Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn12.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/Abdulla17,
  author       = {Shubair A. Abdulla},
  title        = {Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {83--102},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004577},
  doi          = {10.1504/IJSN.2017.10004577},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Abdulla17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CharalampidouPM17,
  author       = {Maria Charalampidou and
                  George Pavlidis and
                  Spyridon G. Mouroutsos},
  title        = {A novel modular wireless sensor networks approach for security applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {40--50},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001807},
  doi          = {10.1504/IJSN.2017.10001807},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CharalampidouPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChatterjeeK17,
  author       = {Sumanta Chatterjee and
                  Shashidhar G. Koolagudi},
  title        = {Hierarchical secret sharing scheme using parts of speech of English
                  grammar},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {241--254},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009161},
  doi          = {10.1504/IJSN.2017.10009161},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChatterjeeK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenYW17,
  author       = {Yingjie Victor Chen and
                  Baijian Yang and
                  Weijie Wang},
  title        = {NetFlowMatrix: a visual approach for analysing large NetFlow data},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {215--229},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009154},
  doi          = {10.1504/IJSN.2017.10009154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenZMXH17,
  author       = {Li Jian Chen and
                  Wei Yuan Zhou and
                  Keji Mao and
                  Ming Xia and
                  Ruohong Huan},
  title        = {A beacon-free localisation algorithm in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {56--63},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001809},
  doi          = {10.1504/IJSN.2017.10001809},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenZMXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DengZH17,
  author       = {Xiaojun Deng and
                  Tao Zhang and
                  Xunyu He},
  title        = {Finishing the tiny flows quickly for common data centre services},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {112--119},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004582},
  doi          = {10.1504/IJSN.2017.10004582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DengZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GhasemiE17,
  author       = {Jamal Ghasemi and
                  Jamal Esmaily},
  title        = {Intrusion detection systems using a hybrid SVD-based feature extraction
                  method},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {230--240},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009160},
  doi          = {10.1504/IJSN.2017.10009160},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GhasemiE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KaurDS17,
  author       = {Gurdip Kaur and
                  Renu Dhir and
                  Maninder Singh},
  title        = {Anatomy of ransomware malware: detection, analysis and reporting},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {188--197},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005218},
  doi          = {10.1504/IJSN.2017.10005218},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KaurDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KoDLT17,
  author       = {Li Ling Ko and
                  Dinil Mon Divakaran and
                  Yung Siang Liau and
                  Vrizlynn L. L. Thing},
  title        = {Insider threat detection and its future directions},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {168--187},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005217},
  doi          = {10.1504/IJSN.2017.10005217},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KoDLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiLZ17,
  author       = {BaoHong Li and
                  Baojun Li and
                  Yinliang Zhao},
  title        = {Generic construction of role-based encryption in the standard model},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {198--205},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005219},
  doi          = {10.1504/IJSN.2017.10005219},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuWW17,
  author       = {ZhiQiang Liu and
                  Tong Wang and
                  Xibo Wang},
  title        = {Destination unaware geometric routing for delay tolerant networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {103--111},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004581},
  doi          = {10.1504/IJSN.2017.10004581},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MakkarTVAS17,
  author       = {Ismeet Kaur Makkar and
                  Fabio Di Troia and
                  Corrado Aaron Visaggio and
                  Thomas H. Austin and
                  Mark Stamp},
  title        = {SocioBot: a Twitter-based botnet},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {1--12},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001803},
  doi          = {10.1504/IJSN.2017.10001803},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MakkarTVAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ManPML17,
  author       = {Junfeng Man and
                  Cheng Peng and
                  Yinghui Ma and
                  Changyun Li},
  title        = {The network software multistep control algorithm based on {NNVD} research},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {65--69},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004573},
  doi          = {10.1504/IJSN.2017.10004573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ManPML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PengZPM17,
  author       = {Cheng Peng and
                  Canqing Zhang and
                  Cheng Peng and
                  Junfeng Man},
  title        = {A reinforcement learning approach to map reduce auto-configuration
                  under networked environment},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {135--140},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005214},
  doi          = {10.1504/IJSN.2017.10005214},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PengZPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QassimZA17,
  author       = {Qais Qassim and
                  Abdullah Mohd Zin and
                  Mohd Juzaiddin Ab Aziz},
  title        = {Anomaly-based network {IDS} false alarm filter using cluster-based
                  alarm classification approach},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {13--26},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001805},
  doi          = {10.1504/IJSN.2017.10001805},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QassimZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RuanZ17,
  author       = {Yefeng Ruan and
                  Xukai Zou},
  title        = {Receipt-freeness and coercion resistance in remote E-voting systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {120--133},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004583},
  doi          = {10.1504/IJSN.2017.10004583},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RuanZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Shen17,
  author       = {Yuxia Shen},
  title        = {Distributed storage system model design in internet of things based
                  on hash distribution},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {141--151},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005215},
  doi          = {10.1504/IJSN.2017.10005215},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Shen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanWS17,
  author       = {Avinash Srinivasan and
                  Jie Wu and
                  Justin Y. Shi},
  title        = {Secure android covert channel with robust survivability to service
                  provider restrictions},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {27--39},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001806},
  doi          = {10.1504/IJSN.2017.10001806},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/VelascoR17,
  author       = {Danny Velasco and
                  Glen Dario Rodriguez Rafael},
  title        = {A review of the current state of Honeynet architectures and tools},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {255--272},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009165},
  doi          = {10.1504/IJSN.2017.10009165},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/VelascoR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WeiLMLX17,
  author       = {Zhenhua Wei and
                  Zhifeng Liu and
                  Jie Miao and
                  Lihua Li and
                  Wei Xu},
  title        = {Configurable workflow platform based on SaaS model},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {4},
  pages        = {207--214},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10009153},
  doi          = {10.1504/IJSN.2017.10009153},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WeiLMLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WenDS17,
  author       = {Chuah Chai Wen and
                  Ed Dawson and
                  Leonie Simpson},
  title        = {Stream cipher based key derivation function},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {2},
  pages        = {70--82},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10004574},
  doi          = {10.1504/IJSN.2017.10004574},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WenDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Zheng17,
  author       = {Guangcheng Zheng},
  title        = {Optimisation methods for performance of communication interaction
                  based on cooperative vehicle infrastructure system},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {3},
  pages        = {152--167},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10005216},
  doi          = {10.1504/IJSN.2017.10005216},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Zheng17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouCMXH17,
  author       = {Wei Yuan Zhou and
                  Li Jian Chen and
                  Keji Mao and
                  Ming Xia and
                  Ruohong Huan},
  title        = {A RFID-based prisoner localisation system},
  journal      = {Int. J. Secur. Networks},
  volume       = {12},
  number       = {1},
  pages        = {51--55},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJSN.2017.10001808},
  doi          = {10.1504/IJSN.2017.10001808},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouCMXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics