Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn19.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/ChenLOL24,
  author       = {Chia{-}Mei Chen and
                  Ze{-}Yu Lin and
                  Ya{-}Hui Ou and
                  Jiunn{-}Wu Lin},
  title        = {A hybrid malware analysis approach for identifying process-injection
                  malware based on machine learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {20--30},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137312},
  doi          = {10.1504/IJSN.2024.137312},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenLOL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Ganesan24,
  author       = {Sangeetha Ganesan},
  title        = {Enabling secure modern web browsers against cache-based timing attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {43--54},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137330},
  doi          = {10.1504/IJSN.2024.137330},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Ganesan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuZFM24,
  author       = {Yutao Hu and
                  Yuntao Zhao and
                  Yongxin Feng and
                  Xiangyu Ma},
  title        = {OneR-DQN: a botnet traffic detection model based on deep {Q} network
                  algorithm in deep reinforcement learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {31--42},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137334},
  doi          = {10.1504/IJSN.2024.137334},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuJZ24,
  author       = {Huajin Liu and
                  Chunhua Ju and
                  Houyuan Zhang},
  title        = {A social network security user recommendation algorithm based on community
                  user emotions},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {10--19},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137332},
  doi          = {10.1504/IJSN.2024.137332},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuJZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XiongC24,
  author       = {Yang Xiong and
                  Yang Cheng},
  title        = {A new edge weight-based measure for k-shell influential node identification
                  in complex networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {19},
  number       = {1},
  pages        = {1--9},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSN.2024.137331},
  doi          = {10.1504/IJSN.2024.137331},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XiongC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics