Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn18.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AlbilaliAB23,
  author       = {Amal Abduallah Nasser Albilali and
                  Maysoon F. Abulkhair and
                  Manal Sarhan Bayousef},
  title        = {An overview of location privacy protection in spatial crowdsourcing
                  platforms during the task assignment process},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {227--244},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135509},
  doi          = {10.1504/IJSN.2023.135509},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/AlbilaliAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BabikerHMI23,
  author       = {Asaad Balla Babiker and
                  Mohamed Hadi Habaebi and
                  Sinil Mubarak and
                  Md. Rafiqul Islam},
  title        = {A detailed analysis of public industrial control system datasets},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {245--263},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135511},
  doi          = {10.1504/IJSN.2023.135511},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/BabikerHMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Chaudhari23,
  author       = {Payal Chaudhari},
  title        = {Privacy-preserving cost-effective work distribution with fine-grained
                  access control for mobile crowdsensing},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {106--116},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131611},
  doi          = {10.1504/IJSN.2023.131611},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Chaudhari23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChiniahG23,
  author       = {Aatish Chiniah and
                  Feroz Ghannoo},
  title        = {A multi-theory model to evaluate new factors influencing information
                  security compliance},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {19--29},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129949},
  doi          = {10.1504/IJSN.2023.129949},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChiniahG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuJLZ23,
  author       = {Xiaohui Hu and
                  Huiwen Jia and
                  Jingang Liu and
                  Zhiqi Zhao},
  title        = {Efficient identity-based ring identification scheme and identity-based
                  ring signature scheme on lattices},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {213--226},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135516},
  doi          = {10.1504/IJSN.2023.135516},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuJLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Jana23,
  author       = {Angshuman Jana},
  title        = {Sensitive information leakage analysis of database code by abstract
                  interpretation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {91--105},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131599},
  doi          = {10.1504/IJSN.2023.131599},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Jana23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Jiang23,
  author       = {Xiaoyu Jiang},
  title        = {Adaptive fault diagnosis model for high-speed railway turnout using
                  deep convolutional neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {165--174},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134134},
  doi          = {10.1504/IJSN.2023.134134},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Jiang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JiangW23,
  author       = {Suhan Jiang and
                  Jie Wu},
  title        = {A blockchain-based {NFV} market in the multi-node edge computing network},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {52--64},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129943},
  doi          = {10.1504/IJSN.2023.129943},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JiangW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NiknamiW23,
  author       = {Nadia Niknami and
                  Jie Wu},
  title        = {{MB-CIM:} a multi-round budgeted competitive influence maximisation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {30--41},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129896},
  doi          = {10.1504/IJSN.2023.129896},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/NiknamiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QianW23,
  author       = {Jun Qian and
                  Yubao Wu},
  title        = {Moving object location prediction based on a graph neural network
                  with temporal attention},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {153--164},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134133},
  doi          = {10.1504/IJSN.2023.134133},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/QianW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/QiuZW23,
  author       = {Mingyue Qiu and
                  Xueying Zhang and
                  Xinmeng Wang},
  title        = {An ex-convict recognition method based on text mining},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {10--18},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129905},
  doi          = {10.1504/IJSN.2023.129905},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/QiuZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SaadSS23,
  author       = {Redhwan M. A. Saad and
                  Khaled A. M. Al Soufy and
                  Samir I. Shaheen},
  title        = {Security in smart home environment: issues, challenges, and countermeasures
                  - a survey},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129887},
  doi          = {10.1504/IJSN.2023.129887},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SaadSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Shi23,
  author       = {Wuchao Shi},
  title        = {Research on system safety in the case of component failure based on
                  degree correlation},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {65--74},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131585},
  doi          = {10.1504/IJSN.2023.131585},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Shi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SubrahmanyamRR23,
  author       = {Rolla Subrahmanyam and
                  N. Rukma Rekha and
                  Y. V. Subba Rao},
  title        = {Multi-group key agreement protocol using secret sharing scheme},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {143--152},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134119},
  doi          = {10.1504/IJSN.2023.134119},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SubrahmanyamRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangG23,
  author       = {Yixuan Wang and
                  Xian Guo},
  title        = {{CPPABK:} conditional privacy-preserving authentication scheme for
                  VANETs based on the key derivation algorithm},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {4},
  pages        = {199--212},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.135510},
  doi          = {10.1504/IJSN.2023.135510},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangZZG23,
  author       = {Chao Wang and
                  Hongwei Zhang and
                  Jinrui Zhang and
                  Lichuan Gu},
  title        = {Multi-modal rumour detection using bilinear pooling and domain adversarial
                  neural networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {175--188},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134116},
  doi          = {10.1504/IJSN.2023.134116},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangZZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanHMSDX23,
  author       = {Yan Yan and
                  Eyeleko Anselme Herman and
                  Adnan Mahmood and
                  Zichao Sun and
                  Zhuoyue Dong and
                  Fei Xu},
  title        = {Privacy preserving dynamic data release based on non-synonymous diverse
                  anatomy},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {75--90},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131595},
  doi          = {10.1504/IJSN.2023.131595},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanHMSDX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YanZLQW23,
  author       = {Hao Yan and
                  Zheng Zhang and
                  Yanan Liu and
                  Shuo Qiu and
                  Qiuling Wu},
  title        = {Comments on a dynamic cloud data integrity verification scheme: security
                  analysis and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {125--132},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131610},
  doi          = {10.1504/IJSN.2023.131610},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YanZLQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangFZ23,
  author       = {Yudi Zhang and
                  Yongxin Feng and
                  Yuntao Zhao},
  title        = {MalGA-LSTM: a malicious code detection model based on genetic algorithm
                  optimising {LSTM} trainable parameters},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {133--142},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134131},
  doi          = {10.1504/IJSN.2023.134131},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangYSLG23,
  author       = {Hehui Zhang and
                  Yong Yang and
                  Xi Song and
                  Wenhui Li and
                  Shuqiang Guo},
  title        = {An abnormal intrusion detection method based on self-organising model},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {117--124},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131598},
  doi          = {10.1504/IJSN.2023.131598},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhouSYG23,
  author       = {Changsong Zhou and
                  Guozi Sun and
                  Xuan You and
                  Yu Gu},
  title        = {A slice-based encryption scheme for {IPFS}},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {1},
  pages        = {42--51},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.129898},
  doi          = {10.1504/IJSN.2023.129898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhouSYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuDMS23,
  author       = {Dexin Zhu and
                  Xiaogang Du and
                  Jigui Mao and
                  Lijun Song},
  title        = {A security control scheme based on quantum keys for IoT terminals},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {3},
  pages        = {189--198},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.134123},
  doi          = {10.1504/IJSN.2023.134123},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuDMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics