Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn9.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AhmimG14,
  author       = {Ahmed Ahmim and
                  Nacira Ghoualmi{-}Zine},
  title        = {A new adaptive intrusion detection system based on the intersection
                  of two different classifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {125--132},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065710},
  doi          = {10.1504/IJSN.2014.065710},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AhmimG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Al-Salloum14,
  author       = {Ziyad S. Al{-}Salloum},
  title        = {GeoGraphical passwords},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {56--62},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059330},
  doi          = {10.1504/IJSN.2014.059330},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Al-Salloum14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AmbikaR14,
  author       = {Nagaraj Ambika and
                  G. T. Raju},
  title        = {{ECAWSN:} eliminating compromised node with the help of auxiliary
                  nodes in wireless sensor network},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {78--84},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060743},
  doi          = {10.1504/IJSN.2014.060743},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AmbikaR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BadenhopM14,
  author       = {Christopher W. Badenhop and
                  Barry E. Mullins},
  title        = {A black hole attack model using topology approximation for reactive
                  ad-hoc routing protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {63--77},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060755},
  doi          = {10.1504/IJSN.2014.060755},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BadenhopM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChoSL14,
  author       = {Seongsoo Cho and
                  Bhanu Shrestha and
                  Jongsup Lee},
  title        = {Method of recognising facial image using fuzzy measure},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {185--189},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066188},
  doi          = {10.1504/IJSN.2014.066188},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChoSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChuangN14,
  author       = {Po{-}Jen Chuang and
                  Ming{-}Yu Ni},
  title        = {On access control policy assignments and negotiation strategies in
                  automated trust negotiation},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {104--113},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060744},
  doi          = {10.1504/IJSN.2014.060744},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChuangN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CuiMA14,
  author       = {Hui Cui and
                  Yi Mu and
                  Man Ho Au},
  title        = {Anonymous broadcast encryption with an untrusted gateway},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {20--29},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059326},
  doi          = {10.1504/IJSN.2014.059326},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CuiMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FengLM14,
  author       = {Zuhong Feng and
                  Jing Li and
                  Jie Hu Meichsner},
  title        = {A Bayesian network intrusion detection algorithm based on principal
                  component analysis and sliding window},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {216--221},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066177},
  doi          = {10.1504/IJSN.2014.066177},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FengLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GroverLG14,
  author       = {Jyoti Grover and
                  Vijay Laxmi and
                  Manoj Singh Gaur},
  title        = {Sybil attack detection in {VANET} using neighbouring vehicles},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {222--233},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066178},
  doi          = {10.1504/IJSN.2014.066178},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GroverLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HagenM14,
  author       = {John T. Hagen and
                  Barry E. Mullins},
  title        = {Network vulnerability analysis of the Player command and control protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {154--166},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065708},
  doi          = {10.1504/IJSN.2014.065708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HagenM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HenryM14,
  author       = {Wayne C. Henry and
                  Barry E. Mullins},
  title        = {{VANISH:} a variable advanced network {IRC} stealth handling system},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {114--123},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060741},
  doi          = {10.1504/IJSN.2014.060741},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HenryM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Islam14,
  author       = {Salekul Islam},
  title        = {Security analysis of {LMAP} using {AVISPA}},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {30--39},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059325},
  doi          = {10.1504/IJSN.2014.059325},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Islam14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KangJKA14,
  author       = {Min Soo Kang and
                  Yong{-}Gyu Jung and
                  Myung Ho Kim and
                  Kichan Ahn},
  title        = {Development of sensor nodes based on fault tolerance},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {190--196},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066181},
  doi          = {10.1504/IJSN.2014.066181},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KangJKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KarouiFG14,
  author       = {Kamel Karoui and
                  Fakher Ben Ftima and
                  Henda Ben Gh{\'{e}}zala},
  title        = {Firewalls anomalies severity evaluation and classification},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {167--176},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065712},
  doi          = {10.1504/IJSN.2014.065712},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KarouiFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimJ14,
  author       = {Jongdeug Kim and
                  Taehyun Jeon},
  title        = {Signalling optimisation for VoIP service in All-IP network},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {177--184},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065721},
  doi          = {10.1504/IJSN.2014.065721},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimJJ14,
  author       = {Hwa{-}seon Kim and
                  Seong{-}Jin Jang and
                  Jong{-}Wook Jang},
  title        = {Development of the knocking decision system using the {CKP} signal
                  collection and analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {209--215},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066183},
  doi          = {10.1504/IJSN.2014.066183},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KimLCLK14,
  author       = {Seong{-}Kweon Kim and
                  Kyung{-}Ryang Lee and
                  Jae{-}Sang Cha and
                  Kyoung{-}Kun Lee and
                  Seong{-}Jong Kim},
  title        = {Implementation of battery inspection system for building energy management
                  system},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {197--201},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066180},
  doi          = {10.1504/IJSN.2014.066180},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KimLCLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LeeYJ14,
  author       = {Kyungrak Lee and
                  Jaeyoung Yoo and
                  Inwhee Joe},
  title        = {An environmental transition-aware data transmission scheme with energy
                  efficiency in energy harvesting wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {202--208},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066182},
  doi          = {10.1504/IJSN.2014.066182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LeeYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MezzourC14,
  author       = {Ghita Mezzour and
                  Kathleen M. Carley},
  title        = {Spam diffusion in a social network initiated by hacked e-mail accounts},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {144--153},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065709},
  doi          = {10.1504/IJSN.2014.065709},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MezzourC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Peng14,
  author       = {Kun Peng},
  title        = {Assumptions and conditions for mix networks: analysis, clarification
                  and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {133--143},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065719},
  doi          = {10.1504/IJSN.2014.065719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Peng14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RangwalaZZL14,
  author       = {Mohammed Rangwala and
                  Ping Zhang and
                  Xukai Zou and
                  Feng Li},
  title        = {A taxonomy of privilege escalation attacks in Android applications},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {40--55},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059327},
  doi          = {10.1504/IJSN.2014.059327},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RangwalaZZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SantosNWLW14,
  author       = {Daniel Ricardo dos Santos and
                  Tiago Jaime Nascimento and
                  Carla Merkle Westphall and
                  Marcos Aur{\'{e}}lio Pedroso Leandro and
                  Carlos Becker Westphall},
  title        = {Privacy-preserving identity federations in the cloud: a proof of concept},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059328},
  doi          = {10.1504/IJSN.2014.059328},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SantosNWLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SeberryMGW14,
  author       = {Jennifer Seberry and
                  Yi Mu and
                  Fuchun Guo and
                  Tim Wellsmore},
  title        = {Efficient authentication and integrity protection for the border gateway
                  protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {4},
  pages        = {234--243},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.066179},
  doi          = {10.1504/IJSN.2014.066179},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SeberryMGW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SeifiSFB14,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  title        = {Security properties analysis in a TPM-based protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {85--103},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060742},
  doi          = {10.1504/IJSN.2014.060742},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Vajda14,
  author       = {Istv{\'{a}}n Vajda},
  title        = {A proof technique for security assessment of on-demand ad hoc routing
                  protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {1},
  pages        = {12--19},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.059329},
  doi          = {10.1504/IJSN.2014.059329},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Vajda14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics