Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn12.bht:"
@article{DBLP:journals/ijsn/Abdulla17, author = {Shubair A. Abdulla}, title = {Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {83--102}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004577}, doi = {10.1504/IJSN.2017.10004577}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Abdulla17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CharalampidouPM17, author = {Maria Charalampidou and George Pavlidis and Spyridon G. Mouroutsos}, title = {A novel modular wireless sensor networks approach for security applications}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {40--50}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001807}, doi = {10.1504/IJSN.2017.10001807}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CharalampidouPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChatterjeeK17, author = {Sumanta Chatterjee and Shashidhar G. Koolagudi}, title = {Hierarchical secret sharing scheme using parts of speech of English grammar}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {241--254}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009161}, doi = {10.1504/IJSN.2017.10009161}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChatterjeeK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenYW17, author = {Yingjie Victor Chen and Baijian Yang and Weijie Wang}, title = {NetFlowMatrix: a visual approach for analysing large NetFlow data}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {215--229}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009154}, doi = {10.1504/IJSN.2017.10009154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenZMXH17, author = {Li Jian Chen and Wei Yuan Zhou and Keji Mao and Ming Xia and Ruohong Huan}, title = {A beacon-free localisation algorithm in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {56--63}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001809}, doi = {10.1504/IJSN.2017.10001809}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenZMXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DengZH17, author = {Xiaojun Deng and Tao Zhang and Xunyu He}, title = {Finishing the tiny flows quickly for common data centre services}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {112--119}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004582}, doi = {10.1504/IJSN.2017.10004582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DengZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GhasemiE17, author = {Jamal Ghasemi and Jamal Esmaily}, title = {Intrusion detection systems using a hybrid SVD-based feature extraction method}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {230--240}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009160}, doi = {10.1504/IJSN.2017.10009160}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GhasemiE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KaurDS17, author = {Gurdip Kaur and Renu Dhir and Maninder Singh}, title = {Anatomy of ransomware malware: detection, analysis and reporting}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {188--197}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005218}, doi = {10.1504/IJSN.2017.10005218}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KaurDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KoDLT17, author = {Li Ling Ko and Dinil Mon Divakaran and Yung Siang Liau and Vrizlynn L. L. Thing}, title = {Insider threat detection and its future directions}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {168--187}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005217}, doi = {10.1504/IJSN.2017.10005217}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KoDLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiLZ17, author = {BaoHong Li and Baojun Li and Yinliang Zhao}, title = {Generic construction of role-based encryption in the standard model}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {198--205}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005219}, doi = {10.1504/IJSN.2017.10005219}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuWW17, author = {ZhiQiang Liu and Tong Wang and Xibo Wang}, title = {Destination unaware geometric routing for delay tolerant networks}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {103--111}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004581}, doi = {10.1504/IJSN.2017.10004581}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MakkarTVAS17, author = {Ismeet Kaur Makkar and Fabio Di Troia and Corrado Aaron Visaggio and Thomas H. Austin and Mark Stamp}, title = {SocioBot: a Twitter-based botnet}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {1--12}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001803}, doi = {10.1504/IJSN.2017.10001803}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MakkarTVAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ManPML17, author = {Junfeng Man and Cheng Peng and Yinghui Ma and Changyun Li}, title = {The network software multistep control algorithm based on {NNVD} research}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {65--69}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004573}, doi = {10.1504/IJSN.2017.10004573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ManPML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PengZPM17, author = {Cheng Peng and Canqing Zhang and Cheng Peng and Junfeng Man}, title = {A reinforcement learning approach to map reduce auto-configuration under networked environment}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {135--140}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005214}, doi = {10.1504/IJSN.2017.10005214}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PengZPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QassimZA17, author = {Qais Qassim and Abdullah Mohd Zin and Mohd Juzaiddin Ab Aziz}, title = {Anomaly-based network {IDS} false alarm filter using cluster-based alarm classification approach}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {13--26}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001805}, doi = {10.1504/IJSN.2017.10001805}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QassimZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RuanZ17, author = {Yefeng Ruan and Xukai Zou}, title = {Receipt-freeness and coercion resistance in remote E-voting systems}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {120--133}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004583}, doi = {10.1504/IJSN.2017.10004583}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RuanZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Shen17, author = {Yuxia Shen}, title = {Distributed storage system model design in internet of things based on hash distribution}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {141--151}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005215}, doi = {10.1504/IJSN.2017.10005215}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Shen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanWS17, author = {Avinash Srinivasan and Jie Wu and Justin Y. Shi}, title = {Secure android covert channel with robust survivability to service provider restrictions}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {27--39}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001806}, doi = {10.1504/IJSN.2017.10001806}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/VelascoR17, author = {Danny Velasco and Glen Dario Rodriguez Rafael}, title = {A review of the current state of Honeynet architectures and tools}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {255--272}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009165}, doi = {10.1504/IJSN.2017.10009165}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/VelascoR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WeiLMLX17, author = {Zhenhua Wei and Zhifeng Liu and Jie Miao and Lihua Li and Wei Xu}, title = {Configurable workflow platform based on SaaS model}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {4}, pages = {207--214}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10009153}, doi = {10.1504/IJSN.2017.10009153}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WeiLMLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WenDS17, author = {Chuah Chai Wen and Ed Dawson and Leonie Simpson}, title = {Stream cipher based key derivation function}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {2}, pages = {70--82}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10004574}, doi = {10.1504/IJSN.2017.10004574}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WenDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Zheng17, author = {Guangcheng Zheng}, title = {Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {3}, pages = {152--167}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10005216}, doi = {10.1504/IJSN.2017.10005216}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Zheng17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouCMXH17, author = {Wei Yuan Zhou and Li Jian Chen and Keji Mao and Ming Xia and Ruohong Huan}, title = {A RFID-based prisoner localisation system}, journal = {Int. J. Secur. Networks}, volume = {12}, number = {1}, pages = {51--55}, year = {2017}, url = {https://doi.org/10.1504/IJSN.2017.10001808}, doi = {10.1504/IJSN.2017.10001808}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouCMXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.