Search dblp for Publications

export results for "toc:db/journals/ijics/ijics6.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AlEroudKSH14,
  author       = {Ahmed Aleroud and
                  George Karabatis and
                  Prayank Sharma and
                  Peng He},
  title        = {Context and semantics for detection of cyber attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {63--92},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059791},
  doi          = {10.1504/IJICS.2014.059791},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlEroudKSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AliA14,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {Attribute-based group signature without random oracles with attribute
                  anonymity},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {109--132},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065162},
  doi          = {10.1504/IJICS.2014.065162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AliA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AngamuthuR14,
  author       = {Muthulakshmi Angamuthu and
                  Anitha Ramalingam},
  title        = {Identity-based broadcast encryption for multi-privileged groups using
                  Chinese remainder theorem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {286--305},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066661},
  doi          = {10.1504/IJICS.2014.066661},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AngamuthuR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ArogundadeJY14,
  author       = {Oluwasefunmi 'Tale Arogundade and
                  Zhi Jin and
                  Xiaoguang Yang},
  title        = {Towards ontological approach to eliciting risk-based security requirements},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {143--178},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065168},
  doi          = {10.1504/IJICS.2014.065168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ArogundadeJY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BagadeT14,
  author       = {Anant M. Bagade and
                  Sanjay N. Talbar},
  title        = {Secure transmission of morphed stego keys over internet using {IP}
                  steganography},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {133--142},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065164},
  doi          = {10.1504/IJICS.2014.065164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BagadeT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Choi14,
  author       = {Hyunjun Choi},
  title        = {Image encryption method for depth + texture video contents},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {333--343},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068093},
  doi          = {10.1504/IJICS.2014.068093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Choi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DasCGD14,
  author       = {Suvrojit Das and
                  Debayan Chatterjee and
                  Debidas Ghosh and
                  Narayan C. Debnath},
  title        = {Extracting the system call identifier from within {VFS:} a kernel
                  stack parsing-based approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {12--50},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059786},
  doi          = {10.1504/IJICS.2014.059786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DasCGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/FerragNG14,
  author       = {Mohamed Amine Ferrag and
                  Mehdi Nafa and
                  Salim Ghanemi},
  title        = {{SDPP:} an intelligent secure detection scheme with strong privacy-preserving
                  for mobile peer-to-peer social network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {241--269},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066650},
  doi          = {10.1504/IJICS.2014.066650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/FerragNG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/IsmailMN14,
  author       = {Ismahani Binti Ismail and
                  Muhammad Nadzir Marsono and
                  Sulaiman Mohd Nor},
  title        = {Malware detection using augmented naive Bayes with domain knowledge
                  and under presence of class noise},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {179--197},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.065173},
  doi          = {10.1504/IJICS.2014.065173},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/IsmailMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KangKJK14,
  author       = {Yong Ho Kang and
                  Kimoon Keum and
                  Changbok Jang and
                  Joo Man Kim},
  title        = {Study of mobile virtualisation-based security technology for smartwork
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {311--321},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068095},
  doi          = {10.1504/IJICS.2014.068095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KangKJK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KimH14,
  author       = {Man Ki Kim and
                  You Sik Hong},
  title        = {Development {AI} traffic-safety system using {RFID} technique and
                  {USN} theory},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {322--332},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068098},
  doi          = {10.1504/IJICS.2014.068098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KimH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KuppuswamyA14,
  author       = {Prakash Kuppuswamy and
                  Saeed Q. Y. Al{-}Khalidi},
  title        = {Hybrid encryption/decryption technique using new public key and symmetric
                  key algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {372--382},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068103},
  doi          = {10.1504/IJICS.2014.068103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KuppuswamyA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Lee14,
  author       = {Kyujin Lee},
  title        = {An iterative layered interference canceller scheme for {OFDM} in wireless
                  mesh security networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {344--353},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068094},
  doi          = {10.1504/IJICS.2014.068094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Lee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MangleP14,
  author       = {Andrew Mangle and
                  Sandip C. Patel},
  title        = {Issues in user authentication using security questions},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {383--407},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068100},
  doi          = {10.1504/IJICS.2014.068100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MangleP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaB14,
  author       = {P. M. Siva Raja and
                  E. Baburaj},
  title        = {Genetic algorithms based data hiding scheme for digital images with
                  {LSBMR}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {51--62},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059787},
  doi          = {10.1504/IJICS.2014.059787},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Rasheed14,
  author       = {Hassan Rasheed},
  title        = {Vulnerability distribution scoring for software product security assessment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {270--285},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066653},
  doi          = {10.1504/IJICS.2014.066653},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Rasheed14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SakthivelVK14,
  author       = {R. Sakthivel and
                  M. Vanitha and
                  Harish M. Kittur},
  title        = {Low power high throughput reconfigurable stream cipher hardware {VLSI}
                  architectures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059785},
  doi          = {10.1504/IJICS.2014.059785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SakthivelVK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZSL14,
  author       = {Limin Shen and
                  Futai Zhang and
                  Yinxia Sun and
                  Sujuan Li},
  title        = {Cryptanalysis and improvement on a certificateless encryption scheme
                  in the standard model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {354--371},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.068104},
  doi          = {10.1504/IJICS.2014.068104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TsitroulisLT14,
  author       = {Achilleas Tsitroulis and
                  Dimitris Lampoudis and
                  Emmanuel Tsekleves},
  title        = {Exposing {WPA2} security protocol vulnerabilities},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {93--107},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.059797},
  doi          = {10.1504/IJICS.2014.059797},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TsitroulisLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VinodLGC14,
  author       = {P. Vinod and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Grijesh Chauhan},
  title        = {Detecting malicious files using non-signature-based methods},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {199--240},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJICS.2014.066646},
  doi          = {10.1504/IJICS.2014.066646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VinodLGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics