Search dblp for Publications

export results for "toc:db/journals/ijesdf/ijesdf1.bht:"

 download as .bib file

@article{DBLP:journals/ijesdf/0002P08,
  author       = {Katerina Papadaki and
                  Despina Polemi},
  title        = {A meta-process for information security risk management},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {336--343},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021451},
  doi          = {10.1504/IJESDF.2008.021451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/0002P08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AfzalM08,
  author       = {Mehreen Afzal and
                  Ashraf Masood},
  title        = {Algebraic analysis of Trivium and Trivium/128},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {344--352},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021452},
  doi          = {10.1504/IJESDF.2008.021452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AfzalM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AsaarMS08,
  author       = {Maryam Rajabzadeh Asaar and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Another security improvement over the Lin et al.'s electronic-voting
                  scheme},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {413--422},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021458},
  doi          = {10.1504/IJESDF.2008.021458},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AsaarMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BoucherkhaB08,
  author       = {Samia Boucherkha and
                  Mohamed Benmohamed},
  title        = {Textural features extraction for image integrity verification},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {3},
  pages        = {268--280},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.020944},
  doi          = {10.1504/IJESDF.2008.020944},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/BoucherkhaB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BurnsW08,
  author       = {Susan Burns and
                  George R. S. Weir},
  title        = {Varieties of smartcard fraud},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {374--386},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021455},
  doi          = {10.1504/IJESDF.2008.021455},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/BurnsW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DaiSZ08,
  author       = {Yi Dai and
                  Jinshu Su and
                  Ying Zhang},
  title        = {A coordination scheduling mechanism to guarantee packet ordering in
                  parallel packet switch},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {362--373},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021454},
  doi          = {10.1504/IJESDF.2008.021454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/DaiSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeorgiadisBP08,
  author       = {Christos K. Georgiadis and
                  Dimitrios A. Baltatzis and
                  George Pangalos},
  title        = {Secure mobile agent environments: modelling role assignments},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {3},
  pages        = {249--267},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.020943},
  doi          = {10.1504/IJESDF.2008.020943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GeorgiadisBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JahankaniAW08,
  author       = {Hossein Jahankani and
                  Branko Antonijevic and
                  Terry Hugh Walcott},
  title        = {Tools protecting stakeholders against hackers and crackers: an insight
                  review},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {423--429},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021459},
  doi          = {10.1504/IJESDF.2008.021459},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JahankaniAW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KumarHR08,
  author       = {Manish Kumar and
                  M. Hanumanthappa and
                  Bhavanam Lakshma Reddy},
  title        = {Security issues in m-government},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {401--412},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021457},
  doi          = {10.1504/IJESDF.2008.021457},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KumarHR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MousaviPJ08,
  author       = {Amin Mousavi and
                  Elias Pimenidis and
                  Hamid Jahankhani},
  title        = {Cultivating trust - an electronic-government development model for
                  addressing the needs of developing countries},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {3},
  pages        = {233--248},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.020942},
  doi          = {10.1504/IJESDF.2008.020942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MousaviPJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Onwubiko08,
  author       = {Cyril Onwubiko},
  title        = {Multisensor message exchange mechanism},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {387--400},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021456},
  doi          = {10.1504/IJESDF.2008.021456},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Onwubiko08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QiEWX08,
  author       = {Man Qi and
                  Denis Edgar{-}Nevill and
                  Yongquan Wang and
                  Rongsheng Xu},
  title        = {Tracking online trails},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {353--361},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021453},
  doi          = {10.1504/IJESDF.2008.021453},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/QiEWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SuskiTMM08,
  author       = {William C. Suski and
                  Michael A. Temple and
                  Michael J. Mendenhall and
                  Robert F. Mills},
  title        = {Radio frequency fingerprinting commercial communication devices to
                  enhance electronic security},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {3},
  pages        = {301--322},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.020946},
  doi          = {10.1504/IJESDF.2008.020946},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SuskiTMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Yampolskiy08,
  author       = {Roman V. Yampolskiy},
  title        = {Action-based user authentication},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {3},
  pages        = {281--300},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.020945},
  doi          = {10.1504/IJESDF.2008.020945},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Yampolskiy08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/YauKW08,
  author       = {Wai Chee Yau and
                  Dinesh Kant Kumar and
                  Hans Weghorn},
  title        = {Vision-based technique for secure recognition of voice-less commands},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {323--335},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021450},
  doi          = {10.1504/IJESDF.2008.021450},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/YauKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Ahsan07,
  author       = {Syed Ahsan},
  title        = {{IT} enabled counter terrorism infrastructure: issues and challenges},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {117--124},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013597},
  doi          = {10.1504/IJESDF.2007.013597},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Ahsan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AickelinTH07,
  author       = {Uwe Aickelin and
                  Jamie Twycross and
                  Thomas Hesketh{-}Roberts},
  title        = {Rule generalisation in intrusion detection systems using {SNORT}},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {101--116},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013596},
  doi          = {10.1504/IJESDF.2007.013596},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AickelinTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AngelopoulouTXT07,
  author       = {Olga Angelopoulou and
                  Paula Thomas and
                  Konstantinos Xynos and
                  Theodore Tryfonas},
  title        = {Online {ID} theft techniques, investigation and response},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {76--88},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013594},
  doi          = {10.1504/IJESDF.2007.013594},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AngelopoulouTXT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AppavuR07,
  author       = {Subramanian Appavu and
                  Ramasamy Rajaram},
  title        = {Detection of e-mail concerning criminal activities using association
                  rule-based decision tree},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {131--145},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016863},
  doi          = {10.1504/IJESDF.2007.016863},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AppavuR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AssoraKS07,
  author       = {Mohammed Assora and
                  James Kadirire and
                  Ayoub Shirvani},
  title        = {A web transaction security scheme based on disposable credit card
                  numbers},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {146--155},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016864},
  doi          = {10.1504/IJESDF.2007.016864},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AssoraKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Bilar07,
  author       = {Daniel Bilar},
  title        = {Opcodes as predictor for malware},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {156--168},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016865},
  doi          = {10.1504/IJESDF.2007.016865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Bilar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/FlechaisMS07,
  author       = {Ivan Flechais and
                  Cecilia Mascolo and
                  Martina Angela Sasse},
  title        = {Integrating security and usability into the requirements and design
                  process},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {12--26},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013589},
  doi          = {10.1504/IJESDF.2007.013589},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/FlechaisMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeisslerM07,
  author       = {William K. Geissler and
                  John C. McEachen},
  title        = {Exploiting error control in network traffic for robust, high rate
                  covert channels},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {180--193},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016867},
  doi          = {10.1504/IJESDF.2007.016867},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GeisslerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Jahankhani07,
  author       = {Hamid Jahankhani},
  title        = {Evaluation of cyber legislations: trading in the global cyber village},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {1--11},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013588},
  doi          = {10.1504/IJESDF.2007.013588},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Jahankhani07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KardarasKCK07,
  author       = {Konstantinos Kardaras and
                  Zacharias Kamarianakis and
                  Andrew Chanerley and
                  Dimitris Koutsouris},
  title        = {Unauthorised person recognition using gait biometry and information
                  analysis: integration and transparency of security operations in a
                  centralised intelligence environment},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {206--217},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016869},
  doi          = {10.1504/IJESDF.2007.016869},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KardarasKCK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MoenKSH07,
  author       = {Vebj{\o}rn Moen and
                  Andr{\'{e}} N. Klingsheim and
                  Kent Inge Fagerland Simonsen and
                  Kjell J{\o}rgen Hole},
  title        = {Vulnerabilities in e-governments},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {89--100},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013595},
  doi          = {10.1504/IJESDF.2007.013595},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MoenKSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Mouratidis07,
  author       = {Haralambos Mouratidis},
  title        = {Secure information systems engineering: a manifesto},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {27--41},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013590},
  doi          = {10.1504/IJESDF.2007.013590},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Mouratidis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PattinsonH07,
  author       = {Colin Pattinson and
                  Kemal Hajdarevic},
  title        = {Timing considerations in detecting resource starvation attacks using
                  statistical profiles},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {194--205},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016868},
  doi          = {10.1504/IJESDF.2007.016868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PattinsonH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PimenidisS07,
  author       = {Elias Pimenidis and
                  Ioannis Savvas},
  title        = {E-identification technologies for e-government interoperability in
                  the {EU}},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {169--179},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016866},
  doi          = {10.1504/IJESDF.2007.016866},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PimenidisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RevettGGEMS07,
  author       = {Kenneth Revett and
                  Florin Gorunescu and
                  Marina Gorunescu and
                  Marius Ene and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Henrique M. Dinis Santos},
  title        = {A machine learning approach to keystroke dynamics based user authentication},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {55--70},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013592},
  doi          = {10.1504/IJESDF.2007.013592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/RevettGGEMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Taal07,
  author       = {Aminata Taal},
  title        = {Report examining the weaknesses in the fight against cyber-crime from
                  within},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {125--130},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016862},
  doi          = {10.1504/IJESDF.2007.016862},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Taal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Watney07,
  author       = {Murdoch Watney},
  title        = {State surveillance of the internet: human rights infringement or e-security
                  mechanism?},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {42--54},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013591},
  doi          = {10.1504/IJESDF.2007.013591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Watney07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Watson07,
  author       = {David Lilburn Watson},
  title        = {Stealing corporate secrets using open source intelligence (the practitioner's
                  view)},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {71--75},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013593},
  doi          = {10.1504/IJESDF.2007.013593},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Watson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Zorkadis07,
  author       = {Vasilios Zorkadis},
  title        = {Detection and surveillance technologies: privacy-related requirements
                  and protection schemes},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {2},
  pages        = {218--231},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.016870},
  doi          = {10.1504/IJESDF.2007.016870},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Zorkadis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics