Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jisis/jisis3.bht:"
@article{DBLP:journals/jisis/AllalB13, author = {Salim Allal and Saadi Boudjit}, title = {Geocast Routing Protocols for VANETs: Survey and Geometry-Driven Scheme Proposal}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {20--36}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.020}, doi = {10.22667/JISIS.2013.02.31.020}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/AllalB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ChenP13, author = {Liang (Ben) Chen and Maria Prokopi}, title = {Enabling Resource-Aware Ubiquitous Applications for Personal Cloud with a Pairing Device Framework}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {83--100}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.083}, doi = {10.22667/JISIS.2013.02.31.083}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ChenP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ChoiCKCK13, author = {Junho Choi and Chang Choi and Byeongkyu Ko and Dongjin Choi and Pankoo Kim}, title = {Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {28--37}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.028}, doi = {10.22667/JISIS.2013.11.31.028}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ChoiCKCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/DabrowskiGMF13, author = {Marek Dabrowski and Justyna Gromada and Hassnaa Moustafa and Jacky Forestier}, title = {A context-aware architecture for {IPTV} services personalization}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {49--70}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.049}, doi = {10.22667/JISIS.2013.02.31.049}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/DabrowskiGMF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/DhurandherSW13, author = {Sanjay Kumar Dhurandher and Deepak Kumar Sharma and Isaac Woungang}, title = {Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {37--48}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.037}, doi = {10.22667/JISIS.2013.02.31.037}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/DhurandherSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FloresAS13, author = {Denys A. Flores and Olga Angelopoulou and Richard J. Self}, title = {An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {101--114}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.101}, doi = {10.22667/JISIS.2013.02.31.101}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FloresAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/IvanovaPHK13, author = {Marieta Georgieva Ivanova and Christian W. Probst and Ren{\'{e}} Rydhof Hansen and Florian Kamm{\"{u}}ller}, title = {Externalizing Behaviour for Analysing System Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {52--62}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.052}, doi = {10.22667/JISIS.2013.11.31.052}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KangK13, author = {Ho{-}Seok Kang and Sung{-}Ryul Kim}, title = {A New Logging-based {IP} Traceback Approach using Data Mining Techniques}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {72--80}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.072}, doi = {10.22667/JISIS.2013.11.31.072}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KangK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KimCCH13, author = {Hyungdong Kim and YongJe Choi and Dooho Choi and JaeCheol Ha}, title = {A New Exponentiation Algorithm Resistant to Combined Side Channel Attack}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {17--27}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.017}, doi = {10.22667/JISIS.2013.11.31.017}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KimCCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KimLLJVY13, author = {Jaein Kim and Youngjun Lee and Kyungroul Lee and Taeyoung Jung and Dmitry Volokhov and Kangbin Yim}, title = {Vulnerability to Flash Controller for Secure {USB} Drives}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {136--145}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.136}, doi = {10.22667/JISIS.2013.11.31.136}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KimLLJVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LeePC13, author = {Hwan{-}taek Lee and Minkyu Park and Seong{-}je Cho}, title = {Detection and prevention of LeNa Malware on Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {63--71}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.063}, doi = {10.22667/JISIS.2013.11.31.063}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LeePC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LeeSS13, author = {Hyejoo Lee and Changho Seo and Sang{-}Uk Shin}, title = {{DRM} Cloud Architecture and Service Scenario for Content Protection}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {94--105}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.094}, doi = {10.22667/JISIS.2013.11.31.094}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LeeSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/RamosJMS13, author = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio J. Jara and Leandro Mar{\'{\i}}n and Antonio F. Skarmeta}, title = {Distributed Capability-based Access Control for the Internet of Things}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {1--16}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.001}, doi = {10.22667/JISIS.2013.11.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/RamosJMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SelviVPR13, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan and C. Pandu Rangan}, title = {Efficient Certificateless Online/Offline Signature with tight security}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {115--137}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.115}, doi = {10.22667/JISIS.2013.02.31.115}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SelviVPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ShimaK13, author = {Shigeyoshi Shima and Ayako Komatsu}, title = {Guidelines for the Prevention of Internal Improprieties in Japanese Organization}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {81--93}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.081}, doi = {10.22667/JISIS.2013.11.31.081}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ShimaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghPB13, author = {Kunwar Singh and C. Pandurangan and A. K. Banerjee}, title = {Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {5--19}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.005}, doi = {10.22667/JISIS.2013.02.31.005}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SinghRB13, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Identity Based Proxy Re-Encryption Scheme}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {38--51}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.038}, doi = {10.22667/JISIS.2013.11.31.038}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SinghRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SunSYQ13, author = {Liang Sun and Fei Song and Dong Yang and Yajuan Qin}, title = {DHR-CCN, Distributed Hierarchical Routing for Content Centric Network}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {71--82}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.071}, doi = {10.22667/JISIS.2013.02.31.071}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SunSYQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/WuLYXW13, author = {Guowei Wu and Zuosong Liu and Lin Yao and Zhenzhen Xu and Wei Wang}, title = {A Fuzzy-based Trust Management in WSNs}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {124--135}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.124}, doi = {10.22667/JISIS.2013.11.31.124}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/WuLYXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/YeCM13, author = {Jun Ye and Xiaofeng Chen and Jianfeng Ma}, title = {Constructing Verifiable Random Number in Finite Field}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {106--115}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.106}, doi = {10.22667/JISIS.2013.11.31.106}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/YeCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ZhaoWX13, author = {Baokang Zhao and Chunqing Wu and Qin Xin}, title = {Guest Editorial: Special Issue on Advances in Internet Security and Technology}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {1--4}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.001}, doi = {10.22667/JISIS.2013.02.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ZhaoWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ZhouLMY13, author = {Yonglin Zhou and Qing{-}Shan Li and Qidi Miao and Kangbin Yim}, title = {DGA-Based Botnet Detection Using {DNS} Traffic}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {116--123}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.116}, doi = {10.22667/JISIS.2013.11.31.116}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ZhouLMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.