Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp20.bht:"
@article{DBLP:journals/isjgp/BeghdadTB11, author = {Rachid Beghdad and Mohamed Touati and Mohamed Seghir Berboucha}, title = {A Data Analysis-Based Approach for Detecting Intruders}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {194--209}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.593611}, doi = {10.1080/19393555.2011.593611}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BeghdadTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BhardwajS11, author = {Mohini Bhardwaj and Amar Jeet Singh}, title = {Automated Integrated Examination System: {A} Security Concern}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {156--162}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.569907}, doi = {10.1080/19393555.2011.569907}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/BhardwajS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Biswas11, author = {G. P. Biswas}, title = {Establishment of Authenticated Secret Session Keys Using Digital Signature Standard}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {9--16}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.529101}, doi = {10.1080/19393555.2010.529101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Biswas11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Corwin11, author = {Eric H. Corwin}, title = {Deep Packet Inspection: Shaping the Internet and the Implications on Privacy and Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {6}, pages = {311--316}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.624162}, doi = {10.1080/19393555.2011.624162}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Corwin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Faragallah11, author = {Osama S. Faragallah}, title = {An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {135--147}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560926}, doi = {10.1080/19393555.2011.560926}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Faragallah11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GandotraSB11, author = {Vandana Gandotra and Archana Singhal and Punam Bedi}, title = {{MASPTA-O:} Multiagent System Planning to Avoid Threats Optimally}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {6}, pages = {290--310}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.624159}, doi = {10.1080/19393555.2011.624159}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GandotraSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GeethaK11, author = {S. Geetha and N. Kamaraj}, title = {{MBNS} Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {78--90}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560922}, doi = {10.1080/19393555.2011.560922}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/GeethaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/IsmailT11, author = {E. S. Ismail and N. M. F. Tahat}, title = {The Modified Signature Scheme Based on Factoring and Discrete Logarithms}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {245--249}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.607221}, doi = {10.1080/19393555.2011.607221}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/IsmailT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JohnS11, author = {Saju P. John and Philip Samuel}, title = {A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {250--260}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.607222}, doi = {10.1080/19393555.2011.607222}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/JohnS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KabirW11, author = {Md. Enamul Kabir and Hua Wang}, title = {Microdata Protection Method Through Microaggregation: {A} Median-Based Approach}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {1--8}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.515288}, doi = {10.1080/19393555.2010.515288}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KabirW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/LagouC11, author = {Panagiota Lagou and Gregory Chondrokoukis}, title = {Choosing a Biometric for Nonrepudiation}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {17--24}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544700}, doi = {10.1080/19393555.2010.544700}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/LagouC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Marks11, author = {Larry Marks}, title = {Hardening Network Security, by Mallery, J., Zahn, J., Kelly, P., Noonan, W., Seagren, E., Love, P., Kraft, R., and O'Neill, {M.(2005).} {CA:} McGraw-Hill/Osborne. {(608} pp., {\textdollar} 39.99 USD, {ISBN:} 978-0072257038)}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {261}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.607224}, doi = {10.1080/19393555.2011.607224}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Marks11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Matusitz11, author = {Jonathan Matusitz}, title = {Social Network Theory: {A} Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {34--44}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544702}, doi = {10.1080/19393555.2010.544702}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Matusitz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/McLaughlin11, author = {Kevin L. McLaughlin}, title = {Cyber Attack! Is a Counter Attack Warranted?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {58--64}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544705}, doi = {10.1080/19393555.2010.544705}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/McLaughlin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Mohammed11, author = {Derek Mohammed}, title = {Security in Cloud Computing: An Analysis of Key Drivers and Constraints}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {123--127}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544704}, doi = {10.1080/19393555.2010.544704}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Mohammed11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MorseRW11, author = {Edward A. Morse and Vasant Raval and John R. Wingender Jr.}, title = {Market Price Effects of Data Security Breaches}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {6}, pages = {263--273}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.611860}, doi = {10.1080/19393555.2011.611860}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MorseRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MouradOB11, author = {Azzam Mourad and Hadi Otrok and Lama Baajour}, title = {New Approach Targeting Security Patterns Development and Deployment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {231--244}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.607220}, doi = {10.1080/19393555.2011.607220}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MouradOB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MukherjeeS11, author = {Sourav Mukherjee and Bibhudatta Sahoo}, title = {A Survey on Hardware Implementation of {IDEA} Cryptosystem}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {210--218}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.599098}, doi = {10.1080/19393555.2011.599098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MukherjeeS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PhadikarM11, author = {Amit Phadikar and Santi P. Maity}, title = {On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {6}, pages = {274--289}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.623293}, doi = {10.1080/19393555.2011.623293}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PhadikarM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RaoK11, author = {N. V. Rao and V. Meena Kumari}, title = {Watermarking in Medical Imaging for Security and Authentication}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {148--155}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.561154}, doi = {10.1080/19393555.2011.561154}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/RaoK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RenjitS11, author = {J. Arokia Renjit and K. L. Shunmuganathan}, title = {Multi-Agent-Based Anomaly Intrusion Detection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {185--193}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.589424}, doi = {10.1080/19393555.2011.589424}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/RenjitS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SaminathanS11, author = {R. Saminathan and K. Selvakumar}, title = {{TRUCE} - An Adaptive Trust Management Algorithm Over {MANET} for Service-Based Mobile Computing Environments}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {173--184}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.579490}, doi = {10.1080/19393555.2011.579490}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SaminathanS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ShanmugamPO11, author = {Karthikeyan Shanmugam and Roger S. Powell and Tom Owens}, title = {An Approach for Validation of Digital Anti-Forensic Evidence}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {4-5}, pages = {219--230}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.604667}, doi = {10.1080/19393555.2011.604667}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/ShanmugamPO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SheikhMK11, author = {Rashid Sheikh and Durgesh Kumar Mishra and Beerendra Kumar}, title = {Secure Multiparty Computation: From Millionaires Problem to Anonymizer}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {25--33}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544701}, doi = {10.1080/19393555.2010.544701}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SheikhMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sikdar11, author = {Priti Sikdar}, title = {Alternate Approaches to Business Impact Analysis}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {128--134}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.551274}, doi = {10.1080/19393555.2010.551274}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sikdar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sklavos11, author = {Nicolas Sklavos}, title = {Editorial}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {65--66}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.577345}, doi = {10.1080/19393555.2011.577345}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sklavos11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sood11, author = {Sandeep K. Sood}, title = {Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {67--77}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560921}, doi = {10.1080/19393555.2011.560921}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sood11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sood11a, author = {Sandeep K. Sood}, title = {Cookie-Based Virtual Password Authentication Protocol}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {100--111}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560924}, doi = {10.1080/19393555.2011.560924}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sood11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/StapletonP11, author = {Jeff Stapleton and Ralph Spencer Poore}, title = {Tokenization and Other Methods of Security for Cardholder Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {91--99}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560923}, doi = {10.1080/19393555.2011.560923}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/StapletonP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SulthaniR11, author = {R. Mynuddin Sulthani and D. Sreenivasa Rao}, title = {A QoS Estimation-Based Scheduler for Real-Time Traffic in {IEEE} 802.11e Mobile Ad hoc Networks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {6}, pages = {317--327}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.624158}, doi = {10.1080/19393555.2011.624158}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SulthaniR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SurisettyK11, author = {Sirisha Surisetty and Sanjeev Kumar}, title = {Apple's Leopard Versus Microsoft's Windows {XP:} Experimental Evaluation of Apple's Leopard Operating System with Windows {XP-SP2} under Distributed Denial of Service Security Attacks}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {3}, pages = {163--172}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.569908}, doi = {10.1080/19393555.2011.569908}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SurisettyK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ThiruvaazhiD11, author = {Uloli Thiruvaazhi and R. Divya}, title = {Web Authentication Protocol Using Zero Knowledge Proof}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {2}, pages = {112--121}, year = {2011}, url = {https://doi.org/10.1080/19393555.2011.560925}, doi = {10.1080/19393555.2011.560925}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ThiruvaazhiD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TiwariS11, author = {Rajesh Kumar Tiwari and G. Sahoo Mesra}, title = {A Novel Methodology for Data Hiding in {PDF} Files}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {20}, number = {1}, pages = {45--57}, year = {2011}, url = {https://doi.org/10.1080/19393555.2010.544703}, doi = {10.1080/19393555.2010.544703}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TiwariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.