Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/sap/sap5.bht:"
@article{DBLP:journals/sap/AlevizosTE22, author = {Lampis Alevizos and Vinh{-}Thong Ta and Max Hashem Eiza}, title = {Augmenting zero trust architecture to endpoints using blockchain: {A} state-of-the-art review}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.191}, doi = {10.1002/SPY2.191}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlevizosTE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AlmousaZSA22, author = {May Almousa and Tianyang Zhang and Abdolhossein Sarrafzadeh and Mohd Anwar}, title = {Phishing website detection: How effective are deep learning-based models and hyperparameter optimization?}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.256}, doi = {10.1002/SPY2.256}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AlmousaZSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AnnaneALR22, author = {Boubakeur Annane and Adel Alti and Lamri Laouamer and Hamza Reffad}, title = {Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.249}, doi = {10.1002/SPY2.249}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AnnaneALR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/AnwarGFG22, author = {Memoona J. Anwar and Asif Qumer Gill and Anthony D. Fitzgibbon and Inam Gull}, title = {{PESTLE+} risk analysis model to assess pandemic preparedness of digital ecosystems}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.187}, doi = {10.1002/SPY2.187}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/AnwarGFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BairagiPBL22, author = {Ravi Bairagi and Preetesh Purohit and Kailash Chandra Bandhu and Ratnesh Litoriya}, title = {A secure and efficient mechanism for scheduling tasks in cloud computing environments}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.252}, doi = {10.1002/SPY2.252}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BanerjeeKMAD22, author = {Somesh Banerjee and Khilesh Kumar and Prajwal Masulkar and Ruhul Amin and Sanjeev Kumar Dwivedi}, title = {Blockchain and IPFS-based reliable land registry system}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.236}, doi = {10.1002/SPY2.236}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BanerjeeKMAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BarmanCSB22, author = {Subhas Barman and Samiran Chattopadhyay and Debasis Samanta and Sayantani Barman}, title = {A blockchain-based approach to secure electronic health records using fuzzy commitment scheme}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.231}, doi = {10.1002/SPY2.231}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BarmanCSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BasicevicBO22, author = {Ilija Basicevic and Nikola Blazic and Stanislav Ocovaj}, title = {On the use of principal component analysis in the entropy based detection of denial-of-service attacks}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.193}, doi = {10.1002/SPY2.193}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BasicevicBO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BegumU22, author = {Mahbuba Begum and Mohammad Shorif Uddin}, title = {Towards the development of an effective image watermarking system}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.196}, doi = {10.1002/SPY2.196}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BegumU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BelalMGD22, author = {Mohamad Mulham Belal and Tanmoy Maitra and Debasis Giri and Ashok Kumar Das}, title = {Chaotic neural networks and farfalle construction based parallel keyed secure hash function}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.259}, doi = {10.1002/SPY2.259}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BelalMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BhavnaniBMS22, author = {Harshit Bhavnani and Shreyansh Bardia and Aniket Modi and Ujwal Shah}, title = {An extensive review of data security infrastructure and legislature}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.189}, doi = {10.1002/SPY2.189}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BhavnaniBMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BryantS22, author = {Blake D. Bryant and Hossein Saiedian}, title = {Key challenges in security of IoT devices and securing them with the blockchain technology}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.251}, doi = {10.1002/SPY2.251}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BryantS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Bu-Pasha22, author = {Shakila Bu{-}Pasha}, title = {Legal aspects, public interest, and legitimate interest in processing personal data to operate autonomous buses in the regular transportation system}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.247}, doi = {10.1002/SPY2.247}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Bu-Pasha22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/CheccoBLB22, author = {Alessandro Checco and Lorenzo Bracciale and Douglas J. Leith and Giuseppe Bianchi}, title = {OpenNym: Privacy preserving recommending via pseudonymous group authentication}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.201}, doi = {10.1002/SPY2.201}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/CheccoBLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChhabraL22, author = {Surbhi Chhabra and Kusum Lata}, title = {Towards the enhancement of {AES} {IP} security using hardware obfuscation technique: {A} practical approach for secure data transmission in IoT}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.233}, doi = {10.1002/SPY2.233}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ChhabraL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ChhikaraRMM22, author = {Deepak Chhikara and Saurabh Rana and Ankita Mishra and Dheerendra Mishra}, title = {Construction of elliptic curve cryptography-based authentication protocol for internet of things}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.226}, doi = {10.1002/SPY2.226}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ChhikaraRMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Choudhury22, author = {Hiten Choudhury}, title = {Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.222}, doi = {10.1002/SPY2.222}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Choudhury22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DandoohEEH22, author = {Azza Dandooh and Adel S. El{-}Fishawy and Fathi E. Abd El{-}Samie and Ezz El{-}Din Hemdan}, title = {Secure audio signal transmission based on color image watermarking}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.185}, doi = {10.1002/SPY2.185}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DandoohEEH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DharminderNA22, author = {Dharminder Dharminder and Ankur Nehra and Aditya Arya}, title = {A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.257}, doi = {10.1002/SPY2.257}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/DharminderNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Dirik22, author = {Mahmut Dirik}, title = {Predicting credit card fraud using multipurpose classification based on evolutionary rules}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.239}, doi = {10.1002/SPY2.239}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/Dirik22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DosselmannH22, author = {Richard Dosselmann and Howard J. Hamilton}, title = {Limiting sensitive values in an anonymized table while reducing information loss via p-proportion}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.202}, doi = {10.1002/SPY2.202}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DosselmannH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/DoyleGG22, author = {Joseph Doyle and Muhammed Golec and Sukhpal Singh Gill}, title = {BlockchainBus: {A} lightweight framework for secure virtual machine migration in cloud federations using blockchain}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.197}, doi = {10.1002/SPY2.197}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/DoyleGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/EbazadehF22, author = {Yaser Ebazadeh and Reza Fotohi}, title = {A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.183}, doi = {10.1002/SPY2.183}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/EbazadehF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/EldesoukySAE22, author = {Samer Eldesouky and Walid El Shafai and Hossam Eldin H. Ahmed and Fathi E. Abd El{-}Samie}, title = {Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.198}, doi = {10.1002/SPY2.198}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/EldesoukySAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GargWSSD22, author = {Neha Garg and Mohammad Wazid and Jaskaran Singh and Devesh Pratap Singh and Ashok Kumar Das}, title = {Security in IoMT-driven smart healthcare: {A} comprehensive review and open challenges}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.235}, doi = {10.1002/SPY2.235}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/GargWSSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GermanosZ22, author = {Vasileios Germanos and Wen Zeng}, title = {Model-based risk assessment evaluation}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.240}, doi = {10.1002/SPY2.240}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/GermanosZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/GuzeltepeC22, author = {Murat G{\"{u}}zeltepe and Selda {\c{C}}alkavur}, title = {Skew-cyclic codes based public-key cryptosystem approach}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.255}, doi = {10.1002/SPY2.255}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/GuzeltepeC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HathaliyaTS22, author = {Jigna J. Hathaliya and Sudeep Tanwar and Priyanka Sharma}, title = {Adversarial learning techniques for security and privacy preservation: {A} comprehensive review}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.209}, doi = {10.1002/SPY2.209}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HathaliyaTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/HemavathiAZS22, author = {Hemavathi and S. Akhila and Samreen Zubeda and Shashidhara}, title = {{DS2AN:} Deep stacked sparse autoencoder for secure and fast authentication in HetNets}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.208}, doi = {10.1002/SPY2.208}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/HemavathiAZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/JalaliNEAF22, author = {Foad Jalali and Mehran Alidoost Nia and Tatiana Ermakova and Meisam Abdollahi and Benjamin Fabian}, title = {Investigating the role of usable security in developers' intention toward security enhancement in service-oriented applications}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.199}, doi = {10.1002/SPY2.199}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KebandeC22, author = {Victor R. Kebande and Kim{-}Kwang Raymond Choo}, title = {Finite state machine for cloud forensic readiness as a service (CFRaaS) events}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.182}, doi = {10.1002/SPY2.182}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KebandeC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarA22, author = {Shivansh Kumar and Ruhul Amin}, title = {Decentralized trade finance using blockchain and lightning network}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.260}, doi = {10.1002/SPY2.260}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/KumarA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KumarOGB22, author = {Adarsh Kumar and Carlo Ottaviani and Sukhpal Singh Gill and Rajkumar Buyya}, title = {Securing the future internet of things with post-quantum cryptography}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.200}, doi = {10.1002/SPY2.200}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KumarOGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Li22, author = {Yanting Li}, title = {A study of detection of abnormal network traffic: {A} comparison of multiple algorithms}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.190}, doi = {10.1002/SPY2.190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/LuL22, author = {Yang Lu and Shujun Li}, title = {From data flows to privacy-benefit trade-offs: {A} user-centric semantic model}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.225}, doi = {10.1002/SPY2.225}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/LuL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MadaniMM22, author = {Mirmorsal Madani and Homayun Motameni and Hosein Mohamadi}, title = {Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.264}, doi = {10.1002/SPY2.264}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MadaniMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MahasingheJ22, author = {Anuradha Mahasinghe and Youvin Jayasinghe}, title = {An initial step toward a quantum annealing approach to the discrete logarithm problem}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.234}, doi = {10.1002/SPY2.234}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MahasingheJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MannaSM22, author = {Asmita Manna and Anirban Sengupta and Chandan Mazumdar}, title = {A risk-based methodology for privacy requirements elicitation and control selection}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.188}, doi = {10.1002/SPY2.188}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MannaSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MardiH22, author = {Dhaneshwar Mardi and Jaydeep Howlader}, title = {Anonymous Bitcoin transaction: {A} solution using secure multiparty computation}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.232}, doi = {10.1002/SPY2.232}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MardiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MartinRAA22, author = {Kevin Martin and Mohamed Rahouti and Moussa Ayyash and Izzat Alsmadi}, title = {Anomaly detection in blockchain using network representation and machine learning}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.192}, doi = {10.1002/SPY2.192}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MartinRAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MatyokurehwaRGC22, author = {Kanos Matyokurehwa and Norman Rudhumbu and Cross Gombiro and Colletor Chipfumbu{-}Kangara}, title = {Enhanced social engineering framework mitigating against social engineering attacks in higher education}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.237}, doi = {10.1002/SPY2.237}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MatyokurehwaRGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MukherjeeSM22, author = {Preetam Mukherjee and Anirban Sengupta and Chandan Mazumdar}, title = {"Security Gap" as a metric for enterprise business processes}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.263}, doi = {10.1002/SPY2.263}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/MukherjeeSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/MurthyAT22, author = {Amith Murthy and Muhammad Rizwan Asghar and Wanqing Tu}, title = {Towards a data-driven framework for optimizing security-efficiency tradeoff in {QUIC}}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.184}, doi = {10.1002/SPY2.184}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/MurthyAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NemaN22, author = {Prashant Nema and Manisha J. Nene}, title = {Quantum web of trust}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.195}, doi = {10.1002/SPY2.195}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NemaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/NemaN22a, author = {Prashant Nema and Manisha J. Nene}, title = {Qubits based mutual authentication protocol}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.203}, doi = {10.1002/SPY2.203}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/NemaN22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PatelD22, author = {Shreya Patel and Rinku Dewri}, title = {Private record linkage with linkage maps}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.265}, doi = {10.1002/SPY2.265}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/PatelD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PonnuruPROK22, author = {Raveendra Babu Ponnuru and Basker Palaniswamy and Alavalapati Goutham Reddy and Vanga Odelu and Hyunsung Kim}, title = {A survey on security challenges and protocols of electric vehicle dynamic charging system}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.210}, doi = {10.1002/SPY2.210}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PonnuruPROK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RajamanickamVR22, author = {Siranjeevi Rajamanickam and Satyanarayana Vollala and Natarajan Ramasubramanian}, title = {{EAPIOD:} {ECC} based authentication protocol for insider attack protection in IoD scenario}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.248}, doi = {10.1002/SPY2.248}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/RajamanickamVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RanaKHS22, author = {Shubham Rana and Nitesh Kumar and Anand Handa and Sandeep K. Shukla}, title = {Automated Windows behavioral tracing for malware analysis}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.253}, doi = {10.1002/SPY2.253}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/RanaKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RenugadeviTVJB22, author = {N. Renugadevi and Shirisha Thangallapally and Sai Charan Vemula and Stheya Julakanti and Somya Bhatnagar}, title = {Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array-A survey}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.254}, doi = {10.1002/SPY2.254}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RenugadeviTVJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/RipanIAS22, author = {Rony Chowdhury Ripan and Md. Moinul Islam and Hamed AlQahtani and Iqbal H. Sarker}, title = {Effectively predicting cyber-attacks through isolation forest learning-based outlier detection}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.212}, doi = {10.1002/SPY2.212}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/RipanIAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SaadKB22, author = {Sabra Ben Saad and Adlen Ksentini and Bouziane Brik}, title = {An end-to-end trusted architecture for network slicing in 5G and beyond networks}, journal = {Secur. Priv.}, volume = {5}, number = {1}, year = {2022}, url = {https://doi.org/10.1002/spy2.186}, doi = {10.1002/SPY2.186}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SaadKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SaurabhS22, author = {Shyam Saurabh and Kishore Sinha}, title = {Perfect secret sharing schemes from combinatorial squares}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.262}, doi = {10.1002/SPY2.262}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SaurabhS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/StephenJ22, author = {Steffie Maria Stephen and Arunita Jaekel}, title = {Roadside unit-based pseudonym authentication in vehicular ad hoc network}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.238}, doi = {10.1002/SPY2.238}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/StephenJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SumithraSM22, author = {V. Sumithra and Shashidhara and Debajyoti Mukhopadhyay}, title = {Design of a secure and privacy preserving authentication protocol for telecare medical information systems}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.228}, doi = {10.1002/SPY2.228}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/SumithraSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasmeenU22, author = {Fauzia Yasmeen and Mohammad Shorif Uddin}, title = {A novel watermarking scheme based on discrete wavelet transform-singular value decomposition}, journal = {Secur. Priv.}, volume = {5}, number = {3}, year = {2022}, url = {https://doi.org/10.1002/spy2.216}, doi = {10.1002/SPY2.216}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YasmeenU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YasmeenU22a, author = {Fauzia Yasmeen and Mohammad Shorif Uddin}, title = {An efficient image steganography approach based on {QR} factorization and singular value decomposition in non-subsampled contourlet transform domain}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.229}, doi = {10.1002/SPY2.229}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/YasmeenU22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/YiHZM22, author = {Yuzi Yi and Jingsha He and Nafei Zhu and Xiangjun Ma}, title = {Social influence-based privacy inference attacks in online social networks}, journal = {Secur. Priv.}, volume = {5}, number = {2}, year = {2022}, url = {https://doi.org/10.1002/spy2.194}, doi = {10.1002/SPY2.194}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/YiHZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZengBX22, author = {Fanfeng Zeng and Haoyin Bai and Ke Xiao}, title = {Blind watermarking algorithm combining NSCT, DWT, SVD, and {HVS}}, journal = {Secur. Priv.}, volume = {5}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/spy2.223}, doi = {10.1002/SPY2.223}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ZengBX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZeydanTT22, author = {Engin Zeydan and Yekta Turk and Yaman Yagiz Tasbag}, title = {Entropy service for secure real-time mission critical communications}, journal = {Secur. Priv.}, volume = {5}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/spy2.258}, doi = {10.1002/SPY2.258}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/ZeydanTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZhangZJY22, author = {Yongbing Zhang and Qiuyu Zhang and Yilong Jiang and Yan Yan}, title = {A location privacy protection method based on cipher-text retrieval in cloud environment}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.250}, doi = {10.1002/SPY2.250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZhangZJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.