Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijesdf/ijesdf1.bht:"
@article{DBLP:journals/ijesdf/0002P08, author = {Katerina Papadaki and Despina Polemi}, title = {A meta-process for information security risk management}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {336--343}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021451}, doi = {10.1504/IJESDF.2008.021451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/0002P08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AfzalM08, author = {Mehreen Afzal and Ashraf Masood}, title = {Algebraic analysis of Trivium and Trivium/128}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {344--352}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021452}, doi = {10.1504/IJESDF.2008.021452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AfzalM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AsaarMS08, author = {Maryam Rajabzadeh Asaar and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Another security improvement over the Lin et al.'s electronic-voting scheme}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {413--422}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021458}, doi = {10.1504/IJESDF.2008.021458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AsaarMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/BoucherkhaB08, author = {Samia Boucherkha and Mohamed Benmohamed}, title = {Textural features extraction for image integrity verification}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {3}, pages = {268--280}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.020944}, doi = {10.1504/IJESDF.2008.020944}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/BoucherkhaB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/BurnsW08, author = {Susan Burns and George R. S. Weir}, title = {Varieties of smartcard fraud}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {374--386}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021455}, doi = {10.1504/IJESDF.2008.021455}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/BurnsW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/DaiSZ08, author = {Yi Dai and Jinshu Su and Ying Zhang}, title = {A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {362--373}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021454}, doi = {10.1504/IJESDF.2008.021454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/DaiSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GeorgiadisBP08, author = {Christos K. Georgiadis and Dimitrios A. Baltatzis and George Pangalos}, title = {Secure mobile agent environments: modelling role assignments}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {3}, pages = {249--267}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.020943}, doi = {10.1504/IJESDF.2008.020943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GeorgiadisBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/JahankaniAW08, author = {Hossein Jahankani and Branko Antonijevic and Terry Hugh Walcott}, title = {Tools protecting stakeholders against hackers and crackers: an insight review}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {423--429}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021459}, doi = {10.1504/IJESDF.2008.021459}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/JahankaniAW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KumarHR08, author = {Manish Kumar and M. Hanumanthappa and Bhavanam Lakshma Reddy}, title = {Security issues in m-government}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {401--412}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021457}, doi = {10.1504/IJESDF.2008.021457}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KumarHR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MousaviPJ08, author = {Amin Mousavi and Elias Pimenidis and Hamid Jahankhani}, title = {Cultivating trust - an electronic-government development model for addressing the needs of developing countries}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {3}, pages = {233--248}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.020942}, doi = {10.1504/IJESDF.2008.020942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MousaviPJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Onwubiko08, author = {Cyril Onwubiko}, title = {Multisensor message exchange mechanism}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {387--400}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021456}, doi = {10.1504/IJESDF.2008.021456}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Onwubiko08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/QiEWX08, author = {Man Qi and Denis Edgar{-}Nevill and Yongquan Wang and Rongsheng Xu}, title = {Tracking online trails}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {353--361}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021453}, doi = {10.1504/IJESDF.2008.021453}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/QiEWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SuskiTMM08, author = {William C. Suski and Michael A. Temple and Michael J. Mendenhall and Robert F. Mills}, title = {Radio frequency fingerprinting commercial communication devices to enhance electronic security}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {3}, pages = {301--322}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.020946}, doi = {10.1504/IJESDF.2008.020946}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SuskiTMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Yampolskiy08, author = {Roman V. Yampolskiy}, title = {Action-based user authentication}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {3}, pages = {281--300}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.020945}, doi = {10.1504/IJESDF.2008.020945}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Yampolskiy08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/YauKW08, author = {Wai Chee Yau and Dinesh Kant Kumar and Hans Weghorn}, title = {Vision-based technique for secure recognition of voice-less commands}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {323--335}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021450}, doi = {10.1504/IJESDF.2008.021450}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/YauKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Ahsan07, author = {Syed Ahsan}, title = {{IT} enabled counter terrorism infrastructure: issues and challenges}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {117--124}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013597}, doi = {10.1504/IJESDF.2007.013597}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Ahsan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AickelinTH07, author = {Uwe Aickelin and Jamie Twycross and Thomas Hesketh{-}Roberts}, title = {Rule generalisation in intrusion detection systems using {SNORT}}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {101--116}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013596}, doi = {10.1504/IJESDF.2007.013596}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AickelinTH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AngelopoulouTXT07, author = {Olga Angelopoulou and Paula Thomas and Konstantinos Xynos and Theodore Tryfonas}, title = {Online {ID} theft techniques, investigation and response}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {76--88}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013594}, doi = {10.1504/IJESDF.2007.013594}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AngelopoulouTXT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AppavuR07, author = {Subramanian Appavu and Ramasamy Rajaram}, title = {Detection of e-mail concerning criminal activities using association rule-based decision tree}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {131--145}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016863}, doi = {10.1504/IJESDF.2007.016863}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AppavuR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AssoraKS07, author = {Mohammed Assora and James Kadirire and Ayoub Shirvani}, title = {A web transaction security scheme based on disposable credit card numbers}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {146--155}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016864}, doi = {10.1504/IJESDF.2007.016864}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AssoraKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Bilar07, author = {Daniel Bilar}, title = {Opcodes as predictor for malware}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {156--168}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016865}, doi = {10.1504/IJESDF.2007.016865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Bilar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/FlechaisMS07, author = {Ivan Flechais and Cecilia Mascolo and Martina Angela Sasse}, title = {Integrating security and usability into the requirements and design process}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {12--26}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013589}, doi = {10.1504/IJESDF.2007.013589}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/FlechaisMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GeisslerM07, author = {William K. Geissler and John C. McEachen}, title = {Exploiting error control in network traffic for robust, high rate covert channels}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {180--193}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016867}, doi = {10.1504/IJESDF.2007.016867}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GeisslerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Jahankhani07, author = {Hamid Jahankhani}, title = {Evaluation of cyber legislations: trading in the global cyber village}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {1--11}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013588}, doi = {10.1504/IJESDF.2007.013588}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Jahankhani07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KardarasKCK07, author = {Konstantinos Kardaras and Zacharias Kamarianakis and Andrew Chanerley and Dimitris Koutsouris}, title = {Unauthorised person recognition using gait biometry and information analysis: integration and transparency of security operations in a centralised intelligence environment}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {206--217}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016869}, doi = {10.1504/IJESDF.2007.016869}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KardarasKCK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MoenKSH07, author = {Vebj{\o}rn Moen and Andr{\'{e}} N. Klingsheim and Kent Inge Fagerland Simonsen and Kjell J{\o}rgen Hole}, title = {Vulnerabilities in e-governments}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {89--100}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013595}, doi = {10.1504/IJESDF.2007.013595}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MoenKSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Mouratidis07, author = {Haralambos Mouratidis}, title = {Secure information systems engineering: a manifesto}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {27--41}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013590}, doi = {10.1504/IJESDF.2007.013590}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Mouratidis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PattinsonH07, author = {Colin Pattinson and Kemal Hajdarevic}, title = {Timing considerations in detecting resource starvation attacks using statistical profiles}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {194--205}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016868}, doi = {10.1504/IJESDF.2007.016868}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PattinsonH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PimenidisS07, author = {Elias Pimenidis and Ioannis Savvas}, title = {E-identification technologies for e-government interoperability in the {EU}}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {169--179}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016866}, doi = {10.1504/IJESDF.2007.016866}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PimenidisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/RevettGGEMS07, author = {Kenneth Revett and Florin Gorunescu and Marina Gorunescu and Marius Ene and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Henrique M. Dinis Santos}, title = {A machine learning approach to keystroke dynamics based user authentication}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {55--70}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013592}, doi = {10.1504/IJESDF.2007.013592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/RevettGGEMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Taal07, author = {Aminata Taal}, title = {Report examining the weaknesses in the fight against cyber-crime from within}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {125--130}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016862}, doi = {10.1504/IJESDF.2007.016862}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Taal07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Watney07, author = {Murdoch Watney}, title = {State surveillance of the internet: human rights infringement or e-security mechanism?}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {42--54}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013591}, doi = {10.1504/IJESDF.2007.013591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Watney07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Watson07, author = {David Lilburn Watson}, title = {Stealing corporate secrets using open source intelligence (the practitioner's view)}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {71--75}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013593}, doi = {10.1504/IJESDF.2007.013593}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Watson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Zorkadis07, author = {Vasilios Zorkadis}, title = {Detection and surveillance technologies: privacy-related requirements and protection schemes}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {2}, pages = {218--231}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.016870}, doi = {10.1504/IJESDF.2007.016870}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Zorkadis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.