Search dblp for Publications

export results for "toc:db/journals/istr/istr72.bht:"

 download as .bib file

@article{DBLP:journals/istr/AnushiadeviA23,
  author       = {R. Anushiadevi and
                  Rengarajan Amirtharajan},
  title        = {Separable reversible data hiding in an encrypted image using the adjacency
                  pixel difference histogram},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103407},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103407},
  doi          = {10.1016/J.JISA.2022.103407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnushiadeviA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BagherL23,
  author       = {Kassem Bagher and
                  Shangqi Lai},
  title        = {SGX-Stream: {A} Secure Stream Analytics Framework In SGX-enabled Edge
                  Cloud},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103403},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103403},
  doi          = {10.1016/J.JISA.2022.103403},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BagherL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BhowmikA23,
  author       = {Sandeep Bhowmik and
                  Sriyankar Acharyya},
  title        = {Image encryption approach using improved chaotic system incorporated
                  with differential evolution and genetic algorithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103391},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103391},
  doi          = {10.1016/J.JISA.2022.103391},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BhowmikA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChagantiRP23,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {A multi-view feature fusion approach for effective malware classification
                  using Deep Learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103402},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103402},
  doi          = {10.1016/J.JISA.2022.103402},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChagantiRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenamA23,
  author       = {Venkata Bhikshapathi Chenam and
                  Syed Taqi Ali},
  title        = {A designated tester-based certificateless public key encryption with
                  conjunctive keyword search for cloud-based MIoT in dynamic multi-user
                  environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103377},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103377},
  doi          = {10.1016/J.JISA.2022.103377},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenamA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWDPL23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Orr Dunkelman and
                  Yinxue Pan and
                  Shengyuan Liu},
  title        = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103406},
  doi          = {10.1016/J.JISA.2022.103406},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JavanmardiSMPP23,
  author       = {Saeed Javanmardi and
                  Mohammad Shojafar and
                  Reza Mohammadi and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {S-FoS: {A} secure workflow scheduling approach for performance optimization
                  in SDN-based IoT-Fog networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103404},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103404},
  doi          = {10.1016/J.JISA.2022.103404},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JavanmardiSMPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KaurHS23,
  author       = {Harmanjeet Kaur and
                  Nishtha Hooda and
                  Harpreet Singh},
  title        = {k-anonymization of social network data using Neural Network and {SVM:}
                  K-NeuroSVM},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103382},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103382},
  doi          = {10.1016/J.JISA.2022.103382},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KaurHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuSZ23,
  author       = {Yajing Liu and
                  Zhengya Sun and
                  Wensheng Zhang},
  title        = {Improving fraud detection via hierarchical attention-based Graph Neural
                  Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103399},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103399},
  doi          = {10.1016/J.JISA.2022.103399},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McCarthyGAL23,
  author       = {Andrew McCarthy and
                  Essam Ghadafi and
                  Panagiotis Andriotis and
                  Phil Legg},
  title        = {Defending against adversarial machine learning attacks using hierarchical
                  learning: {A} case study on network traffic attack classification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103398},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103398},
  doi          = {10.1016/J.JISA.2022.103398},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/McCarthyGAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NayarT23,
  author       = {Gayathri R. Nayar and
                  Tony Thomas},
  title        = {Partial palm vein based biometric authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103390},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103390},
  doi          = {10.1016/J.JISA.2022.103390},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NayarT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaleemWI23,
  author       = {Mahreen Saleem and
                  M. R. Warsi and
                  Saiful Islam},
  title        = {Secure information processing for multimedia forensics using zero-trust
                  security model for large scale data analytics in SaaS cloud computing
                  environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103389},
  doi          = {10.1016/J.JISA.2022.103389},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SaleemWI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SangaviT23,
  author       = {V. Sangavi and
                  Palanivel Thangavel},
  title        = {An exquisite multiple image encryption harnessing multi-scroll Lu-Chen
                  and Chua chaotic systems employing domino strategy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103408},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103408},
  doi          = {10.1016/J.JISA.2022.103408},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SangaviT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TalukderHIUAYAM23,
  author       = {Md. Alamin Talukder and
                  Khondokar Fida Hasan and
                  Md. Manowarul Islam and
                  Ashraf Uddin and
                  Arnisha Akhter and
                  Mohammand Abu Yousuf and
                  Fares Alharbi and
                  Mohammad Ali Moni},
  title        = {A dependable hybrid machine learning model for network intrusion detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103405},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103405},
  doi          = {10.1016/J.JISA.2022.103405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/TalukderHIUAYAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWQL23,
  author       = {Zeyu Yang and
                  Ziqing Wang and
                  Fei Qiu and
                  Fagen Li},
  title        = {A group key agreement protocol based on {ECDH} and short signature},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103388},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103388},
  doi          = {10.1016/J.JISA.2022.103388},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangWQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Yin23,
  author       = {Haotian Yin},
  title        = {Security analysis of Bluetooth Secure Simple Pairing protocols with
                  extended threat model},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103385},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103385},
  doi          = {10.1016/J.JISA.2022.103385},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Yin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangTLLWZL23,
  author       = {Yaoyuan Zhang and
                  Yu{-}an Tan and
                  Mingfeng Lu and
                  Lu Liu and
                  Dianxin Wang and
                  Quanxin Zhang and
                  Yuanzhang Li},
  title        = {Towards interpreting vulnerability of object detection models via
                  adversarial distillation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103410},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103410},
  doi          = {10.1016/J.JISA.2022.103410},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouLLPLX23,
  author       = {Junwei Zhou and
                  Botian Lei and
                  Huile Lang and
                  Emmanouil Panaousis and
                  Kaitai Liang and
                  Jianwen Xiang},
  title        = {Secure genotype imputation using homomorphic encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103386},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103386},
  doi          = {10.1016/J.JISA.2022.103386},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouLLPLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics