Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp19.bht:"
@article{DBLP:journals/isjgp/AdaneS10, author = {Dattatraya S. Adane and S. R. Sathe}, title = {A Security Model for Securing Data in Multiagent Applications}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {1}, pages = {11--21}, year = {2010}, url = {https://doi.org/10.1080/19393550903534088}, doi = {10.1080/19393550903534088}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AdaneS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ArunmozhiV10, author = {S. A. Arunmozhi and Y. Venkataramani}, title = {A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {263--272}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514651}, doi = {10.1080/19393555.2010.514651}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ArunmozhiV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Atyam10, author = {Satyanandan B. Atyam}, title = {Effectiveness of Security Control Risk Assessments for Enterprises: Assess on the Business Perspective of Security Risks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {343--350}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514892}, doi = {10.1080/19393555.2010.514892}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Atyam10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Beghdad10, author = {Rachid Beghdad}, title = {Critical Study of Supervised Learning Techniques in Predicting Attacks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {1}, pages = {22--35}, year = {2010}, url = {https://doi.org/10.1080/19393550903551231}, doi = {10.1080/19393550903551231}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Beghdad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Chasser10, author = {John Mark Chasser}, title = {Security Concerns in IPv6 and Transition Networks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {282--293}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514653}, doi = {10.1080/19393555.2010.514653}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Chasser10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Edge10, author = {Irene E. Edge}, title = {Employ Five Fundamental Principles to Produce a SOLID, Secure Network}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {153--159}, year = {2010}, url = {https://doi.org/10.1080/19393551003649008}, doi = {10.1080/19393551003649008}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Edge10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Farrell10, author = {Rhonda Farrell}, title = {Securing the Cloud - Governance, Risk, and Compliance Issues Reign Supreme}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {310--319}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514655}, doi = {10.1080/19393555.2010.514655}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Farrell10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Fournaris10, author = {Apostolos P. Fournaris}, title = {Trust Ensuring Crisis Management Hardware Module}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {74--83}, year = {2010}, url = {https://doi.org/10.1080/19393550903404910}, doi = {10.1080/19393550903404910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Fournaris10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Gikas10, author = {Constantine Gikas}, title = {A General Comparison of FISMA, HIPAA, {ISO} 27000 and {PCI-DSS} Standards}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {132--141}, year = {2010}, url = {https://doi.org/10.1080/19393551003657019}, doi = {10.1080/19393551003657019}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Gikas10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GogolinJ10, author = {Greg Gogolin and James Jones}, title = {Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {109--117}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.483931}, doi = {10.1080/19393555.2010.483931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GogolinJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GuptaA10, author = {Ankur Gupta and Lalit Kumar Awasthi}, title = {A Containment-Based Security Model for Cycle-Stealing {P2P} Applications}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {191--203}, year = {2010}, url = {https://doi.org/10.1080/19393551003762207}, doi = {10.1080/19393551003762207}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/GuptaA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GuptaGGGGS10, author = {Anand Gupta and Shyam K. Gupta and Isha Manu Ganesh and Pankhuri Gupta and Vikram Goyal and Sangeeta Sabharwal}, title = {Opaqueness Characteristic of a Context Honeypot System}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {142--152}, year = {2010}, url = {https://doi.org/10.1080/19393550903532561}, doi = {10.1080/19393550903532561}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/GuptaGGGGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hanny10, author = {Jonathan Hanny}, title = {Building an Application Security Program}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {336--342}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514891}, doi = {10.1080/19393555.2010.514891}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Hanny10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JulischH10, author = {Klaus Julisch and Michael Hall}, title = {Security and Control in the Cloud}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {299--309}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514654}, doi = {10.1080/19393555.2010.514654}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/JulischH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Kadam10, author = {Avinash W. Kadam}, title = {Personal Business Continuity Planning}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {1}, pages = {4--10}, year = {2010}, url = {https://doi.org/10.1080/19393550903577657}, doi = {10.1080/19393550903577657}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Kadam10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KumarM10, author = {Vinay Kumar and Sunil Kumar Muttoo}, title = {Graph Theoretic Approach to Steganography to Secure Message Digest}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {328--335}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514890}, doi = {10.1080/19393555.2010.514890}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/KumarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Li10, author = {Xi Li}, title = {How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in {NP}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {160--174}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.483930}, doi = {10.1080/19393555.2010.483930}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Li10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ManesD10, author = {Gavin Wylie Manes and Elizabeth Downing}, title = {What Security Professionals Need to Know About Digital Evidence}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {124--131}, year = {2010}, url = {https://doi.org/10.1080/19393550903200466}, doi = {10.1080/19393550903200466}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ManesD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Marie10, author = {Michael Ste. Marie}, title = {Do You Have a Disaster Recovery Plan?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1080/19393550903317088}, doi = {10.1080/19393550903317088}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Marie10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Matthews10, author = {David R. Matthews}, title = {eDiscovery versus Computer Forensics}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {3}, pages = {118--123}, year = {2010}, url = {https://doi.org/10.1080/19393550903074135}, doi = {10.1080/19393550903074135}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Matthews10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MishraC10, author = {Durgesh Kumar Mishra and Manohar Chandwani}, title = {A Secured MultiParty Computational Protocol to Protect Cyber Space}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {175--181}, year = {2010}, url = {https://doi.org/10.1080/19393550903532553}, doi = {10.1080/19393550903532553}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MishraC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Mocanu10, author = {Virgil Mocanu}, title = {Requirements for Security Enhancements to Legacy Software with {RUP}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {226--236}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.483929}, doi = {10.1080/19393555.2010.483929}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Mocanu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Orakwue10, author = {Enuma Orakwue}, title = {Private Clouds: Secure Managed Services}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {295--298}, year = {2010}, url = {https://doi.org/10.1080/19393550903482924}, doi = {10.1080/19393550903482924}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Orakwue10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PengZ10, author = {Jin Peng and Xin Zhao}, title = {SSH-Based Device Identity and Trust Initialization}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {237--242}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.493598}, doi = {10.1080/19393555.2010.493598}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/PengZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Poore10, author = {Ralph Spencer Poore}, title = {Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {51--52}, year = {2010}, url = {https://doi.org/10.1080/19393551003796015}, doi = {10.1080/19393551003796015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Poore10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Price10, author = {Sean Price}, title = {A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security Policy}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {100--108}, year = {2010}, url = {https://doi.org/10.1080/19393550903375953}, doi = {10.1080/19393550903375953}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Price10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RodaL10, author = {Fernando Roda and Luis Lara}, title = {Chaotic Cipher Using the Duffing Equation}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {6}, pages = {320--327}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514889}, doi = {10.1080/19393555.2010.514889}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/RodaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sanders10, author = {Aaron D. Sanders}, title = {Conficker: Lessons in Secure Software and System Design}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {95--99}, year = {2010}, url = {https://doi.org/10.1080/19393550903550407}, doi = {10.1080/19393550903550407}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sanders10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SathyanarayanaKB10, author = {S. V. Sathyanarayana and M. Aswatha Kumar and K. N. Hari Bhat}, title = {Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field \emph{GF}(2\({}^{\mbox{\emph{m}}}\)) and Their Properties}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {84--94}, year = {2010}, url = {https://doi.org/10.1080/19393550903482759}, doi = {10.1080/19393550903482759}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SathyanarayanaKB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SindhuK10, author = {Siva S. Sivatha Sindhu and Arputharaj Kannan}, title = {Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {204--212}, year = {2010}, url = {https://doi.org/10.1080/19393551003762215}, doi = {10.1080/19393551003762215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SindhuK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SinghGD10, author = {Jyotsna Singh and Parul Garg and Alok Nath De}, title = {Data Hiding in Audio Using Random Orthogonal Matrices}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {273--281}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514652}, doi = {10.1080/19393555.2010.514652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SinghGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos10, author = {Nicolas Sklavos}, title = {On the Hardware Implementation Cost of Crypto-Processors Architectures}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {53--60}, year = {2010}, url = {https://doi.org/10.1080/19393551003649016}, doi = {10.1080/19393551003649016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Tammineedi10, author = {Rama Lingeswara Tammineedi}, title = {Business Continuity Management: {A} Standards-Based Approach}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {1}, pages = {36--50}, year = {2010}, url = {https://doi.org/10.1080/19393550903551843}, doi = {10.1080/19393550903551843}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Tammineedi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TawalbehS10, author = {Lo'ai Ali Tawalbeh and Saadeh Sweidan}, title = {Hardware Design and Implementation of \emph{ElGamal} Public-Key Cryptography Algorithm}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {243--252}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.499799}, doi = {10.1080/19393555.2010.499799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TawalbehS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TingC10, author = {Wendy W. Ting and David R. Comings}, title = {Information Assurance Metric for Assessing NIST's Monitoring Step in the Risk Management Framework}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {5}, pages = {253--262}, year = {2010}, url = {https://doi.org/10.1080/19393555.2010.514650}, doi = {10.1080/19393555.2010.514650}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/TingC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/VijayaraghavanPN10, author = {V. Vijayaraghavan and Sanjoy Kumar Paul and Rajarathnam Nallusamy}, title = {iMeasure Security (iMS): {A} Framework for Quantitative Assessment of Security Measures and its Impacts}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {213--225}, year = {2010}, url = {https://doi.org/10.1080/19393551003762223}, doi = {10.1080/19393551003762223}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/VijayaraghavanPN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/WangGC10, author = {Ju An Wang and Michael M. Guo and Jairo Camargo}, title = {An Ontological Approach to Computer System Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {61--73}, year = {2010}, url = {https://doi.org/10.1080/19393550903404902}, doi = {10.1080/19393550903404902}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/WangGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/YangCJ10, author = {Seung S. Yang and Hongsik Choi and Hankyu Joo}, title = {Vulnerability Analysis of the Grid Data Security Authentication System}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {4}, pages = {182--190}, year = {2010}, url = {https://doi.org/10.1080/19393551003762199}, doi = {10.1080/19393551003762199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/YangCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.