifan Tian and
                  Jiawei Yuan and
                  Houbing Song},
  title        = {Efficient privacy-preserving authentication framework for edge-assisted
                  Internet of Drones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.010},
  doi          = {10.1016/J.JISA.2019.06.010},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TianYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TieuNNYE19,
  author       = {Ngoc{-}Dung T. Tieu and
                  Huy H. Nguyen and
                  Hoang{-}Quoc Nguyen{-}Son and
                  Junichi Yamagishi and
                  Isao Echizen},
  title        = {Spatio-temporal generative adversarial network for gait anonymization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {307--319},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.002},
  doi          = {10.1016/J.JISA.2019.03.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TieuNNYE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TsikerdekisMDR19,
  author       = {Michail Tsikerdekis and
                  Taylor Morse and
                  Cari Dean and
                  Jason Ruffin},
  title        = {A taxonomy of features for preventing identity deception in online
                  communities and their estimated efficacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {363--370},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.002},
  doi          = {10.1016/J.JISA.2019.06.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TsikerdekisMDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/UllahLHL19,
  author       = {Shamsher Ullah and
                  Xiang{-}Yang Li and
                  Muhammad Tanveer Hussain and
                  Lan Zhang},
  title        = {Kernel homomorphic encryption protocol},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102366},
  doi          = {10.1016/J.JISA.2019.102366},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/UllahLHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VaishnaviS19,
  author       = {Dharmalingam Vaishnavi and
                  T. S. Subashini},
  title        = {Application of local invariant symmetry features to detect and localize
                  image copy move forgeries},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {23--31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.001},
  doi          = {10.1016/J.JISA.2018.11.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VaishnaviS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VenkatramanAV19,
  author       = {Sitalakshmi Venkatraman and
                  Mamoun Alazab and
                  R. Vinayakumar},
  title        = {A hybrid deep learning image-based analysis for effective malware
                  detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {377--389},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.006},
  doi          = {10.1016/J.JISA.2019.06.006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VenkatramanAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ViscontiMBM19,
  author       = {Andrea Visconti and
                  Ondrej Mosn{\'{a}}cek and
                  Milan Broz and
                  Vashek Maty{\'{a}}s},
  title        = {Examining {PBKDF2} security margin - Case study of {LUKS}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {296--306},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.016},
  doi          = {10.1016/J.JISA.2019.03.016},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ViscontiMBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WagdarikarS19,
  author       = {Amir M. U. Wagdarikar and
                  Ranjan K. Senapati},
  title        = {Optimization based interesting region identification for video watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102393},
  doi          = {10.1016/J.JISA.2019.102393},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WagdarikarS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WanCZX19,
  author       = {Wunan Wan and
                  Jun Chen and
                  Shibing Zhang and
                  Jinyue Xia},
  title        = {A Cluster Correlation power analysis against double blinding exponentiation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.013},
  doi          = {10.1016/J.JISA.2019.06.013},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WanCZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangBYWJ19,
  author       = {Xiaoliang Wang and
                  Liang Bai and
                  Qing Yang and
                  Liu Wang and
                  Frank Jiang},
  title        = {A dual privacy-preservation scheme for cloud-based eHealth systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {132--138},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.010},
  doi          = {10.1016/J.JISA.2019.04.010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangBYWJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangHDZ19,
  author       = {Yong Wang and
                  Abdelrhman Hassan and
                  Xiaoran Duan and
                  Xiaosong Zhang},
  title        = {An efficient multiple-user location-based query authentication approach
                  for social networking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {284--294},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.016},
  doi          = {10.1016/J.JISA.2019.05.016},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangHDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangHLGZ19,
  author       = {Yong Wang and
                  Abdelrhman Hassan and
                  Fei Liu and
                  Yuanfeng Guan and
                  Zhiwei Zhang},
  title        = {Secure string pattern query for open data initiative},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {335--352},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.001},
  doi          = {10.1016/J.JISA.2019.06.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangHLGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLHG19,
  author       = {Guoming Wang and
                  Rongxing Lu and
                  Cheng Huang and
                  Yong Liang Guan},
  title        = {An efficient and privacy-Preserving pre-clinical guide scheme for
                  mobile eHealthcare},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {271--280},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.009},
  doi          = {10.1016/J.JISA.2019.03.009},
  timestamp    = {Sun, 01 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLLLSJ19,
  author       = {Jinwei Wang and
                  Yangyang Li and
                  Jian Li and
                  Xiangyang Luo and
                  Yun{-}Qing Shi and
                  Sunil Kr. Jha},
  title        = {Color image-spliced localization based on quaternion principal component
                  analysis and quaternion skewness},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {353--362},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.06.004},
  doi          = {10.1016/J.JISA.2019.06.004},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLLLSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLPHL19,
  author       = {Yong Wang and
                  Fei Liu and
                  Zimao Pang and
                  Abdelrhman Hassan and
                  Wenbin Lu},
  title        = {Privacy-preserving content-based image retrieval for mobile computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102399},
  doi          = {10.1016/J.JISA.2019.102399},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLPHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLZLL19,
  author       = {Jingyan Wang and
                  Weijiang Liu and
                  Lei Zheng and
                  Zhiyang Li and
                  Zhaobin Liu},
  title        = {A novel algorithm for detecting superpoints based on reversible virtual
                  bitmaps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102403},
  doi          = {10.1016/J.JISA.2019.102403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangLZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWLJ19,
  author       = {Jinwei Wang and
                  Guojing Wu and
                  Jian Li and
                  Sunil Kr. Jha},
  title        = {A new method estimating linear gaussian filter kernel by image {PRNU}
                  noise},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {44},
  pages        = {1--11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.11.002},
  doi          = {10.1016/J.JISA.2018.11.002},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangWLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangWZJ19,
  author       = {Defu Wang and
                  Xiaojuan Wang and
                  Yong Zhang and
                  Lei Jin},
  title        = {Detection of power grid disturbances and cyber-attacks based on machine
                  learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {42--52},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.02.008},
  doi          = {10.1016/J.JISA.2019.02.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangWZJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZXW19,
  author       = {Qiyu Wu and
                  Fucai Zhou and
                  Jian Xu and
                  Qiang Wang},
  title        = {Secure data stream outsourcing with publicly verifiable integrity
                  in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102392},
  doi          = {10.1016/J.JISA.2019.102392},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiongD19,
  author       = {Lizhi Xiong and
                  Danping Dong},
  title        = {Reversible data hiding in encrypted images with somewhat homomorphic
                  encryption based on sorting block-level prediction-error expansion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {78--85},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.005},
  doi          = {10.1016/J.JISA.2019.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiongD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuanLS19,
  author       = {Guorong Xuan and
                  Xiaolong Li and
                  Yun{-}Qing Shi},
  title        = {Minimum entropy and histogram-pair based {JPEG} image reversible data
                  hiding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {1--9},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.007},
  doi          = {10.1016/J.JISA.2018.12.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuanLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YanLLG19,
  author       = {Xuehu Yan and
                  Lintao Liu and
                  Yuliang Lu and
                  Qinghong Gong},
  title        = {Security analysis and classification of image secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {208--216},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.008},
  doi          = {10.1016/J.JISA.2019.05.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YanLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLZG19,
  author       = {Wenbo Yang and
                  Juanru Li and
                  Yuanyuan Zhang and
                  Dawu Gu},
  title        = {Security analysis of third-party in-app payment in mobile applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {48},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102358},
  doi          = {10.1016/J.JISA.2019.102358},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangLZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangZZX19,
  author       = {Min Yang and
                  Shibin Zhang and
                  Hang Zhang and
                  Jinyue Xia},
  title        = {A new user behavior evaluation method in online social network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {217--222},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.008},
  doi          = {10.1016/J.JISA.2019.04.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangZZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YassinTB19,
  author       = {Mohamed Yassin and
                  Chamseddine Talhi and
                  Hanifa Boucheneb},
  title        = {{ITADP:} An inter-tenant attack detection and prevention framework
                  for multi-tenant SaaS},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102395},
  doi          = {10.1016/J.JISA.2019.102395},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YassinTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZengK19,
  author       = {Wen Zeng and
                  Maciej Koutny},
  title        = {Modelling and analysis of corporate efficiency and productivity loss
                  associated with enterprise information security technologies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.102385},
  doi          = {10.1016/J.JISA.2019.102385},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZengK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangGJL19,
  author       = {Peng Zhang and
                  Juntao Gao and
                  Wenjuan Jia and
                  Xuelian Li},
  title        = {Design of compressed sensing fault-tolerant encryption scheme for
                  key sharing in IoT Multi-cloudy environment(s)},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {65--77},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.004},
  doi          = {10.1016/J.JISA.2019.04.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangGJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangHGYJ19,
  author       = {Yanhua Zhang and
                  Yupu Hu and
                  Yong Gan and
                  Yifeng Yin and
                  Huiwen Jia},
  title        = {Efficient fuzzy identity-based signature from lattices for identities
                  in a small (or large) universe},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {86--93},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.012},
  doi          = {10.1016/J.JISA.2019.04.012},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangHGYJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangLL19,
  author       = {Ru Zhang and
                  Chunjing Lu and
                  Jianyi Liu},
  title        = {A high capacity reversible data hiding scheme for encrypted covers
                  based on histogram shifting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {199--207},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.05.005},
  doi          = {10.1016/J.JISA.2019.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaoXC19,
  author       = {Jining Zhao and
                  Chunxiang Xu and
                  Kefei Chen},
  title        = {Detailed analysis and improvement of an efficient and secure identity-based
                  public auditing for dynamic outsourced data with proxy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {39--49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.002},
  doi          = {10.1016/J.JISA.2019.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaoXC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaoYJC19,
  author       = {Yinyuan Zhao and
                  Haoran Yuan and
                  Tao Jiang and
                  Xiaofeng Chen},
  title        = {Secure distributed data geolocation scheme against location forgery
                  attack},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {50--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.04.003},
  doi          = {10.1016/J.JISA.2019.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaoYJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics