Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn19.bht:"
@article{DBLP:journals/ijsn/ChenLOL24, author = {Chia{-}Mei Chen and Ze{-}Yu Lin and Ya{-}Hui Ou and Jiunn{-}Wu Lin}, title = {A hybrid malware analysis approach for identifying process-injection malware based on machine learning}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {20--30}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137312}, doi = {10.1504/IJSN.2024.137312}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenLOL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Ganesan24, author = {Sangeetha Ganesan}, title = {Enabling secure modern web browsers against cache-based timing attacks}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {43--54}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137330}, doi = {10.1504/IJSN.2024.137330}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Ganesan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuZFM24, author = {Yutao Hu and Yuntao Zhao and Yongxin Feng and Xiangyu Ma}, title = {OneR-DQN: a botnet traffic detection model based on deep {Q} network algorithm in deep reinforcement learning}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {31--42}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137334}, doi = {10.1504/IJSN.2024.137334}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuJZ24, author = {Huajin Liu and Chunhua Ju and Houyuan Zhang}, title = {A social network security user recommendation algorithm based on community user emotions}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {10--19}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137332}, doi = {10.1504/IJSN.2024.137332}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XiongC24, author = {Yang Xiong and Yang Cheng}, title = {A new edge weight-based measure for k-shell influential node identification in complex networks}, journal = {Int. J. Secur. Networks}, volume = {19}, number = {1}, pages = {1--9}, year = {2024}, url = {https://doi.org/10.1504/IJSN.2024.137331}, doi = {10.1504/IJSN.2024.137331}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XiongC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.