Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure16.bht:"
@article{DBLP:journals/isecure/AA24, author = {Meharaj Begum A and Michael Arock}, title = {Modified Parse-Tree Based Pattern Extraction Approach for Detecting {SQLIA} Using Neural Network Model}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {1--16}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.370697.886}, doi = {10.22042/ISECURE.2023.370697.886}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AmirmohseniN24, author = {Morteza Amirmohseni and Sadegh Dorri Nogoorani}, title = {Safety Guards for Ethereum Smart Contracts}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {37--53}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.365808.846}, doi = {10.22042/ISECURE.2023.365808.846}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AmirmohseniN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ChegenizadehAMA24, author = {Mostafa Chegenizadeh and Mohammad Ali and Javad Mohajeri and Mohammad Reza Aref}, title = {{HUAP:} Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {93--114}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.395028.954}, doi = {10.22042/ISECURE.2023.395028.954}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/ChegenizadehAMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KalhoroSKAA24, author = {Shadab Kalhoro and Farhan Bashir Shaikh and Anam Kalhoro and Junaid Ur Rehman Abbasi and Ramesh Kumar Ayyasamy}, title = {An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {17--35}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.354872.829}, doi = {10.22042/ISECURE.2023.354872.829}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/TalukdarB24, author = {Kangkan Talukdar and Debojit Boro}, title = {Slowloris Attack Detection Using Adaptive Timeout-Based Approach}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {79--92}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.392462.938}, doi = {10.22042/ISECURE.2023.392462.938}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/TalukdarB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/YalcinkayaK24, author = {Mehmet Ali Yal{\c{c}}inkaya and Ecir Ugur K{\"{u}}{\c{c}}{\"{u}}ksille}, title = {Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {55--77}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.367746.847}, doi = {10.22042/ISECURE.2023.367746.847}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/YalcinkayaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.