Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr72.bht:"
@article{DBLP:journals/istr/AnushiadeviA23, author = {R. Anushiadevi and Rengarajan Amirtharajan}, title = {Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103407}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103407}, doi = {10.1016/J.JISA.2022.103407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnushiadeviA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BagherL23, author = {Kassem Bagher and Shangqi Lai}, title = {SGX-Stream: {A} Secure Stream Analytics Framework In SGX-enabled Edge Cloud}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103403}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103403}, doi = {10.1016/J.JISA.2022.103403}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BagherL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhowmikA23, author = {Sandeep Bhowmik and Sriyankar Acharyya}, title = {Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103391}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103391}, doi = {10.1016/J.JISA.2022.103391}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BhowmikA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChagantiRP23, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {A multi-view feature fusion approach for effective malware classification using Deep Learning}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103402}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103402}, doi = {10.1016/J.JISA.2022.103402}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChagantiRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenamA23, author = {Venkata Bhikshapathi Chenam and Syed Taqi Ali}, title = {A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103377}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103377}, doi = {10.1016/J.JISA.2022.103377}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenamA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWDPL23, author = {Zhenzhen Guo and Gaoli Wang and Orr Dunkelman and Yinxue Pan and Shengyuan Liu}, title = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103406}, doi = {10.1016/J.JISA.2022.103406}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JavanmardiSMPP23, author = {Saeed Javanmardi and Mohammad Shojafar and Reza Mohammadi and Valerio Persico and Antonio Pescap{\`{e}}}, title = {S-FoS: {A} secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103404}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103404}, doi = {10.1016/J.JISA.2022.103404}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JavanmardiSMPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KaurHS23, author = {Harmanjeet Kaur and Nishtha Hooda and Harpreet Singh}, title = {k-anonymization of social network data using Neural Network and {SVM:} K-NeuroSVM}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103382}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103382}, doi = {10.1016/J.JISA.2022.103382}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KaurHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuSZ23, author = {Yajing Liu and Zhengya Sun and Wensheng Zhang}, title = {Improving fraud detection via hierarchical attention-based Graph Neural Network}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103399}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103399}, doi = {10.1016/J.JISA.2022.103399}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McCarthyGAL23, author = {Andrew McCarthy and Essam Ghadafi and Panagiotis Andriotis and Phil Legg}, title = {Defending against adversarial machine learning attacks using hierarchical learning: {A} case study on network traffic attack classification}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103398}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103398}, doi = {10.1016/J.JISA.2022.103398}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/McCarthyGAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NayarT23, author = {Gayathri R. Nayar and Tony Thomas}, title = {Partial palm vein based biometric authentication}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103390}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103390}, doi = {10.1016/J.JISA.2022.103390}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NayarT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaleemWI23, author = {Mahreen Saleem and M. R. Warsi and Saiful Islam}, title = {Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103389}, doi = {10.1016/J.JISA.2022.103389}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SaleemWI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SangaviT23, author = {V. Sangavi and Palanivel Thangavel}, title = {An exquisite multiple image encryption harnessing multi-scroll Lu-Chen and Chua chaotic systems employing domino strategy}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103408}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103408}, doi = {10.1016/J.JISA.2022.103408}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SangaviT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TalukderHIUAYAM23, author = {Md. Alamin Talukder and Khondokar Fida Hasan and Md. Manowarul Islam and Ashraf Uddin and Arnisha Akhter and Mohammand Abu Yousuf and Fares Alharbi and Mohammad Ali Moni}, title = {A dependable hybrid machine learning model for network intrusion detection}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103405}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103405}, doi = {10.1016/J.JISA.2022.103405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TalukderHIUAYAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWQL23, author = {Zeyu Yang and Ziqing Wang and Fei Qiu and Fagen Li}, title = {A group key agreement protocol based on {ECDH} and short signature}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103388}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103388}, doi = {10.1016/J.JISA.2022.103388}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangWQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Yin23, author = {Haotian Yin}, title = {Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103385}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103385}, doi = {10.1016/J.JISA.2022.103385}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Yin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTLLWZL23, author = {Yaoyuan Zhang and Yu{-}an Tan and Mingfeng Lu and Lu Liu and Dianxin Wang and Quanxin Zhang and Yuanzhang Li}, title = {Towards interpreting vulnerability of object detection models via adversarial distillation}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103410}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103410}, doi = {10.1016/J.JISA.2022.103410}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouLLPLX23, author = {Junwei Zhou and Botian Lei and Huile Lang and Emmanouil Panaousis and Kaitai Liang and Jianwen Xiang}, title = {Secure genotype imputation using homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103386}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103386}, doi = {10.1016/J.JISA.2022.103386}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouLLPLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.