Search dblp for Publications

export results for "toc:db/journals/isecure/isecure16.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AA24,
  author       = {Meharaj Begum A and
                  Michael Arock},
  title        = {Modified Parse-Tree Based Pattern Extraction Approach for Detecting
                  {SQLIA} Using Neural Network Model},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1--16},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.370697.886},
  doi          = {10.22042/ISECURE.2023.370697.886},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AmirmohseniN24,
  author       = {Morteza Amirmohseni and
                  Sadegh Dorri Nogoorani},
  title        = {Safety Guards for Ethereum Smart Contracts},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {37--53},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.365808.846},
  doi          = {10.22042/ISECURE.2023.365808.846},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AmirmohseniN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ChegenizadehAMA24,
  author       = {Mostafa Chegenizadeh and
                  Mohammad Ali and
                  Javad Mohajeri and
                  Mohammad Reza Aref},
  title        = {{HUAP:} Practical Attribute-Based Access Control Supporting Hidden
                  Updatable Access Policies for Resource-Constrained Devices},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {93--114},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.395028.954},
  doi          = {10.22042/ISECURE.2023.395028.954},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/ChegenizadehAMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KalhoroSKAA24,
  author       = {Shadab Kalhoro and
                  Farhan Bashir Shaikh and
                  Anam Kalhoro and
                  Junaid Ur Rehman Abbasi and
                  Ramesh Kumar Ayyasamy},
  title        = {An Overview of Security Attacks in 5G Enabled Technologies: Applications
                  and Use Case Scenarios},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {17--35},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.354872.829},
  doi          = {10.22042/ISECURE.2023.354872.829},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TalukdarB24,
  author       = {Kangkan Talukdar and
                  Debojit Boro},
  title        = {Slowloris Attack Detection Using Adaptive Timeout-Based Approach},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {79--92},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.392462.938},
  doi          = {10.22042/ISECURE.2023.392462.938},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/TalukdarB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/YalcinkayaK24,
  author       = {Mehmet Ali Yal{\c{c}}inkaya and
                  Ecir Ugur K{\"{u}}{\c{c}}{\"{u}}ksille},
  title        = {Artificial Intelligence and Dynamic Analysis-Based Web Application
                  Vulnerability Scanner},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {55--77},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.367746.847},
  doi          = {10.22042/ISECURE.2023.367746.847},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/YalcinkayaK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics