Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm2.bht:"
@article{DBLP:journals/jcsm/AnggorojatiPP13, author = {Bayu Anggorojati and Neeli Rashmi Prasad and Ramjee Prasad}, title = {Efficient Fine Grained Access Control for {RFID} Inter-Enterprise System}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {221--242}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.232}, doi = {10.13052/JCSM2245-1439.232}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/AnggorojatiPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BabarRP13, author = {Sachin D. Babar and Neeli R. Neeli R. and Ramjee Prasad}, title = {Activity Modelling and Countermeasures on Jamming Attack}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {1--23}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.211}, doi = {10.13052/JCSM2245-1439.211}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BabarRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BalogunOM13, author = {Muyiwa B. Balogun and Olutayo O. Oyerinde and Stanley H. Mneney}, title = {Adaptive Correction Algorithm for {OFDM-IDMA} Systems With Carrier Frequency {OFFSET} in {A} Fast Fading Multipath Channel}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {201--220}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.231}, doi = {10.13052/JCSM2245-1439.231}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BalogunOM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Henry-Labordre13, author = {Arnaud Henry{-}Labord{\`{e}}re}, title = {The Number Continuity Service: Part {II} {GSM} {CDMA} Seamless Technology Change}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {83--103}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.214}, doi = {10.13052/JCSM2245-1439.214}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Henry-Labordre13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KusykGSm13, author = {Janusz Kusyk and Stephen Gundry and Cem Safak Sahin and M. mituyar}, title = {Performance metrics for self-positioning autonomous {MANET} nodes}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {151--173}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.223}, doi = {10.13052/JCSM2245-1439.223}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KusykGSm13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MaliatsosVK13, author = {Konstantinos N. Maliatsos and Panagiotis N. Vasileiou and Athanasios G. Kanatas}, title = {Performance Evaluation of Beamspace {MIMO} Systems with Channel Estimation in Realistic Environments}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {265--290}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.234}, doi = {10.13052/JCSM2245-1439.234}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MaliatsosVK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MishraM13, author = {Amitabh Mishra and Gerald Masson}, title = {MoCCA: {A} Mobile Cellular Cloud Architecture}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {105--125}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.221}, doi = {10.13052/JCSM2245-1439.221}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MishraM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OhbaC13, author = {Yoshihiro Ohba and Stephen Chasko}, title = {Performance Evaluation on 6LoWPANand {PANA} in {IEEE} 802.15.4gMesh Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {329--350}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.237}, doi = {10.13052/JCSM2245-1439.237}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OhbaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PantHSM13, author = {Rabin Bilas Pant and Hans{-}Petter Halvorsen and Frode Skulbru and Saba Mylvaganam}, title = {Intermediate measurement node for extension of {WSN} coverage}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {29--61}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.212}, doi = {10.13052/JCSM2245-1439.212}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PantHSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RathkanthiwarG13, author = {Anagha. P. Rathkanthiwar and Abhay S. Gandhi}, title = {New Efficient Timing and Frequency Error Estimation In {OFDM}}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {291--306}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.235}, doi = {10.13052/JCSM2245-1439.235}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RathkanthiwarG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokalePP13, author = {Vandana Milind Rohokale and Neeli Rashmi Prasad and Ramjee Prasad}, title = {Green Cooperative Web of Trust for Securityin Cognitive Radio Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {307--328}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.236}, doi = {10.13052/JCSM2245-1439.236}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokalePP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Schrage13, author = {Reinhard Schrage}, title = {{NGSON} Service Composition Ontology}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {351--358}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.238}, doi = {10.13052/JCSM2245-1439.238}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Schrage13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TangeA13, author = {Henrik Tange and Birger Andersen}, title = {Dynamic {AES} Extending the Lifetime?}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {3-4}, pages = {243--164}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.233}, doi = {10.13052/JCSM2245-1439.233}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TangeA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/WangBMSS13, author = {Wei Wang and Jeffrey Bickford and Ilona Murynets and Ramesh Subbaraman and Gokul Singaraju}, title = {Detecting Targeted Attacks By Multilayer Deception}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {175--199}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.224}, doi = {10.13052/JCSM2245-1439.224}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/WangBMSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YanW13, author = {Tan Yan and Guiling Wang}, title = {Ivy: Interest-based Data Delivery in {VANET} through Neighbor Caching}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {2}, pages = {127--149}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.222}, doi = {10.13052/JCSM2245-1439.222}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YanW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YaqubBQ13, author = {Raziq Yaqub and Fahad Butt and Umair Ahmed Qazi}, title = {Prevention of Unauthorized Unplugging of Un-attendant Recharging EVs}, journal = {J. Cyber Secur. Mobil.}, volume = {2}, number = {1}, pages = {63--81}, year = {2013}, url = {https://doi.org/10.13052/jcsm2245-1439.213}, doi = {10.13052/JCSM2245-1439.213}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YaqubBQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.