Search dblp for Publications

export results for "toc:db/journals/ijics/ijics9.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Al-JarrahAJ17,
  author       = {Omar M. Al{-}Jarrah and
                  Moath Al{-}Ayoub and
                  Yaser Jararweh},
  title        = {Hierarchical detection of insider attacks in cloud computing systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {85--99},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003601},
  doi          = {10.1504/IJICS.2017.10003601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-JarrahAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Alsaghier17,
  author       = {Hisham M. Alsaghier},
  title        = {A secure mobile commerce framework based on community cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {100--113},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003604},
  doi          = {10.1504/IJICS.2017.10003604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Alsaghier17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnushaS17,
  author       = {K. Anusha and
                  E. Sathiyamoorthy},
  title        = {{MAM-ISSIDS:} multi-agent model-based intelligent and self-sharing
                  intrusion detection system for distributed network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {361--386},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008448},
  doi          = {10.1504/IJICS.2017.10008448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnushaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AroraT17,
  author       = {Vasudha Arora and
                  Shyam Sunder Tyagi},
  title        = {Update enabled multi-keyword searchable encryption scheme for secure
                  data outsourcing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {288--301},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008445},
  doi          = {10.1504/IJICS.2017.10008445},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AroraT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DabirAM17,
  author       = {Abes Dabir and
                  AbdelRahman Abdou and
                  Ashraf Matrawy},
  title        = {A survey on forensic event reconstruction systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {337--360},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008447},
  doi          = {10.1504/IJICS.2017.10008447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DabirAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DjellabB17,
  author       = {Rima Djellab and
                  Mohamed Benmohammed},
  title        = {A novel quantum distributed key management protocol for ring-organised
                  group},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {302--323},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10004329},
  doi          = {10.1504/IJICS.2017.10004329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DjellabB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GuptaMB17,
  author       = {Amit Kr. Gupta and
                  Jyotsna Kumar Mandal and
                  Indrajit Bhattacharya},
  title        = {Mitigating selfish, blackhole and wormhole attacks in {DTN} in a secure,
                  cooperative way},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {130--155},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003609},
  doi          = {10.1504/IJICS.2017.10003609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GuptaMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JaiswalG17,
  author       = {Shruti Jaiswal and
                  Daya Gupta},
  title        = {Security engineering methods - in-depth analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {180--211},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005903},
  doi          = {10.1504/IJICS.2017.10005903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JaiswalG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KasanaSB17,
  author       = {Geeta Kasana and
                  Kulbir Singh and
                  Satvinder Singh Bhatia},
  title        = {Data hiding using lifting scheme and genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {271--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008444},
  doi          = {10.1504/IJICS.2017.10008444},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KasanaSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Khan17,
  author       = {Arif Khan},
  title        = {Virtual machine security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {49--84},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003599},
  doi          = {10.1504/IJICS.2017.10003599},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Khan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Manasrah17,
  author       = {Ahmad M. Manasrah},
  title        = {Dynamic weighted {VM} load balancing for cloud-analyst},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {5--19},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003596},
  doi          = {10.1504/IJICS.2017.10003596},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Manasrah17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MenesidouK17,
  author       = {Sofia{-}Anna Menesidou and
                  Vasilios Katos},
  title        = {Opportunistic key management in delay tolerant networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {212--228},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005904},
  doi          = {10.1504/IJICS.2017.10005904},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MenesidouK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Montasari17,
  author       = {Reza Montasari},
  title        = {A standardised data acquisition process model for digital forensic
                  investigations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {229--249},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005908},
  doi          = {10.1504/IJICS.2017.10005908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Montasari17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RangasamyKKV17,
  author       = {Jothi Rangasamy and
                  Lakshmi Kuppusamy and
                  Gopi Krishnan and
                  Velmurugan},
  title        = {Evaluation of puzzle-enabled proxy-assisted denial-of-service protection
                  for web services},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {114--129},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003606},
  doi          = {10.1504/IJICS.2017.10003606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RangasamyKKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaniB17,
  author       = {Prathuri Jhansi Rani and
                  S. Durga Bhavani},
  title        = {Keyed hash function using Bernoulli shift map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {250--270},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005909},
  doi          = {10.1504/IJICS.2017.10005909},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaniB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TawalbehAJA17,
  author       = {Lo'ai Ali Tawalbeh and
                  Fadi Ababneh and
                  Yaser Jararweh and
                  Fahd M. Al{-}Dosari},
  title        = {Trust delegation-based secure mobile cloud computing framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {36--48},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003598},
  doi          = {10.1504/IJICS.2017.10003598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TouaziOBB17,
  author       = {Djoudi Touazi and
                  Mawloud Omar and
                  Abdelhakim Bendib and
                  Abdelmadjid Bouabdallah},
  title        = {A trust-based approach for securing data communication in delay tolerant
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {324--336},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10008446},
  doi          = {10.1504/IJICS.2017.10008446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TouaziOBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZearSK17,
  author       = {Aditi Zear and
                  Amit Kumar Singh and
                  Pardeep Kumar},
  title        = {Robust watermarking technique using back propagation neural network:
                  a security protection mechanism for social applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {20--35},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003597},
  doi          = {10.1504/IJICS.2017.10003597},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZearSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZengCX17,
  author       = {Lei Zeng and
                  Hui Chen and
                  Yang Xiao},
  title        = {Accountable administration in operating systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {157--179},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10005900},
  doi          = {10.1504/IJICS.2017.10005900},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZengCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics