Search dblp for Publications

export results for "toc:db/journals/ijsssp/ijsssp10.bht:"

 download as .bib file

@article{DBLP:journals/ijsssp/Abdelkader19,
  author       = {Mostefai Abdelkader},
  title        = {Improving Effectiveness of Process Model Matchers Using Wordnet Glosses},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {2},
  pages        = {1--19},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019070101},
  doi          = {10.4018/IJSSSP.2019070101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/Abdelkader19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/Aung19,
  author       = {Sint Sint Aung},
  title        = {Analysis on Opinion Words Extraction in Electronic Product Reviews},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {1},
  pages        = {47--61},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019010103},
  doi          = {10.4018/IJSSSP.2019010103},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/Aung19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/FadahunsiASO19,
  author       = {Ibukun Fadahunsi and
                  Oluwasefunmi 'Tale Arogundade and
                  Adesina S. Sodiya and
                  Bakai Olajuwon},
  title        = {Towards a UMLsec-Based Proctored Examination Model},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {2},
  pages        = {44--67},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019070103},
  doi          = {10.4018/IJSSSP.2019070103},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/FadahunsiASO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/FuWCQ19,
  author       = {Shen Fu and
                  Mathew L. Wymore and
                  Ting{-}Wei Chang and
                  Daji Qiao},
  title        = {A Novel Software System Protection Scheme Based on Behavior and Context
                  Monitoring},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {1},
  pages        = {22--46},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019010102},
  doi          = {10.4018/IJSSSP.2019010102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/FuWCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/Lapshichyov19,
  author       = {Vitaly V. Lapshichyov},
  title        = {{TLS} Certificates of the Tor Network and Their Distinctive Features},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {2},
  pages        = {20--43},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019070102},
  doi          = {10.4018/IJSSSP.2019070102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/Lapshichyov19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/Yee19,
  author       = {George O. M. Yee},
  title        = {Designing Sound Security Metrics},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {10},
  number       = {1},
  pages        = {1--21},
  year         = {2019},
  url          = {https://doi.org/10.4018/ijsssp.2019010101},
  doi          = {10.4018/IJSSSP.2019010101},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/Yee19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics