Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn9.bht:"
@article{DBLP:journals/ijsn/AhmimG14, author = {Ahmed Ahmim and Nacira Ghoualmi{-}Zine}, title = {A new adaptive intrusion detection system based on the intersection of two different classifiers}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {125--132}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065710}, doi = {10.1504/IJSN.2014.065710}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AhmimG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Al-Salloum14, author = {Ziyad S. Al{-}Salloum}, title = {GeoGraphical passwords}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {56--62}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059330}, doi = {10.1504/IJSN.2014.059330}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Al-Salloum14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AmbikaR14, author = {Nagaraj Ambika and G. T. Raju}, title = {{ECAWSN:} eliminating compromised node with the help of auxiliary nodes in wireless sensor network}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {78--84}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060743}, doi = {10.1504/IJSN.2014.060743}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AmbikaR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BadenhopM14, author = {Christopher W. Badenhop and Barry E. Mullins}, title = {A black hole attack model using topology approximation for reactive ad-hoc routing protocols}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {63--77}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060755}, doi = {10.1504/IJSN.2014.060755}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BadenhopM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChoSL14, author = {Seongsoo Cho and Bhanu Shrestha and Jongsup Lee}, title = {Method of recognising facial image using fuzzy measure}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {185--189}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066188}, doi = {10.1504/IJSN.2014.066188}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChoSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChuangN14, author = {Po{-}Jen Chuang and Ming{-}Yu Ni}, title = {On access control policy assignments and negotiation strategies in automated trust negotiation}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {104--113}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060744}, doi = {10.1504/IJSN.2014.060744}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChuangN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CuiMA14, author = {Hui Cui and Yi Mu and Man Ho Au}, title = {Anonymous broadcast encryption with an untrusted gateway}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {20--29}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059326}, doi = {10.1504/IJSN.2014.059326}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CuiMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FengLM14, author = {Zuhong Feng and Jing Li and Jie Hu Meichsner}, title = {A Bayesian network intrusion detection algorithm based on principal component analysis and sliding window}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {216--221}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066177}, doi = {10.1504/IJSN.2014.066177}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FengLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GroverLG14, author = {Jyoti Grover and Vijay Laxmi and Manoj Singh Gaur}, title = {Sybil attack detection in {VANET} using neighbouring vehicles}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {222--233}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066178}, doi = {10.1504/IJSN.2014.066178}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/GroverLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HagenM14, author = {John T. Hagen and Barry E. Mullins}, title = {Network vulnerability analysis of the Player command and control protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {154--166}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065708}, doi = {10.1504/IJSN.2014.065708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HagenM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HenryM14, author = {Wayne C. Henry and Barry E. Mullins}, title = {{VANISH:} a variable advanced network {IRC} stealth handling system}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {114--123}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060741}, doi = {10.1504/IJSN.2014.060741}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HenryM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Islam14, author = {Salekul Islam}, title = {Security analysis of {LMAP} using {AVISPA}}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {30--39}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059325}, doi = {10.1504/IJSN.2014.059325}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Islam14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KangJKA14, author = {Min Soo Kang and Yong{-}Gyu Jung and Myung Ho Kim and Kichan Ahn}, title = {Development of sensor nodes based on fault tolerance}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {190--196}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066181}, doi = {10.1504/IJSN.2014.066181}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KangJKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KarouiFG14, author = {Kamel Karoui and Fakher Ben Ftima and Henda Ben Gh{\'{e}}zala}, title = {Firewalls anomalies severity evaluation and classification}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {167--176}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065712}, doi = {10.1504/IJSN.2014.065712}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KarouiFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimJ14, author = {Jongdeug Kim and Taehyun Jeon}, title = {Signalling optimisation for VoIP service in All-IP network}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {177--184}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065721}, doi = {10.1504/IJSN.2014.065721}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimJJ14, author = {Hwa{-}seon Kim and Seong{-}Jin Jang and Jong{-}Wook Jang}, title = {Development of the knocking decision system using the {CKP} signal collection and analysis}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {209--215}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066183}, doi = {10.1504/IJSN.2014.066183}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KimLCLK14, author = {Seong{-}Kweon Kim and Kyung{-}Ryang Lee and Jae{-}Sang Cha and Kyoung{-}Kun Lee and Seong{-}Jong Kim}, title = {Implementation of battery inspection system for building energy management system}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {197--201}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066180}, doi = {10.1504/IJSN.2014.066180}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KimLCLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LeeYJ14, author = {Kyungrak Lee and Jaeyoung Yoo and Inwhee Joe}, title = {An environmental transition-aware data transmission scheme with energy efficiency in energy harvesting wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {202--208}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066182}, doi = {10.1504/IJSN.2014.066182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LeeYJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MezzourC14, author = {Ghita Mezzour and Kathleen M. Carley}, title = {Spam diffusion in a social network initiated by hacked e-mail accounts}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {144--153}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065709}, doi = {10.1504/IJSN.2014.065709}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MezzourC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Peng14, author = {Kun Peng}, title = {Assumptions and conditions for mix networks: analysis, clarification and improvement}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {133--143}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065719}, doi = {10.1504/IJSN.2014.065719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Peng14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RangwalaZZL14, author = {Mohammed Rangwala and Ping Zhang and Xukai Zou and Feng Li}, title = {A taxonomy of privilege escalation attacks in Android applications}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {40--55}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059327}, doi = {10.1504/IJSN.2014.059327}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RangwalaZZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SantosNWLW14, author = {Daniel Ricardo dos Santos and Tiago Jaime Nascimento and Carla Merkle Westphall and Marcos Aur{\'{e}}lio Pedroso Leandro and Carlos Becker Westphall}, title = {Privacy-preserving identity federations in the cloud: a proof of concept}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059328}, doi = {10.1504/IJSN.2014.059328}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SantosNWLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SeberryMGW14, author = {Jennifer Seberry and Yi Mu and Fuchun Guo and Tim Wellsmore}, title = {Efficient authentication and integrity protection for the border gateway protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {4}, pages = {234--243}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.066179}, doi = {10.1504/IJSN.2014.066179}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SeberryMGW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SeifiSFB14, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, title = {Security properties analysis in a TPM-based protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {85--103}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060742}, doi = {10.1504/IJSN.2014.060742}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Vajda14, author = {Istv{\'{a}}n Vajda}, title = {A proof technique for security assessment of on-demand ad hoc routing protocols}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {1}, pages = {12--19}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.059329}, doi = {10.1504/IJSN.2014.059329}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Vajda14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.