Search dblp for Publications

export results for "toc:db/journals/sap/sap5.bht:"

 download as .bib file

@article{DBLP:journals/sap/AlevizosTE22,
  author       = {Lampis Alevizos and
                  Vinh{-}Thong Ta and
                  Max Hashem Eiza},
  title        = {Augmenting zero trust architecture to endpoints using blockchain:
                  {A} state-of-the-art review},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.191},
  doi          = {10.1002/SPY2.191},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlevizosTE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlmousaZSA22,
  author       = {May Almousa and
                  Tianyang Zhang and
                  Abdolhossein Sarrafzadeh and
                  Mohd Anwar},
  title        = {Phishing website detection: How effective are deep learning-based
                  models and hyperparameter optimization?},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.256},
  doi          = {10.1002/SPY2.256},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlmousaZSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AnnaneALR22,
  author       = {Boubakeur Annane and
                  Adel Alti and
                  Lamri Laouamer and
                  Hamza Reffad},
  title        = {Cx-CP-ABE: Context-aware attribute-based access control schema and
                  blockchain technology to ensure scalable and efficient health data
                  privacy},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.249},
  doi          = {10.1002/SPY2.249},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AnnaneALR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AnwarGFG22,
  author       = {Memoona J. Anwar and
                  Asif Qumer Gill and
                  Anthony D. Fitzgibbon and
                  Inam Gull},
  title        = {{PESTLE+} risk analysis model to assess pandemic preparedness of digital
                  ecosystems},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.187},
  doi          = {10.1002/SPY2.187},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AnwarGFG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BairagiPBL22,
  author       = {Ravi Bairagi and
                  Preetesh Purohit and
                  Kailash Chandra Bandhu and
                  Ratnesh Litoriya},
  title        = {A secure and efficient mechanism for scheduling tasks in cloud computing
                  environments},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.252},
  doi          = {10.1002/SPY2.252},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BanerjeeKMAD22,
  author       = {Somesh Banerjee and
                  Khilesh Kumar and
                  Prajwal Masulkar and
                  Ruhul Amin and
                  Sanjeev Kumar Dwivedi},
  title        = {Blockchain and IPFS-based reliable land registry system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.236},
  doi          = {10.1002/SPY2.236},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BanerjeeKMAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BarmanCSB22,
  author       = {Subhas Barman and
                  Samiran Chattopadhyay and
                  Debasis Samanta and
                  Sayantani Barman},
  title        = {A blockchain-based approach to secure electronic health records using
                  fuzzy commitment scheme},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.231},
  doi          = {10.1002/SPY2.231},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BarmanCSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BasicevicBO22,
  author       = {Ilija Basicevic and
                  Nikola Blazic and
                  Stanislav Ocovaj},
  title        = {On the use of principal component analysis in the entropy based detection
                  of denial-of-service attacks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.193},
  doi          = {10.1002/SPY2.193},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BasicevicBO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BegumU22,
  author       = {Mahbuba Begum and
                  Mohammad Shorif Uddin},
  title        = {Towards the development of an effective image watermarking system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.196},
  doi          = {10.1002/SPY2.196},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BegumU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BelalMGD22,
  author       = {Mohamad Mulham Belal and
                  Tanmoy Maitra and
                  Debasis Giri and
                  Ashok Kumar Das},
  title        = {Chaotic neural networks and farfalle construction based parallel keyed
                  secure hash function},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.259},
  doi          = {10.1002/SPY2.259},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BelalMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BhavnaniBMS22,
  author       = {Harshit Bhavnani and
                  Shreyansh Bardia and
                  Aniket Modi and
                  Ujwal Shah},
  title        = {An extensive review of data security infrastructure and legislature},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.189},
  doi          = {10.1002/SPY2.189},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BhavnaniBMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BryantS22,
  author       = {Blake D. Bryant and
                  Hossein Saiedian},
  title        = {Key challenges in security of IoT devices and securing them with the
                  blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.251},
  doi          = {10.1002/SPY2.251},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BryantS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Bu-Pasha22,
  author       = {Shakila Bu{-}Pasha},
  title        = {Legal aspects, public interest, and legitimate interest in processing
                  personal data to operate autonomous buses in the regular transportation
                  system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.247},
  doi          = {10.1002/SPY2.247},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Bu-Pasha22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/CheccoBLB22,
  author       = {Alessandro Checco and
                  Lorenzo Bracciale and
                  Douglas J. Leith and
                  Giuseppe Bianchi},
  title        = {OpenNym: Privacy preserving recommending via pseudonymous group authentication},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.201},
  doi          = {10.1002/SPY2.201},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/CheccoBLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChhabraL22,
  author       = {Surbhi Chhabra and
                  Kusum Lata},
  title        = {Towards the enhancement of {AES} {IP} security using hardware obfuscation
                  technique: {A} practical approach for secure data transmission in
                  IoT},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.233},
  doi          = {10.1002/SPY2.233},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ChhabraL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChhikaraRMM22,
  author       = {Deepak Chhikara and
                  Saurabh Rana and
                  Ankita Mishra and
                  Dheerendra Mishra},
  title        = {Construction of elliptic curve cryptography-based authentication protocol
                  for internet of things},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.226},
  doi          = {10.1002/SPY2.226},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ChhikaraRMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Choudhury22,
  author       = {Hiten Choudhury},
  title        = {Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile
                  network for home network identity privacy},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.222},
  doi          = {10.1002/SPY2.222},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Choudhury22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DandoohEEH22,
  author       = {Azza Dandooh and
                  Adel S. El{-}Fishawy and
                  Fathi E. Abd El{-}Samie and
                  Ezz El{-}Din Hemdan},
  title        = {Secure audio signal transmission based on color image watermarking},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.185},
  doi          = {10.1002/SPY2.185},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DandoohEEH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DharminderNA22,
  author       = {Dharminder Dharminder and
                  Ankur Nehra and
                  Aditya Arya},
  title        = {A construction of Chebyshev chaotic map based authenticated key agreement
                  protocol for satellite communication system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.257},
  doi          = {10.1002/SPY2.257},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/DharminderNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Dirik22,
  author       = {Mahmut Dirik},
  title        = {Predicting credit card fraud using multipurpose classification based
                  on evolutionary rules},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.239},
  doi          = {10.1002/SPY2.239},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Dirik22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DosselmannH22,
  author       = {Richard Dosselmann and
                  Howard J. Hamilton},
  title        = {Limiting sensitive values in an anonymized table while reducing information
                  loss via p-proportion},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.202},
  doi          = {10.1002/SPY2.202},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DosselmannH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DoyleGG22,
  author       = {Joseph Doyle and
                  Muhammed Golec and
                  Sukhpal Singh Gill},
  title        = {BlockchainBus: {A} lightweight framework for secure virtual machine
                  migration in cloud federations using blockchain},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.197},
  doi          = {10.1002/SPY2.197},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DoyleGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EbazadehF22,
  author       = {Yaser Ebazadeh and
                  Reza Fotohi},
  title        = {A reliable and secure method for network-layer attack discovery and
                  elimination in mobile ad-hoc networks based on a probabilistic threshold},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.183},
  doi          = {10.1002/SPY2.183},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EbazadehF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EldesoukySAE22,
  author       = {Samer Eldesouky and
                  Walid El Shafai and
                  Hossam Eldin H. Ahmed and
                  Fathi E. Abd El{-}Samie},
  title        = {Cancelable electrocardiogram biometric system based on chaotic encryption
                  using three-dimensional logistic map for biometric-based cloud services},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.198},
  doi          = {10.1002/SPY2.198},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EldesoukySAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GargWSSD22,
  author       = {Neha Garg and
                  Mohammad Wazid and
                  Jaskaran Singh and
                  Devesh Pratap Singh and
                  Ashok Kumar Das},
  title        = {Security in IoMT-driven smart healthcare: {A} comprehensive review
                  and open challenges},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.235},
  doi          = {10.1002/SPY2.235},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/GargWSSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GermanosZ22,
  author       = {Vasileios Germanos and
                  Wen Zeng},
  title        = {Model-based risk assessment evaluation},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.240},
  doi          = {10.1002/SPY2.240},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/GermanosZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GuzeltepeC22,
  author       = {Murat G{\"{u}}zeltepe and
                  Selda {\c{C}}alkavur},
  title        = {Skew-cyclic codes based public-key cryptosystem approach},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.255},
  doi          = {10.1002/SPY2.255},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/GuzeltepeC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HathaliyaTS22,
  author       = {Jigna J. Hathaliya and
                  Sudeep Tanwar and
                  Priyanka Sharma},
  title        = {Adversarial learning techniques for security and privacy preservation:
                  {A} comprehensive review},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.209},
  doi          = {10.1002/SPY2.209},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HathaliyaTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HemavathiAZS22,
  author       = {Hemavathi and
                  S. Akhila and
                  Samreen Zubeda and
                  Shashidhara},
  title        = {{DS2AN:} Deep stacked sparse autoencoder for secure and fast authentication
                  in HetNets},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.208},
  doi          = {10.1002/SPY2.208},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HemavathiAZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JalaliNEAF22,
  author       = {Foad Jalali and
                  Mehran Alidoost Nia and
                  Tatiana Ermakova and
                  Meisam Abdollahi and
                  Benjamin Fabian},
  title        = {Investigating the role of usable security in developers' intention
                  toward security enhancement in service-oriented applications},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.199},
  doi          = {10.1002/SPY2.199},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KebandeC22,
  author       = {Victor R. Kebande and
                  Kim{-}Kwang Raymond Choo},
  title        = {Finite state machine for cloud forensic readiness as a service (CFRaaS)
                  events},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.182},
  doi          = {10.1002/SPY2.182},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KebandeC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarA22,
  author       = {Shivansh Kumar and
                  Ruhul Amin},
  title        = {Decentralized trade finance using blockchain and lightning network},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.260},
  doi          = {10.1002/SPY2.260},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KumarA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarOGB22,
  author       = {Adarsh Kumar and
                  Carlo Ottaviani and
                  Sukhpal Singh Gill and
                  Rajkumar Buyya},
  title        = {Securing the future internet of things with post-quantum cryptography},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.200},
  doi          = {10.1002/SPY2.200},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarOGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Li22,
  author       = {Yanting Li},
  title        = {A study of detection of abnormal network traffic: {A} comparison of
                  multiple algorithms},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.190},
  doi          = {10.1002/SPY2.190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Li22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LuL22,
  author       = {Yang Lu and
                  Shujun Li},
  title        = {From data flows to privacy-benefit trade-offs: {A} user-centric semantic
                  model},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.225},
  doi          = {10.1002/SPY2.225},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LuL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MadaniMM22,
  author       = {Mirmorsal Madani and
                  Homayun Motameni and
                  Hosein Mohamadi},
  title        = {Fake news detection using deep learning integrating feature extraction,
                  natural language processing, and statistical descriptors},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.264},
  doi          = {10.1002/SPY2.264},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MadaniMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MahasingheJ22,
  author       = {Anuradha Mahasinghe and
                  Youvin Jayasinghe},
  title        = {An initial step toward a quantum annealing approach to the discrete
                  logarithm problem},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.234},
  doi          = {10.1002/SPY2.234},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MahasingheJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MannaSM22,
  author       = {Asmita Manna and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {A risk-based methodology for privacy requirements elicitation and
                  control selection},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.188},
  doi          = {10.1002/SPY2.188},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MannaSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MardiH22,
  author       = {Dhaneshwar Mardi and
                  Jaydeep Howlader},
  title        = {Anonymous Bitcoin transaction: {A} solution using secure multiparty
                  computation},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.232},
  doi          = {10.1002/SPY2.232},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MardiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MartinRAA22,
  author       = {Kevin Martin and
                  Mohamed Rahouti and
                  Moussa Ayyash and
                  Izzat Alsmadi},
  title        = {Anomaly detection in blockchain using network representation and machine
                  learning},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.192},
  doi          = {10.1002/SPY2.192},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MartinRAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MatyokurehwaRGC22,
  author       = {Kanos Matyokurehwa and
                  Norman Rudhumbu and
                  Cross Gombiro and
                  Colletor Chipfumbu{-}Kangara},
  title        = {Enhanced social engineering framework mitigating against social engineering
                  attacks in higher education},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.237},
  doi          = {10.1002/SPY2.237},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MatyokurehwaRGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MukherjeeSM22,
  author       = {Preetam Mukherjee and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {"Security Gap" as a metric for enterprise business processes},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.263},
  doi          = {10.1002/SPY2.263},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MukherjeeSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MurthyAT22,
  author       = {Amith Murthy and
                  Muhammad Rizwan Asghar and
                  Wanqing Tu},
  title        = {Towards a data-driven framework for optimizing security-efficiency
                  tradeoff in {QUIC}},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.184},
  doi          = {10.1002/SPY2.184},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MurthyAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NemaN22,
  author       = {Prashant Nema and
                  Manisha J. Nene},
  title        = {Quantum web of trust},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.195},
  doi          = {10.1002/SPY2.195},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NemaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NemaN22a,
  author       = {Prashant Nema and
                  Manisha J. Nene},
  title        = {Qubits based mutual authentication protocol},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.203},
  doi          = {10.1002/SPY2.203},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NemaN22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PatelD22,
  author       = {Shreya Patel and
                  Rinku Dewri},
  title        = {Private record linkage with linkage maps},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.265},
  doi          = {10.1002/SPY2.265},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PatelD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PonnuruPROK22,
  author       = {Raveendra Babu Ponnuru and
                  Basker Palaniswamy and
                  Alavalapati Goutham Reddy and
                  Vanga Odelu and
                  Hyunsung Kim},
  title        = {A survey on security challenges and protocols of electric vehicle
                  dynamic charging system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.210},
  doi          = {10.1002/SPY2.210},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PonnuruPROK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RajamanickamVR22,
  author       = {Siranjeevi Rajamanickam and
                  Satyanarayana Vollala and
                  Natarajan Ramasubramanian},
  title        = {{EAPIOD:} {ECC} based authentication protocol for insider attack protection
                  in IoD scenario},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.248},
  doi          = {10.1002/SPY2.248},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/RajamanickamVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RanaKHS22,
  author       = {Shubham Rana and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep K. Shukla},
  title        = {Automated Windows behavioral tracing for malware analysis},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.253},
  doi          = {10.1002/SPY2.253},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/RanaKHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RenugadeviTVJB22,
  author       = {N. Renugadevi and
                  Shirisha Thangallapally and
                  Sai Charan Vemula and
                  Stheya Julakanti and
                  Somya Bhatnagar},
  title        = {Methods for improving the implementation of advanced encryption standard
                  hardware accelerator on field programmable gate array-A survey},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.254},
  doi          = {10.1002/SPY2.254},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RenugadeviTVJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RipanIAS22,
  author       = {Rony Chowdhury Ripan and
                  Md. Moinul Islam and
                  Hamed AlQahtani and
                  Iqbal H. Sarker},
  title        = {Effectively predicting cyber-attacks through isolation forest learning-based
                  outlier detection},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.212},
  doi          = {10.1002/SPY2.212},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RipanIAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SaadKB22,
  author       = {Sabra Ben Saad and
                  Adlen Ksentini and
                  Bouziane Brik},
  title        = {An end-to-end trusted architecture for network slicing in 5G and beyond
                  networks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.186},
  doi          = {10.1002/SPY2.186},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SaadKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SaurabhS22,
  author       = {Shyam Saurabh and
                  Kishore Sinha},
  title        = {Perfect secret sharing schemes from combinatorial squares},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.262},
  doi          = {10.1002/SPY2.262},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SaurabhS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/StephenJ22,
  author       = {Steffie Maria Stephen and
                  Arunita Jaekel},
  title        = {Roadside unit-based pseudonym authentication in vehicular ad hoc network},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.238},
  doi          = {10.1002/SPY2.238},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/StephenJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SumithraSM22,
  author       = {V. Sumithra and
                  Shashidhara and
                  Debajyoti Mukhopadhyay},
  title        = {Design of a secure and privacy preserving authentication protocol
                  for telecare medical information systems},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.228},
  doi          = {10.1002/SPY2.228},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SumithraSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasmeenU22,
  author       = {Fauzia Yasmeen and
                  Mohammad Shorif Uddin},
  title        = {A novel watermarking scheme based on discrete wavelet transform-singular
                  value decomposition},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.216},
  doi          = {10.1002/SPY2.216},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YasmeenU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasmeenU22a,
  author       = {Fauzia Yasmeen and
                  Mohammad Shorif Uddin},
  title        = {An efficient image steganography approach based on {QR} factorization
                  and singular value decomposition in non-subsampled contourlet transform
                  domain},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.229},
  doi          = {10.1002/SPY2.229},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/YasmeenU22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YiHZM22,
  author       = {Yuzi Yi and
                  Jingsha He and
                  Nafei Zhu and
                  Xiangjun Ma},
  title        = {Social influence-based privacy inference attacks in online social
                  networks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.194},
  doi          = {10.1002/SPY2.194},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YiHZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZengBX22,
  author       = {Fanfeng Zeng and
                  Haoyin Bai and
                  Ke Xiao},
  title        = {Blind watermarking algorithm combining NSCT, DWT, SVD, and {HVS}},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.223},
  doi          = {10.1002/SPY2.223},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ZengBX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZeydanTT22,
  author       = {Engin Zeydan and
                  Yekta Turk and
                  Yaman Yagiz Tasbag},
  title        = {Entropy service for secure real-time mission critical communications},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.258},
  doi          = {10.1002/SPY2.258},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ZeydanTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZhangZJY22,
  author       = {Yongbing Zhang and
                  Qiuyu Zhang and
                  Yilong Jiang and
                  Yan Yan},
  title        = {A location privacy protection method based on cipher-text retrieval
                  in cloud environment},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.250},
  doi          = {10.1002/SPY2.250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZhangZJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics