Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn18.bht:"
@article{DBLP:journals/ijsn/AlbilaliAB23, author = {Amal Abduallah Nasser Albilali and Maysoon F. Abulkhair and Manal Sarhan Bayousef}, title = {An overview of location privacy protection in spatial crowdsourcing platforms during the task assignment process}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {227--244}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135509}, doi = {10.1504/IJSN.2023.135509}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/AlbilaliAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BabikerHMI23, author = {Asaad Balla Babiker and Mohamed Hadi Habaebi and Sinil Mubarak and Md. Rafiqul Islam}, title = {A detailed analysis of public industrial control system datasets}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {245--263}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135511}, doi = {10.1504/IJSN.2023.135511}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/BabikerHMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Chaudhari23, author = {Payal Chaudhari}, title = {Privacy-preserving cost-effective work distribution with fine-grained access control for mobile crowdsensing}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {106--116}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131611}, doi = {10.1504/IJSN.2023.131611}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Chaudhari23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChiniahG23, author = {Aatish Chiniah and Feroz Ghannoo}, title = {A multi-theory model to evaluate new factors influencing information security compliance}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {19--29}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129949}, doi = {10.1504/IJSN.2023.129949}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuJLZ23, author = {Xiaohui Hu and Huiwen Jia and Jingang Liu and Zhiqi Zhao}, title = {Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {213--226}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135516}, doi = {10.1504/IJSN.2023.135516}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/HuJLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Jana23, author = {Angshuman Jana}, title = {Sensitive information leakage analysis of database code by abstract interpretation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {91--105}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131599}, doi = {10.1504/IJSN.2023.131599}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Jana23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Jiang23, author = {Xiaoyu Jiang}, title = {Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {165--174}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134134}, doi = {10.1504/IJSN.2023.134134}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Jiang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JiangW23, author = {Suhan Jiang and Jie Wu}, title = {A blockchain-based {NFV} market in the multi-node edge computing network}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {52--64}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129943}, doi = {10.1504/IJSN.2023.129943}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JiangW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NiknamiW23, author = {Nadia Niknami and Jie Wu}, title = {{MB-CIM:} a multi-round budgeted competitive influence maximisation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {30--41}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129896}, doi = {10.1504/IJSN.2023.129896}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/NiknamiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QianW23, author = {Jun Qian and Yubao Wu}, title = {Moving object location prediction based on a graph neural network with temporal attention}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {153--164}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134133}, doi = {10.1504/IJSN.2023.134133}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/QianW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/QiuZW23, author = {Mingyue Qiu and Xueying Zhang and Xinmeng Wang}, title = {An ex-convict recognition method based on text mining}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {10--18}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129905}, doi = {10.1504/IJSN.2023.129905}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/QiuZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SaadSS23, author = {Redhwan M. A. Saad and Khaled A. M. Al Soufy and Samir I. Shaheen}, title = {Security in smart home environment: issues, challenges, and countermeasures - a survey}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129887}, doi = {10.1504/IJSN.2023.129887}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Shi23, author = {Wuchao Shi}, title = {Research on system safety in the case of component failure based on degree correlation}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {65--74}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131585}, doi = {10.1504/IJSN.2023.131585}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Shi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SubrahmanyamRR23, author = {Rolla Subrahmanyam and N. Rukma Rekha and Y. V. Subba Rao}, title = {Multi-group key agreement protocol using secret sharing scheme}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {143--152}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134119}, doi = {10.1504/IJSN.2023.134119}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SubrahmanyamRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangG23, author = {Yixuan Wang and Xian Guo}, title = {{CPPABK:} conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {4}, pages = {199--212}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.135510}, doi = {10.1504/IJSN.2023.135510}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WangG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangZZG23, author = {Chao Wang and Hongwei Zhang and Jinrui Zhang and Lichuan Gu}, title = {Multi-modal rumour detection using bilinear pooling and domain adversarial neural networks}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {175--188}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134116}, doi = {10.1504/IJSN.2023.134116}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/WangZZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanHMSDX23, author = {Yan Yan and Eyeleko Anselme Herman and Adnan Mahmood and Zichao Sun and Zhuoyue Dong and Fei Xu}, title = {Privacy preserving dynamic data release based on non-synonymous diverse anatomy}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {75--90}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131595}, doi = {10.1504/IJSN.2023.131595}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanHMSDX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YanZLQW23, author = {Hao Yan and Zheng Zhang and Yanan Liu and Shuo Qiu and Qiuling Wu}, title = {Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {125--132}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131610}, doi = {10.1504/IJSN.2023.131610}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangFZ23, author = {Yudi Zhang and Yongxin Feng and Yuntao Zhao}, title = {MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising {LSTM} trainable parameters}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {133--142}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134131}, doi = {10.1504/IJSN.2023.134131}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangYSLG23, author = {Hehui Zhang and Yong Yang and Xi Song and Wenhui Li and Shuqiang Guo}, title = {An abnormal intrusion detection method based on self-organising model}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {117--124}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131598}, doi = {10.1504/IJSN.2023.131598}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhouSYG23, author = {Changsong Zhou and Guozi Sun and Xuan You and Yu Gu}, title = {A slice-based encryption scheme for {IPFS}}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {1}, pages = {42--51}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.129898}, doi = {10.1504/IJSN.2023.129898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhouSYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuDMS23, author = {Dexin Zhu and Xiaogang Du and Jigui Mao and Lijun Song}, title = {A security control scheme based on quantum keys for IoT terminals}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {3}, pages = {189--198}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.134123}, doi = {10.1504/IJSN.2023.134123}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.