Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm2.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/AnggorojatiPP13,
  author       = {Bayu Anggorojati and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad},
  title        = {Efficient Fine Grained Access Control for {RFID} Inter-Enterprise
                  System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {221--242},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.232},
  doi          = {10.13052/JCSM2245-1439.232},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/AnggorojatiPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BabarRP13,
  author       = {Sachin D. Babar and
                  Neeli R. Neeli R. and
                  Ramjee Prasad},
  title        = {Activity Modelling and Countermeasures on Jamming Attack},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {1--23},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.211},
  doi          = {10.13052/JCSM2245-1439.211},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BabarRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BalogunOM13,
  author       = {Muyiwa B. Balogun and
                  Olutayo O. Oyerinde and
                  Stanley H. Mneney},
  title        = {Adaptive Correction Algorithm for {OFDM-IDMA} Systems With Carrier
                  Frequency {OFFSET} in {A} Fast Fading Multipath Channel},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {201--220},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.231},
  doi          = {10.13052/JCSM2245-1439.231},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BalogunOM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Henry-Labordre13,
  author       = {Arnaud Henry{-}Labord{\`{e}}re},
  title        = {The Number Continuity Service: Part {II} {GSM} {CDMA} Seamless Technology
                  Change},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {83--103},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.214},
  doi          = {10.13052/JCSM2245-1439.214},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Henry-Labordre13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KusykGSm13,
  author       = {Janusz Kusyk and
                  Stephen Gundry and
                  Cem Safak Sahin and
                  M. mituyar},
  title        = {Performance metrics for self-positioning autonomous {MANET} nodes},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {151--173},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.223},
  doi          = {10.13052/JCSM2245-1439.223},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KusykGSm13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MaliatsosVK13,
  author       = {Konstantinos N. Maliatsos and
                  Panagiotis N. Vasileiou and
                  Athanasios G. Kanatas},
  title        = {Performance Evaluation of Beamspace {MIMO} Systems with Channel Estimation
                  in Realistic Environments},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {265--290},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.234},
  doi          = {10.13052/JCSM2245-1439.234},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MaliatsosVK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MishraM13,
  author       = {Amitabh Mishra and
                  Gerald Masson},
  title        = {MoCCA: {A} Mobile Cellular Cloud Architecture},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {105--125},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.221},
  doi          = {10.13052/JCSM2245-1439.221},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MishraM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OhbaC13,
  author       = {Yoshihiro Ohba and
                  Stephen Chasko},
  title        = {Performance Evaluation on 6LoWPANand {PANA} in {IEEE} 802.15.4gMesh
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {329--350},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.237},
  doi          = {10.13052/JCSM2245-1439.237},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OhbaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PantHSM13,
  author       = {Rabin Bilas Pant and
                  Hans{-}Petter Halvorsen and
                  Frode Skulbru and
                  Saba Mylvaganam},
  title        = {Intermediate measurement node for extension of {WSN} coverage},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {29--61},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.212},
  doi          = {10.13052/JCSM2245-1439.212},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PantHSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RathkanthiwarG13,
  author       = {Anagha. P. Rathkanthiwar and
                  Abhay S. Gandhi},
  title        = {New Efficient Timing and Frequency Error Estimation In {OFDM}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {291--306},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.235},
  doi          = {10.13052/JCSM2245-1439.235},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RathkanthiwarG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokalePP13,
  author       = {Vandana Milind Rohokale and
                  Neeli Rashmi Prasad and
                  Ramjee Prasad},
  title        = {Green Cooperative Web of Trust for Securityin Cognitive Radio Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {307--328},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.236},
  doi          = {10.13052/JCSM2245-1439.236},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokalePP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Schrage13,
  author       = {Reinhard Schrage},
  title        = {{NGSON} Service Composition Ontology},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {351--358},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.238},
  doi          = {10.13052/JCSM2245-1439.238},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Schrage13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TangeA13,
  author       = {Henrik Tange and
                  Birger Andersen},
  title        = {Dynamic {AES} Extending the Lifetime?},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {3-4},
  pages        = {243--164},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.233},
  doi          = {10.13052/JCSM2245-1439.233},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TangeA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/WangBMSS13,
  author       = {Wei Wang and
                  Jeffrey Bickford and
                  Ilona Murynets and
                  Ramesh Subbaraman and
                  Gokul Singaraju},
  title        = {Detecting Targeted Attacks By Multilayer Deception},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {175--199},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.224},
  doi          = {10.13052/JCSM2245-1439.224},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YanW13,
  author       = {Tan Yan and
                  Guiling Wang},
  title        = {Ivy: Interest-based Data Delivery in {VANET} through Neighbor Caching},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {2},
  pages        = {127--149},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.222},
  doi          = {10.13052/JCSM2245-1439.222},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YanW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YaqubBQ13,
  author       = {Raziq Yaqub and
                  Fahad Butt and
                  Umair Ahmed Qazi},
  title        = {Prevention of Unauthorized Unplugging of Un-attendant Recharging EVs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {2},
  number       = {1},
  pages        = {63--81},
  year         = {2013},
  url          = {https://doi.org/10.13052/jcsm2245-1439.213},
  doi          = {10.13052/JCSM2245-1439.213},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YaqubBQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics