Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:journals/istr:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/istr/AhmadYLCLUSWHLZSC24, author = {Ijaz Ahmad and Chen Yao and Lin Li and Yan Chen and Zhenzhen Liu and Inam Ullah and Mohammad Shabaz and Xin Wang and Kaiyang Huang and Guanglin Li and Guoru Zhao and Oluwarotimi Williams Samuel and Shixiong Chen}, title = {An efficient feature selection and explainable classification method for EEG-based epileptic seizure detection}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103654}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103654}, doi = {10.1016/J.JISA.2023.103654}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhmadYLCLUSWHLZSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Alawida24, author = {Moatsum Alawida}, title = {Enhancing logistic chaotic map for improved cryptographic security in random number generation}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103685}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103685}, doi = {10.1016/J.JISA.2023.103685}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Alawida24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AwadBBS24, author = {Ali Ismail Awad and Aiswarya Babu and Ezedin Barka and Khaled Shuaib}, title = {AI-powered biometrics for Internet of Things security: {A} review and future vision}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103748}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103748}, doi = {10.1016/J.JISA.2024.103748}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AwadBBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BillaDBO24, author = {Nikhil Reddy Billa and Bibhash Pran Das and Mrutyunjay Biswal and Manish Okade}, title = {{CNN} based image resizing forensics for double compressed {JPEG} images}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103693}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103693}, doi = {10.1016/J.JISA.2023.103693}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BillaDBO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BravoOrtizRPHAAOCT24, author = {Mario Alejandro Bravo{-}Ortiz and Esteban Mercado Ruiz and Juan Pablo Villa Pulgarin and Carlos Angel Hormaza{-}Cardona and Sebasti{\'{a}}n Qui{\~{n}}ones Arredondo and Harold Brayan Arteaga{-}Arteaga and Simon Orozco{-}Arias and Oscar Cardona{-}Morales and Reinel Tabares{-}Soto}, title = {CVTStego-Net: {A} convolutional vision transformer architecture for spatial image steganalysis}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103695}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103695}, doi = {10.1016/J.JISA.2023.103695}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BravoOrtizRPHAAOCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaharlangMH24, author = {Javad Chaharlang and Mohammad Mosleh and Saeed Rasouli Heikalabad}, title = {Quantum Reversible Audio Steganalysis Using Quantum Schmidt Decomposition and Quantum Support Vector Machine}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103755}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103755}, doi = {10.1016/J.JISA.2024.103755}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaharlangMH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChakrabortyBK24, author = {Abhilash Chakraborty and Anupam Biswas and Ajoy Kumar Khan}, title = {{SRIJAN:} Secure Randomized Internally Joined Adjustable Network for one-way hashing}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103717}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103717}, doi = {10.1016/J.JISA.2024.103717}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChakrabortyBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChangGPLZCTG24, author = {Guoqin Chang and Haichang Gao and Ge Pei and Sainan Luo and Yang Zhang and Nuo Cheng and Yiwen Tang and Qianwen Guo}, title = {The robustness of behavior-verification-based slider CAPTCHAs}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103711}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103711}, doi = {10.1016/J.JISA.2024.103711}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChangGPLZCTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenWL24, author = {Xiao Chen and Baocheng Wang and Haibin Li}, title = {A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103708}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103708}, doi = {10.1016/J.JISA.2024.103708}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenZJTZ24, author = {Jinliang Chen and Tianqi Zhou and Sai Ji and Haowen Tan and Wenying Zheng}, title = {Efficient public auditing scheme for non-administrator group with secure user revocation}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103676}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103676}, doi = {10.1016/J.JISA.2023.103676}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenZJTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChengLZZYS24, author = {Haotian Cheng and Xiaofeng Li and He Zhao and Tong Zhou and Bin Yu and Nianzu Sheng}, title = {S-Cred: An accountable anonymous credential scheme with decentralized verification and flexible revocation}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103735}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103735}, doi = {10.1016/J.JISA.2024.103735}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChengLZZYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CosciaDGMP24, author = {Antonio Coscia and Vincenzo Dentamaro and Stefano Galantucci and Antonio Maci and Giuseppe Pirlo}, title = {Automatic decision tree-based {NIDPS} ruleset generation for DoS/DDoS attacks}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103736}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103736}, doi = {10.1016/J.JISA.2024.103736}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CosciaDGMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DiroZSKP24, author = {Abebe Abeshu Diro and Lu Zhou and Akanksha Saini and Shahriar Kaisar and Cong Hiep Pham}, title = {Leveraging zero knowledge proofs for blockchain-based identity sharing: {A} survey of advancements, challenges and opportunities}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103678}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103678}, doi = {10.1016/J.JISA.2023.103678}, timestamp = {Tue, 14 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DiroZSKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DruliacBRDHRH24, author = {Horia Druliac and Matthew Bardsley and Chris Riches and Christian Dunn and Luke Harrison and Bimal Roy and Feng Hao}, title = {On the feasibility of {E2E} verifiable online voting - {A} case study from Durga Puja trial}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103719}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103719}, doi = {10.1016/J.JISA.2024.103719}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DruliacBRDHRH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FahdAISK24, author = {Shah Fahd and Mehreen Afzal and Waseem Iqbal and Dawood Shah and Ijaz Khalid}, title = {The reality of backdoored S-Boxes - An eye opener}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103674}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103674}, doi = {10.1016/J.JISA.2023.103674}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FahdAISK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FariasCBH24, author = {Julio Cesar Leitao Albuquerque de Farias and Andrei Carniel and Juliana de Melo Bezerra and Celso Massaki Hirata}, title = {Approach based on {STPA} extended with {STRIDE} and LINDDUN, and blockchain to develop a mission-critical e-voting system}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103715}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103715}, doi = {10.1016/J.JISA.2024.103715}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FariasCBH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GambhirDBSG24, author = {Pooja Gambhir and Amita Dev and Poonam Bansal and Deepak Kumar Sharma and Deepak Gupta}, title = {Residual networks for text-independent speaker identification: Unleashing the power of residual learning}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103665}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103665}, doi = {10.1016/J.JISA.2023.103665}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GambhirDBSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GokceGC24, author = {Neslihan Yaman G{\"{o}}kce and Anil Burak G{\"{o}}kce and Murat Cenk}, title = {A fast {NTRU} software implementation based on 5-way {TMVP}}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103688}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103688}, doi = {10.1016/J.JISA.2023.103688}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GokceGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoTLZD24, author = {Jiaqi Guo and Cong Tian and Xu Lu and Liang Zhao and Zhenhua Duan}, title = {Multi-keyword ranked search with access control for multiple data owners in the cloud}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103742}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103742}, doi = {10.1016/J.JISA.2024.103742}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoTLZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HeZZ24, author = {Jinwen He and Hegui Zhu and Xv Zhou}, title = {Quantum image encryption algorithm via optimized quantum circuit and parity bit-plane permutation}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103698}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103698}, doi = {10.1016/J.JISA.2024.103698}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HeZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Hu24, author = {Hwai{-}Tsu Hu}, title = {Synergistic compensation for RGB-based blind color image watermarking to withstand {JPEG} compression}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103673}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103673}, doi = {10.1016/J.JISA.2023.103673}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Hu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaiphrakpamTPK24, author = {Dolendro Singh Laiphrakpam and Rohit Thingbaijam and Ripon Patgiri and Motilal Singh Khoirom}, title = {Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103694}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103694}, doi = {10.1016/J.JISA.2023.103694}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LaiphrakpamTPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LayeghyGP24, author = {Siamak Layeghy and Marcus Gallagher and Marius Portmann}, title = {Benchmarking the benchmark - Comparing synthetic and real-world Network {IDS} datasets}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103689}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103689}, doi = {10.1016/J.JISA.2023.103689}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LayeghyGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiCG24, author = {Xuelian Li and Zhuohao Chen and Juntao Gao}, title = {Ciphertext face recognition system based on secure inner product protocol}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103681}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103681}, doi = {10.1016/J.JISA.2023.103681}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiHCWY24, author = {Quanrun Li and Debiao He and Yitao Chen and Jiaming Wen and Zhichao Yang}, title = {An efficient quantum-resistant undeniable signature protocol for the E-voting system}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103714}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103714}, doi = {10.1016/J.JISA.2024.103714}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiHCWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLBHH24, author = {Yanjun Li and Hao Lin and Xinjie Bi and Shanshan Huo and Yiyi Han}, title = {MILP-based differential cryptanalysis on full-round shadow}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103696}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103696}, doi = {10.1016/J.JISA.2023.103696}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLBHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiRGH24, author = {Wenjuan Li and Philip Rosenberg and Mads Glisby and Michael Han}, title = {Designing energy-aware collaborative intrusion detection in IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103713}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103713}, doi = {10.1016/J.JISA.2024.103713}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiRGH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinLLC24, author = {Yijie Lin and Chia{-}Chen Lin and Jui{-}Chuan Liu and Chin{-}Chen Chang}, title = {Verifiable (\emph{t, n}) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103679}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103679}, doi = {10.1016/J.JISA.2023.103679}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinLLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuTULW24, author = {Huipeng Liu and Lin Teng and Salahuddin Unar and Pengbo Liu and Xingyuan Wang}, title = {Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103723}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103723}, doi = {10.1016/J.JISA.2024.103723}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuTULW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuZFHM24, author = {Junming Liu and Yuntao Zhao and Yongxin Feng and Yutao Hu and Xiangyu Ma}, title = {SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103690}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103690}, doi = {10.1016/J.JISA.2023.103690}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuZFHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuZZZK24, author = {Zuquan Liu and Guopu Zhu and Yu Zhang and Hongli Zhang and Sam Kwong}, title = {An efficient cheating-detectable secret image sharing scheme with smaller share sizes}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103709}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103709}, doi = {10.1016/J.JISA.2024.103709}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuZZZK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LongoLPR24, author = {Giacomo Longo and Francesco Lupia and Andrea Pugliese and Enrico Russo}, title = {Physics-aware targeted attacks against maritime industrial control systems}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103724}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103724}, doi = {10.1016/J.JISA.2024.103724}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LongoLPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoreiraMS24, author = {Caio C. Moreira and Davi C. Moreira and Claudomiro Sales}, title = {A comprehensive analysis combining structural features for detection of new ransomware families}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103716}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103716}, doi = {10.1016/J.JISA.2024.103716}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MoreiraMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengYFZD24, author = {Ye Peng and Qi Yu and Guobin Fu and Wenwen Zhang and Chaofan Duan}, title = {Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103743}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103743}, doi = {10.1016/J.JISA.2024.103743}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PengYFZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PetreanP24, author = {Diana{-}Elena Petrean and Rodica Potolea}, title = {Homomorphic encrypted Yara rules evaluation}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103738}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103738}, doi = {10.1016/J.JISA.2024.103738}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PetreanP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PursharthiM24, author = {Komal Pursharthi and Dheerendra Mishra}, title = {Towards post-quantum authenticated key agreement scheme for mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103754}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103754}, doi = {10.1016/J.JISA.2024.103754}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PursharthiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiZXCL24, author = {Jianxiang Qi and Ning Zheng and Ming Xu and Ping Chen and Wenqiang Li}, title = {A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103699}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103699}, doi = {10.1016/J.JISA.2024.103699}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiZXCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QinFCPXL24, author = {Tiewei Qin and Bingwen Feng and Bing Chen and Zecheng Peng and Zhihua Xia and Wei Lu}, title = {Moir{\'{e}} pattern generation-based image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103753}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103753}, doi = {10.1016/J.JISA.2024.103753}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QinFCPXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahmanMKMN24, author = {Mobashshirur Rahman and Anita Murmu and Piyush Kumar and Nageswara Rao Moparthi and Suyel Namasudra}, title = {A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103677}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103677}, doi = {10.1016/J.JISA.2023.103677}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RahmanMKMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SadhukhanHP24, author = {Payel Sadhukhan and Labani Halder and Sarbani Palit}, title = {Approximate {DBSCAN} on obfuscated data}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103664}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103664}, doi = {10.1016/J.JISA.2023.103664}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SadhukhanHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SainiS24, author = {Ankit Kumar Saini and Samayveer Singh}, title = {{HSB} based reversible data hiding using sorting and pairwise expansion}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103663}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103663}, doi = {10.1016/J.JISA.2023.103663}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SainiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenanayakeKPPA24, author = {Janaka Senanayake and Harsha Kalutarage and Andrei Petrovski and Luca Piras and M. Omar Al{-}Kadri}, title = {Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with {XAI}}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103741}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103741}, doi = {10.1016/J.JISA.2024.103741}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SenanayakeKPPA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaSC24, author = {Shreyansh Sharma and Anil K. Saini and Santanu Chaudhury}, title = {Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103740}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103740}, doi = {10.1016/J.JISA.2024.103740}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharmaSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShenSLLT24, author = {Dongsu Shen and Yijian Song and Yuan Lu and Saiqin Long and Shujuan Tian}, title = {Neural differential distinguishers for {GIFT-128} and {ASCON}}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103758}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103758}, doi = {10.1016/J.JISA.2024.103758}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShenSLLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShiLLF24, author = {Jiali Shi and Guoqiang Liu and Chao Li and Ting Fan}, title = {Improved (related-key) differential cryptanalysis on LBlock}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103737}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103737}, doi = {10.1016/J.JISA.2024.103737}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShiLLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShiralyEP24, author = {Danial Shiraly and Ziba Eslami and Nasrollah Pakniat}, title = {Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103683}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103683}, doi = {10.1016/J.JISA.2023.103683}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShiralyEP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SigalovG24, author = {Daniil Sigalov and Dennis Gamayunov}, title = {Dead or alive: Discovering server {HTTP} endpoints in both reachable and dead client-side code}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103746}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103746}, doi = {10.1016/J.JISA.2024.103746}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SigalovG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SoiSMG24, author = {Diego Soi and Alessandro Sanna and Davide Maiorca and Giorgio Giacinto}, title = {Enhancing android malware detection explainability through function call graph APIs}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103691}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103691}, doi = {10.1016/J.JISA.2023.103691}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SoiSMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SongFZZCW24, author = {Wei Song and Chong Fu and Yu Zheng and Yanfeng Zhang and Junxin Chen and Peipei Wang}, title = {Batch image encryption using cross image permutation and diffusion}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103686}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103686}, doi = {10.1016/J.JISA.2023.103686}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SongFZZCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TangXPZPHH24, author = {Junwei Tang and Wei Xu and Tao Peng and Sijie Zhou and Qiaosen Pi and Ruhan He and Xinrong Hu}, title = {Android malware detection based on a novel mixed bytecode image combined with attention mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103721}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103721}, doi = {10.1016/J.JISA.2024.103721}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TangXPZPHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TeganeHOSB24, author = {Saher Tegane and Khaled Hamouid and Mawloud Omar and Fouzi Semchedine and Abdelmalek Boudries}, title = {Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 {(2023)} 103473]}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103747}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103747}, doi = {10.1016/J.JISA.2024.103747}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TeganeHOSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VaarandiG24, author = {Risto Vaarandi and Alejandro Guerra{-}Manzanares}, title = {Network {IDS} alert classification with active learning techniques}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103687}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103687}, doi = {10.1016/J.JISA.2023.103687}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VaarandiG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VaiwsriRC24, author = {Sirintra Vaiwsri and Thilina Ranbaduge and Peter Christen}, title = {Encryption-based sub-string matching for privacy-preserving record linkage}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103712}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103712}, doi = {10.1016/J.JISA.2024.103712}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VaiwsriRC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangGWL24, author = {Huifen Wang and Dong Guo and Jinrui Wei and Jinze Li}, title = {A method of classifying IoT devices based on attack sensitivity}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103751}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103751}, doi = {10.1016/J.JISA.2024.103751}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangGWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangHZLM24, author = {Jinwei Wang and Wanyun Huang and Jiawei Zhang and Xiangyang Luo and Bin Ma}, title = {Adversarial watermark: {A} robust and reliable watermark against removal}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103750}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103750}, doi = {10.1016/J.JISA.2024.103750}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangHZLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangL24, author = {Benxuan Wang and Kwok{-}Tung Lo}, title = {Autoencoder-based joint image compression and encryption}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103680}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103680}, doi = {10.1016/J.JISA.2023.103680}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WickramaarachchiZZX24, author = {Wiraj Udara Wickramaarachchi and Dongdong Zhao and Junwei Zhou and Jianwen Xiang}, title = {An effective iris biometric privacy protection scheme with renewability}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103684}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103684}, doi = {10.1016/J.JISA.2023.103684}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WickramaarachchiZZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WongYGWY24, author = {Kuan{-}Wai Wong and Wun{-}She Yap and Bok{-}Min Goi and Denis Chee{-}Keong Wong and Guodong Ye}, title = {Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103692}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103692}, doi = {10.1016/J.JISA.2023.103692}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WongYGWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiangLRHZC24, author = {Yuexin Xiang and Tiantian Li and Wei Ren and Jie He and Tianqing Zhu and Kim{-}Kwang Raymond Choo}, title = {AdvEWM: Generating image adversarial examples by embedding digital watermarks}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103662}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103662}, doi = {10.1016/J.JISA.2023.103662}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XiangLRHZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuS24, author = {Hairuo Xu and Tao Shu}, title = {Attack-model-agnostic defense against model poisonings in distributed learning}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103739}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103739}, doi = {10.1016/J.JISA.2024.103739}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuS24a, author = {Hairuo Xu and Tao Shu}, title = {Defending against model poisoning attack in federated learning: {A} variance-minimization approach}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103744}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103744}, doi = {10.1016/J.JISA.2024.103744}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YanTXQ24, author = {Xueping Yan and Lin Tan and Hong Xu and Wen{-}Feng Qi}, title = {Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103661}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103661}, doi = {10.1016/J.JISA.2023.103661}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YanTXQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YaoCGWY24, author = {Yun{-}Fei Yao and Hui{-}Yan Chen and You Gao and Ke Wang and Haoyang Yu}, title = {A decentralized multi-authority {CP-ABE} scheme from {LWE}}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103752}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103752}, doi = {10.1016/J.JISA.2024.103752}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YaoCGWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuCLCY24, author = {Ning Yu and Long Chen and Tao Leng and Zigang Chen and Xiaoyin Yi}, title = {An explainable deepfake of speech detection method with spectrograms and waveforms}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103720}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103720}, doi = {10.1016/J.JISA.2024.103720}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuCLCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanHCQ24, author = {Yuan Yuan and Hongjie He and Fan Chen and Lingfeng Qu}, title = {On the security of {JPEG} image encryption with {RS} pairs permutation}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103722}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103722}, doi = {10.1016/J.JISA.2024.103722}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanHCQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanLMTZ24, author = {Xue Yuan and Guanjun Lin and Huan Mei and Yonghang Tai and Jun Zhang}, title = {Software vulnerable functions discovery based on code composite feature}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103718}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103718}, doi = {10.1016/J.JISA.2024.103718}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanLMTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZengFWWCZ24, author = {Chunyan Zeng and Shixiong Feng and Zhifeng Wang and Xiangkui Wan and Yunfan Chen and Nan Zhao}, title = {Spatio-temporal representation learning enhanced source cell-phone recognition from speech recordings}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103672}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103672}, doi = {10.1016/J.JISA.2023.103672}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZengFWWCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZengXPZ24, author = {ZengRi Zeng and Peng Xun and Wei Peng and Baokang Zhao}, title = {Toward identifying malicious encrypted traffic with a causality detection system}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103644}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103644}, doi = {10.1016/J.JISA.2023.103644}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZengXPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangPZFD24, author = {Xiaoran Zhang and Zhibin Pan and Quan Zhou and Guojun Fan and Jing Dong}, title = {A reversible data hiding method based on bitmap prediction for {AMBTC} compressed hyperspectral images}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103697}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103697}, doi = {10.1016/J.JISA.2023.103697}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangPZFD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangT24, author = {Yuhao Zhang and Min Tang}, title = {{VPPLR:} Privacy-preserving logistic regression on vertically partitioned data using vectorization sharing}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103725}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103725}, doi = {10.1016/J.JISA.2024.103725}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangWWLM24, author = {Jiawei Zhang and Jinwei Wang and Hao Wang and Xiangyang Luo and Bin Ma}, title = {Trustworthy adaptive adversarial perturbations in social networks}, journal = {J. Inf. Secur. Appl.}, volume = {80}, pages = {103675}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103675}, doi = {10.1016/J.JISA.2023.103675}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangWWLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaoWLC24, author = {Yuanmeng Zhao and Jian Weng and Jia{-}Nan Liu and Mei Cai}, title = {Enabling privacy-preserving medication analysis in distributed {EHR} systems}, journal = {J. Inf. Secur. Appl.}, volume = {82}, pages = {103749}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103749}, doi = {10.1016/J.JISA.2024.103749}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhaoWLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouWZ24, author = {Chao Zhou and Yuan{-}Gen Wang and Guopu Zhu}, title = {Object-attentional untargeted adversarial attack}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103710}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2024.103710}, doi = {10.1016/J.JISA.2024.103710}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZipperleZCD24, author = {Michael Zipperle and Yu Zhang and Elizabeth Chang and Tharam S. Dillon}, title = {{PARGMF:} {A} provenance-enabled automated rule generation and matching framework with multi-level attack description model}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103682}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103682}, doi = {10.1016/J.JISA.2023.103682}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZipperleZCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbdollahiHT23, author = {Behnaz Abdollahi and Ahad Harati and Amir Hossein Taherinia}, title = {Image steganography based on smooth cycle-consistent adversarial learning}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103631}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103631}, doi = {10.1016/J.JISA.2023.103631}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AbdollahiHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AddobeaLOH23, author = {Abigail Akosua Addobea and Qianmu Li and Isaac Amankona Obiri and Jun Hou}, title = {Secure multi-factor access control mechanism for pairing blockchains}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103477}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103477}, doi = {10.1016/J.JISA.2023.103477}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AddobeaLOH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AffinitoZSBV23, author = {Antonia Affinito and Stefania Zinno and Giovanni Stanco and Alessio Botta and Giorgio Ventre}, title = {The evolution of Mirai botnet scans over a six-year period}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103629}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103629}, doi = {10.1016/J.JISA.2023.103629}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AffinitoZSBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlaeiyanPP23, author = {Mohammadhadi Alaeiyan and Saeed Parsa and Vinod P.}, title = {Sober: Explores for invasive behaviour of malware}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103451}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103451}, doi = {10.1016/J.JISA.2023.103451}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlaeiyanPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliHHHY23, author = {Muqadar Ali and Hongjie He and Abid Hussain and Mehboob Hussain and Yuan Yuan}, title = {Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103500}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103500}, doi = {10.1016/J.JISA.2023.103500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AliHHHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AntwiBoasiakoZLD23, author = {Emmanuel Antwi{-}Boasiako and Shijie Zhou and Yongjian Liao and Yingjie Dong}, title = {Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption {(CAHE)}}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103462}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103462}, doi = {10.1016/J.JISA.2023.103462}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AntwiBoasiakoZLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnushiadeviA23, author = {R. Anushiadevi and Rengarajan Amirtharajan}, title = {Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103407}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103407}, doi = {10.1016/J.JISA.2022.103407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnushiadeviA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AroraRRG23, author = {Jatin Arora and Ketti Ramchandran Ramkumar and Sathiyaraj R and G. S. Pradeep Ghantasala}, title = {Securing web documents by using piggybacked framework based on Newton's forward interpolation method}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103498}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103498}, doi = {10.1016/J.JISA.2023.103498}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AroraRRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BagherL23, author = {Kassem Bagher and Shangqi Lai}, title = {SGX-Stream: {A} Secure Stream Analytics Framework In SGX-enabled Edge Cloud}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103403}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103403}, doi = {10.1016/J.JISA.2022.103403}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BagherL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BahaghighatGO23, author = {Mahdi Bahaghighat and Majid Ghasemi and Figen {\"{O}}zen}, title = {A high-accuracy phishing website detection method based on machine learning}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103553}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103553}, doi = {10.1016/J.JISA.2023.103553}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BahaghighatGO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BakhtinaMS23, author = {Mariia Bakhtina and Raimundas Matulevicius and Mari Seeba}, title = {Tool-supported method for privacy analysis of a business process model}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103525}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103525}, doi = {10.1016/J.JISA.2023.103525}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BakhtinaMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BanikK23, author = {Mandira Banik and Sanjay Kumar}, title = {Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103626}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103626}, doi = {10.1016/J.JISA.2023.103626}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BanikK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BeraPRDP23, author = {Sourav Bera and Suryakant Prasad and Y. Sreenivasa Rao and Ashok Kumar Das and Youngho Park}, title = {Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103482}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103482}, doi = {10.1016/J.JISA.2023.103482}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BeraPRDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhowmikA23, author = {Sandeep Bhowmik and Sriyankar Acharyya}, title = {Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103391}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103391}, doi = {10.1016/J.JISA.2022.103391}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BhowmikA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BlundoC23, author = {Carlo Blundo and Stelvio Cimato}, title = {Role mining under User-Distribution cardinality constraint}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103611}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103611}, doi = {10.1016/J.JISA.2023.103611}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BlundoC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BoulemtafesDC23, author = {Amine Boulemtafes and Abdelouahid Derhab and Yacine Challal}, title = {PRIviLY: Private Remote Inference over fulLY connected deep networks for pervasive health monitoring with constrained client-side}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103552}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103552}, doi = {10.1016/J.JISA.2023.103552}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BoulemtafesDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BuccafurriAL23, author = {Francesco Buccafurri and Vincenzo De Angelis and Sara Lazzaro}, title = {Enabling anonymized open-data linkage by authorized parties}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103478}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103478}, doi = {10.1016/J.JISA.2023.103478}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BuccafurriAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChagantiRP23, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {A multi-view feature fusion approach for effective malware classification using Deep Learning}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103402}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103402}, doi = {10.1016/J.JISA.2022.103402}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChagantiRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChakrabortyKC23, author = {Ananya Chakraborty and Mohit Kumar and Nisha Chaurasia}, title = {Secure framework for IoT applications using Deep Learning in fog Computing}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103569}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103569}, doi = {10.1016/J.JISA.2023.103569}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChakrabortyKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChangLL23, author = {Yuan Chang and Jiliang Li and Wenjuan Li}, title = {2D2PS: {A} demand-driven privacy-preserving scheme for anonymous data sharing in smart grids}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103466}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103466}, doi = {10.1016/J.JISA.2023.103466}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChangLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChangLYP23, author = {Wen Chang and Zhen{-}Zhen Li and Fu{-}Cheng You and Xing{-}Bo Pan}, title = {Dynamic quantum fully homomorphic encryption scheme based on universal quantum circuit}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103510}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103510}, doi = {10.1016/J.JISA.2023.103510}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChangLYP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChanuSC23, author = {Usham Sanjota Chanu and Khundrakpam Johnson Singh and Yambem Jina Chanu}, title = {A dynamic feature selection technique to detect DDoS attack}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103445}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103445}, doi = {10.1016/J.JISA.2023.103445}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChanuSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaoHL23, author = {Jedrik Chao and Md. Shafaeat Hossain and Lisa Lancor}, title = {Swipe gestures for user authentication in smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103450}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103450}, doi = {10.1016/J.JISA.2023.103450}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaoHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenYLTMJ23, author = {Jiaqi Chen and Chong Yuan and Jiashuo Li and Donghai Tian and Rui Ma and Xiaoqi Jia}, title = {{ELAMD:} An ensemble learning framework for adversarial malware defense}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103508}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103508}, doi = {10.1016/J.JISA.2023.103508}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenYLTMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenZWJ23, author = {Jie Chen and Haodi Zhang and Shuai Wang and Huamin Jin}, title = {A secure recharge scheme for blockchain payment channels}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103603}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103603}, doi = {10.1016/J.JISA.2023.103603}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenZWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenZZ23, author = {Chao Chen and Fangguo Zhang and Changan Zhao}, title = {Isogeny computation on Kummer lines and applications}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103546}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103546}, doi = {10.1016/J.JISA.2023.103546}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenamA23, author = {Venkata Bhikshapathi Chenam and Syed Taqi Ali}, title = {A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103377}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103377}, doi = {10.1016/J.JISA.2022.103377}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenamA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChockalingamPTG23, author = {Sabarathinam Chockalingam and Wolter Pieters and Andr{\'{e}} M. H. Teixeira and Pieter H. A. J. M. van Gelder}, title = {Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103497}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103497}, doi = {10.1016/J.JISA.2023.103497}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChockalingamPTG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuiWQQY23, author = {Hui Cui and Zhiguo Wan and Huayi Qi and Baodong Qin and Xun Yi}, title = {Password-authenticated proofs of retrievability for multiple devices checking cloud data}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103480}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103480}, doi = {10.1016/J.JISA.2023.103480}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CuiWQQY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DashPSS23, author = {Priyabrata Dash and Fagul Pandey and Monalisa Sarma and Debasis Samanta}, title = {Efficient private key generation from iris data for privacy and security applications}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103506}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103506}, doi = {10.1016/J.JISA.2023.103506}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DashPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaubnerMMBMP23, author = {Lukas Daubner and Martin Mac{\'{a}}k and Raimundas Matulevicius and Barbora Buhnova and Sofija Maksovic and Tom{\'{a}}s Pitner}, title = {Addressing insider attacks via forensic-ready risk management}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103433}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103433}, doi = {10.1016/J.JISA.2023.103433}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DaubnerMMBMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DebnathMD23, author = {Sourabh Debnath and Ramesh Kumar Mohapatra and Ratnakar Dash}, title = {Secret data sharing through coverless video steganography based on bit plane segmentation}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103612}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103612}, doi = {10.1016/J.JISA.2023.103612}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DebnathMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeviSDTTA23, author = {Kilari Jyothsna Devi and Priyanka Singh and Jatindra Kumar Dash and Hiren Kumar Thakkar and Sudeep Tanwar and Abdulatif Alabdulatif}, title = {Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103655}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103655}, doi = {10.1016/J.JISA.2023.103655}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DeviSDTTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DingX23, author = {Zixuan Ding and Qi Xie}, title = {Provably secure and lightweight three-factor authentication scheme for industrial medical {CPS}}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103656}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103656}, doi = {10.1016/J.JISA.2023.103656}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DingX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuLLT23, author = {Ruizhong Du and Na Liu and Mingyue Li and Junfeng Tian}, title = {Block verifiable dynamic searchable encryption using redactable blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103504}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103504}, doi = {10.1016/J.JISA.2023.103504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DuLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuSWW23, author = {Ling Du and Qiuchen Shang and Ziwei Wang and Xiaochao Wang}, title = {Robust image hashing based on multi-view dimension reduction}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103578}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103578}, doi = {10.1016/J.JISA.2023.103578}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DuSWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuTL23, author = {Ruizhong Du and Yuchi Tai and Mingyue Li}, title = {Refined statistical attacks against searchable symmetric encryption using non-indexed documents}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103652}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103652}, doi = {10.1016/J.JISA.2023.103652}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DuTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DushkuRVBM23, author = {Edlira Dushku and Md Masoom Rabbani and Jo Vliegen and An Braeken and Nele Mentens}, title = {{PROVE:} Provable remote attestation for public verifiability}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103448}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103448}, doi = {10.1016/J.JISA.2023.103448}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DushkuRVBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuyKHHP23, author = {Phan The Duy and Nghi Hoang Khoa and Do Thi Thu Hien and Hien Do Hoang and Van{-}Hau Pham}, title = {Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103472}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103472}, doi = {10.1016/J.JISA.2023.103472}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DuyKHHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EmamiYAA23, author = {Ashkan Emami and Habib Yajam and Mohammad Ali Akhaee and Rahim Asghari}, title = {A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103645}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103645}, doi = {10.1016/J.JISA.2023.103645}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/EmamiYAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FaghihiZD23, author = {Farnood Faghihi and Mohammad Zulkernine and Steven H. H. Ding}, title = {{AIM:} An Android Interpretable Malware detector based on application class modeling}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103486}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103486}, doi = {10.1016/J.JISA.2023.103486}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FaghihiZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarAH23, author = {Saeed Banaeian Far and Maryam Rajabzadeh Asaar and Afrooz Haghbin}, title = {Distributed auditing protocol for untraceable transactions}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103429}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103429}, doi = {10.1016/J.JISA.2023.103429}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FarAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FinoginaH23, author = {Tamara Finogina and Javier Herranz}, title = {On remote electronic voting with both coercion resistance and cast-as-intended verifiability}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103554}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103554}, doi = {10.1016/J.JISA.2023.103554}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FinoginaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GangulyMP23, author = {Sreeparna Ganguly and Imon Mukherjee and Ashutosh Pati}, title = {Stegano-Purge: An integer wavelet transformation based adaptive universal image sterilizer for steganography removal}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103586}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103586}, doi = {10.1016/J.JISA.2023.103586}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GangulyMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoWLC23, author = {Mengnan Gao and Lifa Wu and Qi Li and Wei Chen}, title = {Anomaly traffic detection in IoT security using graph neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103532}, doi = {10.1016/J.JISA.2023.103532}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GomezMCC23, author = {{\'{A}}ngel Luis Perales G{\'{o}}mez and Lorenzo Fern{\'{a}}ndez Maim{\'{o}} and Alberto Huertas Celdr{\'{a}}n and F{\'{e}}lix J. Garc{\'{\i}}a Clemente}, title = {{VAASI:} Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103647}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103647}, doi = {10.1016/J.JISA.2023.103647}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GomezMCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuB23, author = {Yuhao Gu and Yuebin Bai}, title = {{LDIA:} Label distribution inference attack against federated learning in edge computing}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103475}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103475}, doi = {10.1016/J.JISA.2023.103475}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuYSLL23, author = {Xiaodan Gu and Ming Yang and Bingchen Song and Wei Lan and Zhen Ling}, title = {A practical multi-tab website fingerprinting attack}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103627}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103627}, doi = {10.1016/J.JISA.2023.103627}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GuYSLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoDZW23, author = {Junyan Guo and Ye Du and Dawei Zhang and Runfang Wu}, title = {{PSEEMV:} Provably secure and efficient emergency message verification scheme based on {ECC} and {CRT} for Space Information Network}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103437}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103437}, doi = {10.1016/J.JISA.2023.103437}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoDZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWDPL23, author = {Zhenzhen Guo and Gaoli Wang and Orr Dunkelman and Yinxue Pan and Shengyuan Liu}, title = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103406}, doi = {10.1016/J.JISA.2022.103406}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWTFZ23, author = {Cheng Guo and Litao Wang and Xinyu Tang and Bin Feng and Guofeng Zhang}, title = {Two-party interactive secure deduplication with efficient data ownership management in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103426}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103426}, doi = {10.1016/J.JISA.2023.103426}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWTFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoZZRTX23, author = {Shuitao Guo and Shijie Zhu and Changqing Zhu and Na Ren and Wei Tang and Dingjie Xu}, title = {A robust and lossless commutative encryption and watermarking algorithm for vector geographic data}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103503}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103503}, doi = {10.1016/J.JISA.2023.103503}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoZZRTX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HanXLJC23, author = {Yunxia Han and Chunxiang Xu and Shanshan Li and Changsong Jiang and Kefei Chen}, title = {ttPAKE: Typo tolerance password-authenticated key exchange}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103658}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103658}, doi = {10.1016/J.JISA.2023.103658}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HanXLJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HanZJWLR23, author = {Pengchong Han and Zhouyang Zhang and Shan Ji and Xiaowan Wang and Liang Liu and Yongjun Ren}, title = {Access control mechanism for the Internet of Things based on blockchain and inner product encryption}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103446}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103446}, doi = {10.1016/J.JISA.2023.103446}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HanZJWLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HarissN23, author = {Khalil Hariss and Hassan N. Noura}, title = {Homomorphic additive lightweight block cipher scheme for securing IoT applications}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103540}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103540}, doi = {10.1016/J.JISA.2023.103540}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HarissN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HarnHXXZP23, author = {Lein Harn and Chingfang Hsu and Zhe Xia and Hang Xu and Shuchang Zeng and Fengling Pang}, title = {Simple and efficient threshold changeable secret sharing}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103576}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103576}, doi = {10.1016/J.JISA.2023.103576}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HarnHXXZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HasanLZ23, author = {Hayyan Hasan and Behrouz Tork Ladani and Bahman Zamani}, title = {Maaker: {A} framework for detecting and defeating evasion techniques in Android malware}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103617}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103617}, doi = {10.1016/J.JISA.2023.103617}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HasanLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HeXDZS23, author = {Yuan He and Chang{-}you Xing and Ke Ding and Guomin Zhang and Lihua Song}, title = {A differential privacy based multi-stage network fingerprinting deception game method}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103460}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103460}, doi = {10.1016/J.JISA.2023.103460}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HeXDZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HemalathaMKGS23, author = {J. Hemalatha and Sekar Mohan and Chandan Kumar and Adnan Gutub and Aditya Kumar Sahu}, title = {Towards improving the performance of blind image steganalyzer using third-order {SPAM} features and ensemble classifier}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103541}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103541}, doi = {10.1016/J.JISA.2023.103541}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HemalathaMKGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HoglundFR23, author = {Joel H{\"{o}}glund and Martin Furuhed and Shahid Raza}, title = {Lightweight certificate revocation for low-power IoT with end-to-end security}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103424}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103424}, doi = {10.1016/J.JISA.2023.103424}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HoglundFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouJS23, author = {Xin Hou and Xiaofeng Jia and Jun Shao}, title = {Public key encryption with public-verifiable decryption delegation and its application}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103513}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103513}, doi = {10.1016/J.JISA.2023.103513}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouMDWR23, author = {Shen Hou and Yanzhou Ma and Ding Deng and Zhenyu Wang and Guolei Ren}, title = {Modeling and physical attack resistant authentication protocol with double PUFs}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103543}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103543}, doi = {10.1016/J.JISA.2023.103543}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouMDWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangDFHZ23, author = {Wenhua Huang and Hongyuan Du and JingYu Feng and Gang Han and Wenbo Zhang}, title = {A dynamic anonymous authentication scheme with trusted fog computing in {V2G} networks}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103648}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103648}, doi = {10.1016/J.JISA.2023.103648}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuangDFHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangXWLCK23, author = {Lu Huang and Jingfeng Xue and Yong Wang and Zhenyan Liu and Junbao Chen and Zixiao Kong}, title = {WHGDroid: Effective android malware detection based on weighted heterogeneous graph}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103556}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103556}, doi = {10.1016/J.JISA.2023.103556}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangXWLCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HwangLLLWLC23, author = {Ren{-}Hung Hwang and Chieh{-}Lun Lee and Ying{-}Dar Lin and Po{-}Ching Lin and Hsiao{-}Kuang Wu and Yuan{-}Cheng Lai and C. K. Chen}, title = {Host-based intrusion detection with multi-datasource and deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103625}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103625}, doi = {10.1016/J.JISA.2023.103625}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HwangLLLWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IshizakaF23, author = {Masahito Ishizaka and Kazuhide Fukushima}, title = {Wildcarded identity-based ring signatures based on linearly homomorphic signatures}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103499}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103499}, doi = {10.1016/J.JISA.2023.103499}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IshizakaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IslamUAS23, author = {Md. Amirul Islam and Ashraf Uddin and Sunil Aryal and Giovanni Stea}, title = {An ensemble learning approach for anomaly detection in credit card data with imbalanced and overlapped classes}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103618}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103618}, doi = {10.1016/J.JISA.2023.103618}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IslamUAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ItalisPQ23, author = {Olson Italis and Samuel Pierre and Alejandro Quintero}, title = {Privacy-preserving model for biometric-based authentication and Key Derivation Function}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103624}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103624}, doi = {10.1016/J.JISA.2023.103624}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ItalisPQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JavanmardiSMPP23, author = {Saeed Javanmardi and Mohammad Shojafar and Reza Mohammadi and Valerio Persico and Antonio Pescap{\`{e}}}, title = {S-FoS: {A} secure workflow scheduling approach for performance optimization in SDN-based IoT-Fog networks}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103404}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103404}, doi = {10.1016/J.JISA.2022.103404}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JavanmardiSMPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiangXCC23, author = {Changsong Jiang and Chunxiang Xu and Chenchen Cao and Kefei Chen}, title = {{GAIN:} Decentralized Privacy-Preserving Federated Learning}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103615}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103615}, doi = {10.1016/J.JISA.2023.103615}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JiangXCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JinLCLS23, author = {Shan Jin and Yong Li and Xi Chen and Ruxian Li and Zhibin Shen}, title = {Blockchain-based fairness-enhanced federated learning scheme against label flipping attack}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103580}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103580}, doi = {10.1016/J.JISA.2023.103580}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JinLCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KaurHS23, author = {Harmanjeet Kaur and Nishtha Hooda and Harpreet Singh}, title = {k-anonymization of social network data using Neural Network and {SVM:} K-NeuroSVM}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103382}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103382}, doi = {10.1016/J.JISA.2022.103382}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KaurHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimYZJ23, author = {Cheonshik Kim and Ching{-}Nung Yang and Zhili Zhou and Ki{-}Hyun Jung}, title = {Dual efficient reversible data hiding using Hamming code and {OPAP}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103544}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103544}, doi = {10.1016/J.JISA.2023.103544}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimYZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KocAK23, author = {Basar Koc and Ziya Arnavut and H{\"{u}}seyin Ko{\c{c}}ak}, title = {Concurrent encryption and lossless compression using inversion ranks}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103587}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103587}, doi = {10.1016/J.JISA.2023.103587}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KocAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KoshibaZB23, author = {Takeshi Koshiba and Behrouz Zolfaghari and Khodakhast Bibak}, title = {A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103430}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103430}, doi = {10.1016/J.JISA.2023.103430}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KoshibaZB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarS23, author = {Anmol Kumar and Gaurav Somani}, title = {Service separation assisted DDoS attack mitigation in cloud targets}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103435}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103435}, doi = {10.1016/J.JISA.2023.103435}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarSDJ23, author = {Rajeev Kumar and Deepak Sharma and Amit Dua and Ki{-}Hyun Jung}, title = {A review of different prediction methods for reversible data hiding}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103572}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103572}, doi = {10.1016/J.JISA.2023.103572}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarSDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LauIACY23, author = {Terry Shue Chien Lau and Fedor Ivanov and Muhammad Rezal Kamel Ariffin and Ji{-}Jian Chin and Timothy Tzen Vun Yap}, title = {New code-based cryptosystems via the {IKKR} framework}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103530}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103530}, doi = {10.1016/J.JISA.2023.103530}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LauIACY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeCCHFL23, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Wei{-}Che Hung and Yun{-}Yi Fan and Bo Li}, title = {Constructing gene features for robust 3D mesh zero-watermarking}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103414}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103414}, doi = {10.1016/J.JISA.2022.103414}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiBCFGE23, author = {Li Li and Yu Bai and Ching{-}Chun Chang and Yunyuan Fan and Wei Gu and Mahmoud Emam}, title = {Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103548}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103548}, doi = {10.1016/J.JISA.2023.103548}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiBCFGE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiFQ23, author = {Yingjie Li and Yan Feng and Quan Qian}, title = {FDPBoost: Federated differential privacy gradient boosting decision trees}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103468}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103468}, doi = {10.1016/J.JISA.2023.103468}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiFQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLGW23, author = {Xuelian Li and Hui Li and Juntao Gao and Runsong Wang}, title = {Privacy preserving via multi-key homomorphic encryption in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103463}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103463}, doi = {10.1016/J.JISA.2023.103463}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiQXT23, author = {Nan Li and Jiaohua Qin and Xuyu Xiang and Yun Tan}, title = {Robust coverless video steganography based on inter-frame keypoint matching}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103653}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103653}, doi = {10.1016/J.JISA.2023.103653}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiQXT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiW23, author = {Yu Li and Li{-}Ping Wang}, title = {Security analysis of the Classic McEliece, {HQC} and {BIKE} schemes in low memory}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103651}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103651}, doi = {10.1016/J.JISA.2023.103651}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiZNY23, author = {Jun Li and Minqing Zhang and Ke Niu and Xiaoyuan Yang}, title = {Investigation on principles for cost assignment in motion vector-based video steganography}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103439}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103439}, doi = {10.1016/J.JISA.2023.103439}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiZNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiangLZW23, author = {Yanrong Liang and Yanping Li and Kai Zhang and Zhenqiang Wu}, title = {{VMSE:} Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103518}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103518}, doi = {10.1016/J.JISA.2023.103518}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiangLZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiangPLTBW23, author = {Junying Liang and Haipeng Peng and Lixiang Li and Fenghua Tong and Shuang Bao and Lanlan Wang}, title = {A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103487}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103487}, doi = {10.1016/J.JISA.2023.103487}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiangPLTBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiaoCWMZ23, author = {Binjie Liao and Hongyi Chen and Yu Wang and Weizhi Meng and Jun Zhang}, title = {Analysis of hybrid attack and defense based on block withholding strategy}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103620}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103620}, doi = {10.1016/J.JISA.2023.103620}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiaoCWMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinCH23, author = {Jiang{-}Yi Lin and Chin{-}Chen Chang and Ji{-}Hwei Horng}, title = {Crypto-space image steganography based on blind flipping}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103660}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103660}, doi = {10.1016/J.JISA.2023.103660}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuCYGF23, author = {Suhui Liu and Liquan Chen and Hongtao Yu and Shang Gao and Huiyu Fang}, title = {{BP-AKAA:} Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103443}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103443}, doi = {10.1016/J.JISA.2023.103443}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuCYGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuLLY23, author = {Mengjuan Liu and Jiang Liu and Chenyang Liu and Kuo{-}Hui Yeh}, title = {A task-oriented neural dialogue system capable of knowledge accessing}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103551}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103551}, doi = {10.1016/J.JISA.2023.103551}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuRCL23, author = {Jiashuo Liu and Jiongjiong Ren and Shaozhen Chen and ManMan Li}, title = {Improved neural distinguishers with multi-round and multi-splicing construction}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103461}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103461}, doi = {10.1016/J.JISA.2023.103461}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuRCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuSZ23, author = {Yajing Liu and Zhengya Sun and Wensheng Zhang}, title = {Improving fraud detection via hierarchical attention-based Graph Neural Network}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103399}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103399}, doi = {10.1016/J.JISA.2022.103399}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LopezCEPM23, author = {Juan Manuel Esp{\'{\i}}n L{\'{o}}pez and Alberto Huertas Celdr{\'{a}}n and Francisco Esquembre and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Javier G. Mar{\'{\i}}n{-}Bl{\'{a}}zquez}, title = {{CGAPP:} {A} continuous group authentication privacy-preserving platform for industrial scene}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103622}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103622}, doi = {10.1016/J.JISA.2023.103622}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LopezCEPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuoCY23, author = {Pengcheng Luo and Jian Chu and Genke Yang}, title = {{IP} packet-level encrypted traffic classification using machine learning with a light weight feature engineering method}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103519}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103519}, doi = {10.1016/J.JISA.2023.103519}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LuoCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuoYYH23, author = {Junwei Luo and Xuechao Yang and Xun Yi and Fengling Han}, title = {Privacy-preserving recommendation system based on user classification}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103630}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103630}, doi = {10.1016/J.JISA.2023.103630}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LuoYYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuyenSP23, author = {Cao Thi Luyen and Nguyen Kim Sao and At PhamVan}, title = {Dual-image reversible data hiding method using maximum embedding ability of each pixel}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103470}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103470}, doi = {10.1016/J.JISA.2023.103470}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LuyenSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaDRA23, author = {Tinghuai Ma and Qian Deng and Huan Rong and Najla Al{-}Nabhan}, title = {A privacy-preserving trajectory data synthesis framework based on differential privacy}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103550}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103550}, doi = {10.1016/J.JISA.2023.103550}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaDRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaDXWLZ23, author = {Bin Ma and Kaixin Du and Jian Xu and Chunpeng Wang and Jian Li and Linna Zhou}, title = {A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103605}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103605}, doi = {10.1016/J.JISA.2023.103605}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaDXWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaZHLZLWHD23, author = {Zhaorui Ma and Shicheng Zhang and Xinhao Hu and Na Li and Qinglei Zhou and Fenlin Liu and Hongjian Wang and Guangwu Hu and Qilin Dong}, title = {GWS-Geo: {A} graph neural network based model for street-level IPv6 geolocation}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103511}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103511}, doi = {10.1016/J.JISA.2023.103511}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaZHLZLWHD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MallikarachchiWL23, author = {Dilshani Mallikarachchi and KokSheik Wong and Joanne Mun{-}Yee Lim}, title = {An authentication scheme for {FANET} packet payload using data hiding}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103559}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103559}, doi = {10.1016/J.JISA.2023.103559}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MallikarachchiWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MandalS23, author = {Mriganka Mandal and Ramprasad Sarkar}, title = {Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103584}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103584}, doi = {10.1016/J.JISA.2023.103584}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MandalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McCarthyGAL23, author = {Andrew McCarthy and Essam Ghadafi and Panagiotis Andriotis and Phil Legg}, title = {Defending against adversarial machine learning attacks using hierarchical learning: {A} case study on network traffic attack classification}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103398}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103398}, doi = {10.1016/J.JISA.2022.103398}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/McCarthyGAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MehmoodSCAKK23, author = {Abid Mehmood and Arslan Shafique and Shehzad Ashraf Chaudhry and Moatsum Alawida and Abdul Nasir Khan and Neeraj Kumar}, title = {A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103590}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103590}, doi = {10.1016/J.JISA.2023.103590}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MehmoodSCAKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MehtaSPSK23, author = {Ravishankar Mehta and Sindhuja Shukla and Jitesh Pradhan and Koushlendra Kumar Singh and Abhinav Kumar}, title = {A vision transformer-based automated human identification using ear biometrics}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103599}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103599}, doi = {10.1016/J.JISA.2023.103599}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MehtaSPSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MeiLFZ23, author = {Huan Mei and Guanjun Lin and Da Fang and Jun Zhang}, title = {Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103467}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103467}, doi = {10.1016/J.JISA.2023.103467}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MeiLFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MittalKB23, author = {Meenakshi Mittal and Krishan Kumar and Sunny Behal}, title = {DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103609}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103609}, doi = {10.1016/J.JISA.2023.103609}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MittalKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohantyD23, author = {Tapaswini Mohanty and Sumit Kumar Debnath}, title = {An information-theoretically secure quantum multiparty private set intersection}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103623}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103623}, doi = {10.1016/J.JISA.2023.103623}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MohantyD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohantySMD23, author = {Tapaswini Mohanty and Vikas Srivastava and Sihem Mesnager and Sumit Kumar Debnath}, title = {A constant round quantum secure protocol for oblivious polynomial evaluation}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103560}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103560}, doi = {10.1016/J.JISA.2023.103560}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MohantySMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MsolliAHGMM23, author = {Amina Msolli and Nader Ajmi and Abdelhamid Helali and Abdelaziz Gassoumi and Hassen Maaref and Ridha Mghaieth}, title = {New key management scheme based on pool-hash for {WSN} and IoT}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103415}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103415}, doi = {10.1016/J.JISA.2022.103415}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MsolliAHGMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NajafiB23, author = {Zamineh Najafi and Shahram Babaie}, title = {A lightweight hierarchical key management approach for internet of things}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103485}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103485}, doi = {10.1016/J.JISA.2023.103485}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NajafiB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NayarT23, author = {Gayathri R. Nayar and Tony Thomas}, title = {Partial palm vein based biometric authentication}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103390}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103390}, doi = {10.1016/J.JISA.2022.103390}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NayarT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NiCTWW23, author = {Jiayi Ni and Wei Chen and Jiacheng Tong and Haiyong Wang and Lifa Wu}, title = {High-speed anomaly traffic detection based on staged frequency domain features}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103575}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103575}, doi = {10.1016/J.JISA.2023.103575}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NiCTWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NikooghadamSS23, author = {Mahdi Nikooghadam and Hamid Reza Shahriari and Saeid Tousi Saeidi}, title = {{HAKECC:} Highly efficient authentication and key agreement scheme based on {ECDH} for {RFID} in {IOT} environment}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103523}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103523}, doi = {10.1016/J.JISA.2023.103523}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NikooghadamSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NiuLLDG23, author = {Shufen Niu and Qi Liu and Wei Liu and Runyuan Dong and Peng Ge}, title = {Multi-party anonymous authentication scheme in heterogeneous network slicing}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103589}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103589}, doi = {10.1016/J.JISA.2023.103589}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NiuLLDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraSC23, author = {Hassan N. Noura and Ola Salman and Ali Chehab}, title = {Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103514}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103514}, doi = {10.1016/J.JISA.2023.103514}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NouraSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PanR23, author = {Ronghao Pan and Antonio Ruiz{-}Mart{\'{\i}}nez}, title = {Evolution of web tracking protection in Chrome}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103643}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103643}, doi = {10.1016/J.JISA.2023.103643}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PanR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PanditKM23, author = {Anupama Arjun Pandit and Atul Kumar and Arun Mishra}, title = {LWR-based Quantum-Safe Pseudo-Random Number Generator}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103431}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103431}, doi = {10.1016/J.JISA.2023.103431}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PanditKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PriscoSMZ23, author = {Roberto De Prisco and Alfredo De Santis and Delfina Malandrino and Rocco Zaccagnino}, title = {An improved privacy attack on smartphones exploiting the accelerometer}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103479}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103479}, doi = {10.1016/J.JISA.2023.103479}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PriscoSMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiZXWC23, author = {Jianxiang Qi and Ning Zheng and Ming Xu and Xiaodong Wang and Yunzhi Chen}, title = {A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103528}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103528}, doi = {10.1016/J.JISA.2023.103528}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiZXWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahmanMH23, author = {Md. Bayazid Rahman and Hossen Asiful Mustafa and Md Delwar Hossain}, title = {Towards evaluating robustness of violence detection in videos using cross-domain transferability}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103583}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103583}, doi = {10.1016/J.JISA.2023.103583}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RahmanMH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaiOCA23, author = {Arun Kumar Rai and Hari Om and Satish Chand and Saurabh Agarwal}, title = {Reversible data hiding in encrypted image using two-pass pixel value ordering}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103545}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103545}, doi = {10.1016/J.JISA.2023.103545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaiOCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RajapakshaKAPM23, author = {Sampath Rajapaksha and Harsha Kalutarage and M. Omar Al{-}Kadri and Andrei Petrovski and Garikayi Madzudzo}, title = {Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103570}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103570}, doi = {10.1016/J.JISA.2023.103570}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RajapakshaKAPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RanaPKWK23, author = {Subhabrata Rana and Fatemeh Khoda Parast and Brett Kelly and Yang Wang and Kenneth B. Kent}, title = {A comprehensive survey of cryptography key management systems}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103607}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103607}, doi = {10.1016/J.JISA.2023.103607}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RanaPKWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RandiveMS23, author = {Krunal Randive and R. Mohan and Ambairam Muthu Sivakrishna}, title = {An efficient pattern-based approach for insider threat classification using the image-based feature representation}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103434}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103434}, doi = {10.1016/J.JISA.2023.103434}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RandiveMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RewalSMPM23, author = {Purva Rewal and Mrityunjay Singh and Dheerendra Mishra and Komal Pursharthi and Ankita Mishra}, title = {Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103505}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103505}, doi = {10.1016/J.JISA.2023.103505}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RewalSMPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RuiuLCG23, author = {Pietro Ruiu and Andrea Lagorio and Marinella Cadoni and Enrico Grosso}, title = {Enhancing eID card mobile-based authentication through 3D facial reconstruction}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103577}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103577}, doi = {10.1016/J.JISA.2023.103577}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RuiuLCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahinA23, author = {Meryem Soysaldi Sahin and Sedat Akleylek}, title = {A survey of quantum secure group signature schemes: Lattice-based approach}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103432}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103432}, doi = {10.1016/J.JISA.2023.103432}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SahinA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SakshiMS23, author = {Sakshi and Aruna Malik and Ajay K. Sharma}, title = {Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103579}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103579}, doi = {10.1016/J.JISA.2023.103579}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SakshiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaleemWI23, author = {Mahreen Saleem and M. R. Warsi and Saiful Islam}, title = {Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103389}, doi = {10.1016/J.JISA.2022.103389}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SaleemWI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SangaviT23, author = {V. Sangavi and Palanivel Thangavel}, title = {An exquisite multiple image encryption harnessing multi-scroll Lu-Chen and Chua chaotic systems employing domino strategy}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103408}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103408}, doi = {10.1016/J.JISA.2022.103408}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SangaviT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderA23, author = {Johannes Schneider and Giovanni Apruzzese}, title = {Dual adversarial attacks: Fooling humans and classifiers}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103502}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103502}, doi = {10.1016/J.JISA.2023.103502}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SchneiderA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderB23, author = {Johannes Schneider and Frank Breitinger}, title = {Towards {AI} forensics: Did the artificial intelligence system do it?}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103517}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103517}, doi = {10.1016/J.JISA.2023.103517}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SchneiderB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaP23, author = {Payal Sharma and B. R. Purushothama}, title = {Generalization of multicast encryption for Internet of Things deployment}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103571}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103571}, doi = {10.1016/J.JISA.2023.103571}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharmaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShatnawiAATM23, author = {Ahmed S. Shatnawi and Mahmoud M. Almazari and Zakarea AlShara and Eyad Taqieddin and Dheya Mustafa}, title = {{RSA} cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103614}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103614}, doi = {10.1016/J.JISA.2023.103614}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShatnawiAATM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShawD23, author = {Surbhi Shaw and Ratna Dutta}, title = {A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103549}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103549}, doi = {10.1016/J.JISA.2023.103549}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShawD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShawkyUFIAAT23, author = {Mahmoud A. Shawky and Muhammad Usman and David Flynn and Muhammad Ali Imran and Qammer H. Abbasi and Shuja Ansari and Ahmad Taha}, title = {Blockchain-based secret key extraction for efficient and secure authentication in VANETs}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103476}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103476}, doi = {10.1016/J.JISA.2023.103476}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShawkyUFIAAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShenYTQ23, author = {Xiaofeng Shen and Heng Yao and Shunquan Tan and Chuan Qin}, title = {VHNet: {A} Video Hiding Network with robustness to video coding}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103515}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103515}, doi = {10.1016/J.JISA.2023.103515}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShenYTQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShengFLTCS23, author = {Qingxin Sheng and Chong Fu and Zhaonan Lin and Ming Tie and Junxin Chen and Chiu{-}Wing Sham}, title = {A one-time-pad-like chaotic image encryption scheme using data steganography}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103592}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103592}, doi = {10.1016/J.JISA.2023.103592}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShengFLTCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghBSSZ23, author = {Monu Singh and Naman Baranwal and Kedar Nath Singh and Amit Kumar Singh and Huiyu Zhou}, title = {Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption-compression}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103628}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103628}, doi = {10.1016/J.JISA.2023.103628}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SinghBSSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SoltaniOSJ23, author = {Mahdi Soltani and Behzad Ousat and Mahdi Jafari Siavoshani and Amir Hossein Jahangir}, title = {An adaptable deep learning-based intrusion detection system to zero-day attacks}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103516}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103516}, doi = {10.1016/J.JISA.2023.103516}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SoltaniOSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SrivastavaDTS23, author = {Vikas Srivastava and Sumit Kumar Debnath and Sharwan K. Tiwari and Harshdeep Singh}, title = {On the security of multivariate-based ring signature and other related primitives}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103474}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103474}, doi = {10.1016/J.JISA.2023.103474}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SrivastavaDTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StepniakM23, author = {Mateusz Stepniak and Jakub Mielczarek}, title = {Analysis of multiple overlapping paths algorithms for secure key exchange in large-scale quantum networks}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103581}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103581}, doi = {10.1016/J.JISA.2023.103581}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/StepniakM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SuLZWW23, author = {Zhaopin Su and Mengke Li and Guofu Zhang and Qinfang Wu and Yaofei Wang}, title = {Robust audio copy-move forgery detection on short forged slices using sliding window}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103507}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103507}, doi = {10.1016/J.JISA.2023.103507}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SuLZWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunTZCLW23, author = {Xiaobing Sun and Liangqiong Tu and Jiale Zhang and Jie Cai and Bin Li and Yu Wang}, title = {\emph{ASSBert}: Active and semi-supervised bert for smart contract vulnerability detection}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103423}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103423}, doi = {10.1016/J.JISA.2023.103423}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SunTZCLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunZWJZ23, author = {Jintong Sun and Fucai Zhou and Qiang Wang and Zi Jiao and Yun Zhang}, title = {Flexible revocation and verifiability for outsourced Private Set Intersection computation}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103438}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103438}, doi = {10.1016/J.JISA.2023.103438}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SunZWJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SwethaAU23, author = {Gadde Swetha and J. Amutharaj and S. Usha}, title = {A security model to protect the isolation of medical data in the cloud using hybrid cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103412}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103412}, doi = {10.1016/J.JISA.2022.103412}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SwethaAU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TalukderHIUAYAM23, author = {Md. Alamin Talukder and Khondokar Fida Hasan and Md. Manowarul Islam and Ashraf Uddin and Arnisha Akhter and Mohammand Abu Yousuf and Fares Alharbi and Mohammad Ali Moni}, title = {A dependable hybrid machine learning model for network intrusion detection}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103405}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103405}, doi = {10.1016/J.JISA.2022.103405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TalukderHIUAYAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TangCLWT23, author = {Zongwei Tang and Xiuli Chai and Yang Lu and Binjie Wang and Yong Tan}, title = {An end-to-end screen shooting resilient blind watermarking scheme for medical images}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103547}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103547}, doi = {10.1016/J.JISA.2023.103547}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TangCLWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TeganeSB23, author = {Saher Tegane and Fouzi Semchedine and Abdelmalek Boudries}, title = {An extended Attribute-based access control with controlled delegation in IoT}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103473}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103473}, doi = {10.1016/J.JISA.2023.103473}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TeganeSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TengTJ23, author = {Weijian Teng and Je Sen Teh and Norziana Jamil}, title = {On the security of lightweight block ciphers against neural distinguishers: Observations on LBC-IoT and {SLIM}}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103531}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103531}, doi = {10.1016/J.JISA.2023.103531}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TengTJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ThakorRDP23, author = {Vishal A. Thakor and Mohammad Abdur Razzaque and Anand D. Darji and Aksh R. Patel}, title = {A novel 5-bit S-box design for lightweight cryptography algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103444}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103444}, doi = {10.1016/J.JISA.2023.103444}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ThakorRDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TianGJLY23, author = {Pengxu Tian and Cheng Guo and Yingmo Jie and Yining Liu and Lin Yao}, title = {Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103471}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103471}, doi = {10.1016/J.JISA.2023.103471}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TianGJLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TongXHWR23, author = {Yan Tong and Shiwei Xu and Jinzhou Huang and Bangju Wang and Zhengwei Ren}, title = {A new analysis of small S-boxes based on a new notion of algebraic immunity}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103574}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103574}, doi = {10.1016/J.JISA.2023.103574}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TongXHWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TuZHCZ23, author = {Tengfei Tu and Hua Zhang and Yangye Hu and Dong Cui and Xilin Zhai}, title = {A detector for Android repackaged applications with layout-fingerprint}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103527}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103527}, doi = {10.1016/J.JISA.2023.103527}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TuZHCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TundisSM23, author = {Andrea Tundis and Ahmed Ali Shams and Max M{\"{u}}hlh{\"{a}}user}, title = {From the detection towards a pyramidal classification of terrorist propaganda}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103646}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103646}, doi = {10.1016/J.JISA.2023.103646}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TundisSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VadigiSMDB23, author = {Sreekanth Vadigi and Kamalakanta Sethi and Dinesh Mohanty and Shom Prasad Das and Padmalochan Bera}, title = {Federated reinforcement learning based intrusion detection system using dynamic attention mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103608}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103608}, doi = {10.1016/J.JISA.2023.103608}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VadigiSMDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VashishthaCR23, author = {Lalit Kumar Vashishtha and Kakali Chatterjee and Siddhartha Suman Rout}, title = {An Ensemble approach for advance malware memory analysis using Image classification techniques}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103561}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103561}, doi = {10.1016/J.JISA.2023.103561}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VashishthaCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VazaoSCR23, author = {Ana Paula Vaz{\~{a}}o and Leonel Santos and Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and Carlos Rabad{\~{a}}o}, title = {Implementing and evaluating a GDPR-compliant open-source {SIEM} solution}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103509}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103509}, doi = {10.1016/J.JISA.2023.103509}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VazaoSCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VeigaFHW23, author = {Ad{\'{e}}le da Veiga and Steven Furnell and Yuxiang Hong and Merrill Warkentin}, title = {Introduction to the special issue on insider threats in cybersecurity}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103585}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103585}, doi = {10.1016/J.JISA.2023.103585}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VeigaFHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangCW23, author = {Yefan Wang and Jiale Chen and Jun Wang}, title = {Visually meaningful image encryption based on 2D compressive sensing and dynamic embedding}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103613}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103613}, doi = {10.1016/J.JISA.2023.103613}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangCWYXS23, author = {Nai Wang and Junjun Chen and Di Wu and Wencheng Yang and Yong Xiang and Atul Sajjanhar}, title = {Hybrid {KD-NFT:} {A} multi-layered {NFT} assisted robust Knowledge Distillation framework for Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103483}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103483}, doi = {10.1016/J.JISA.2023.103483}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangCWYXS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCHH23, author = {Zheng Wang and Bin Liu and Jingzhao Chen and Weihua Huang and Yong Hu}, title = {Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103436}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103436}, doi = {10.1016/J.JISA.2023.103436}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLCHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLTFY23, author = {Qinglong Wang and YongYong Li and Zhiqiang Tan and Na Fan and GuDi Yao}, title = {Conditional privacy-preserving authentication scheme for {V2V} communication without pseudonyms}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103616}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103616}, doi = {10.1016/J.JISA.2023.103616}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLTFY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLZWLLM23, author = {Yazhou Wang and Bing Li and Yan Zhang and Jiaxin Wu and Guozhu Liu and Yuqi Li and Zhen Mao}, title = {A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103610}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103610}, doi = {10.1016/J.JISA.2023.103610}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLZWLLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangQXTP23, author = {Zhangdong Wang and Jiaohua Qin and Xuyu Xiang and Yun Tan and Jia Peng}, title = {A privacy-preserving cross-media retrieval on encrypted data in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103440}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103440}, doi = {10.1016/J.JISA.2023.103440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangQXTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangWZD23, author = {Junxin Wang and Shangping Wang and Qian Zhang and Yinjuan Deng}, title = {A two-layer consortium blockchain with transaction privacy protection based on sharding technology}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103452}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103452}, doi = {10.1016/J.JISA.2023.103452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangWZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangXTYZY23, author = {Yongjun Wang and Kun Xiong and Yongli Tang and Li Yang and Jing Zhang and Xixi Yan}, title = {More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103650}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103650}, doi = {10.1016/J.JISA.2023.103650}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangXTYZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZL23, author = {Yihao Wang and Ru Zhang and Jianyi Liu}, title = {V-A3tS: {A} rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103512}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103512}, doi = {10.1016/J.JISA.2023.103512}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WenDXCZW23, author = {Xueyuan Wen and Kaiyan Dai and Qi Xiong and Lili Chen and Jian Zhang and Zhen Wang}, title = {An approach to internal threats detection based on sentiment analysis and network analysis}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103557}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103557}, doi = {10.1016/J.JISA.2023.103557}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WenDXCZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WenGGL23, author = {Yamin Wen and Jinyu Guo and Zheng Gong and Cong Lin}, title = {A new Private Mutual Authentication scheme with group discovery}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103558}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103558}, doi = {10.1016/J.JISA.2023.103558}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WenGGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuG23, author = {Zhijun Wu and Junjun Guo}, title = {{MFPD-LSTM:} {A} steganalysis method based on multiple features of pitch delay using {RNN-LSTM}}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103469}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103469}, doi = {10.1016/J.JISA.2023.103469}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuYCL23, author = {Xiaotian Wu and Ching{-}Nung Yang and Hong{-}Wu Cai and Yanxiao Liu}, title = {A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103520}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103520}, doi = {10.1016/J.JISA.2023.103520}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuYCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZZYL23, author = {Bolun Wu and Futai Zou and Chengwei Zhang and Tangda Yu and Yun Li}, title = {Multi-field relation mining for malicious {HTTP} traffic detection based on attention and cross network}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103411}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103411}, doi = {10.1016/J.JISA.2022.103411}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiaCYW23, author = {Ming Xia and Jiyou Chen and Gaobo Yang and Shuai Wang}, title = {Robust detection of seam carving with low ratio via pixel adjacency subtraction and CNN-based transfer learning}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103522}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103522}, doi = {10.1016/J.JISA.2023.103522}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiaCYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiaZWG23, author = {Xiaofan Xia and Songsong Zhang and Kunshu Wang and Tiegang Gao}, title = {A novel color image tampering detection and self-recovery based on fragile watermarking}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103619}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103619}, doi = {10.1016/J.JISA.2023.103619}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XiaZWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XieSZWG23, author = {Chenlu Xie and Runhua Shi and XiaoXu Zhang and Pengbo Wang and WanPeng Guo}, title = {Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103526}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103526}, doi = {10.1016/J.JISA.2023.103526}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XieSZWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuJWSHG23, author = {Guangwei Xu and Wenrui Ji and Yan Wang and Xiujin Shi and Qiubo Huang and Yanglan Gan}, title = {Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103600}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103600}, doi = {10.1016/J.JISA.2023.103600}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuJWSHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuNLH23, author = {Han Xu and Priyadarsi Nanda and Jie Liang and Xiangjian He}, title = {FCH, an incentive framework for data-owner dominated federated learning}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103521}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103521}, doi = {10.1016/J.JISA.2023.103521}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuNLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuTWAW23, author = {Kexin Xu and Benjamin Hong Meng Tan and Li{-}Ping Wang and Khin Mi Mi Aung and Huaxiong Wang}, title = {Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103582}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103582}, doi = {10.1016/J.JISA.2023.103582}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuTWAW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YanK23, author = {Shin{-}Hung Yan and Cooper Cheng{-}Yuan Ku}, title = {Using language-specific input methods and pronunciation rules to improve the guesses of passwords}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103588}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103588}, doi = {10.1016/J.JISA.2023.103588}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YanK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YanLISH23, author = {Fei Yan and Nianqiao Li and Abdullah M. Iliyasu and Ahmed S. Salama and Kaoru Hirota}, title = {Insights into security and privacy issues in smart healthcare systems based on medical images}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103621}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103621}, doi = {10.1016/J.JISA.2023.103621}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YanLISH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLK23, author = {Ching{-}Nung Yang and Peng Li and Hsin{-}Chuan Kuo}, title = {(\emph{k, n}) secret image sharing scheme with privileged set}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103413}, doi = {10.1016/J.JISA.2022.103413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangTZZ23, author = {Nan Yang and Youliang Tian and Zhou Zhou and Qijia Zhang}, title = {A provably secure collusion-resistant identity-based proxy re-encryption scheme based on {NTRU}}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103604}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103604}, doi = {10.1016/J.JISA.2023.103604}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangTZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWHYC23, author = {Dongmei Yang and Jianghong Wei and Xuexian Hu and Kuiwu Yang and Yue Chen}, title = {System-widely and fine-grained forward secure identity-based signature scheme}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103659}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103659}, doi = {10.1016/J.JISA.2023.103659}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangWHYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWQL23, author = {Zeyu Yang and Ziqing Wang and Fei Qiu and Fagen Li}, title = {A group key agreement protocol based on {ECDH} and short signature}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103388}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103388}, doi = {10.1016/J.JISA.2022.103388}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangWQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangXWH23, author = {Lin Yang and Dawen Xu and Rangding Wang and Songhan He}, title = {Adaptive {HEVC} video steganography based on distortion compensation optimization}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103442}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103442}, doi = {10.1016/J.JISA.2023.103442}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangXWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YaoRWWYY23, author = {Siyu Yao and Yizhi Ren and Dong Wang and Yeru Wang and Weifeng Yin and Lifeng Yuan}, title = {{SNN-PPRL:} {A} secure record matching scheme based on siamese neural network}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103529}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103529}, doi = {10.1016/J.JISA.2023.103529}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YaoRWWYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Yin23, author = {Haotian Yin}, title = {Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103385}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103385}, doi = {10.1016/J.JISA.2022.103385}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Yin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuCTYZ23, author = {Jiarui Yu and Jingsong Cui and Hang Tu and Chunwu Yu and Man Zhou}, title = {A {SM2} based efficient and lightweight batch verification approach for {IC} cards}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103409}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103409}, doi = {10.1016/J.JISA.2022.103409}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuCTYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuH23, author = {Huifang Yu and Wenxuan Hui}, title = {Certificateless ring signature from {NTRU} lattice for electronic voting}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103496}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103496}, doi = {10.1016/J.JISA.2023.103496}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuLW23, author = {Huifang Yu and Junze Liu and Zhicang Wang}, title = {Certificateless multi-source elliptic curve ring signcryption for cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103449}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103449}, doi = {10.1016/J.JISA.2023.103449}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanHHDCX23, author = {Zhanwei Yuan and Shufeng Huang and Linqing Huang and Yuxiao Du and Shuting Cai and Xiaoming Xiong}, title = {Safe-LBP: {A} visually meaningful image encryption scheme based on {LBP} and compressive sensing}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103591}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103591}, doi = {10.1016/J.JISA.2023.103591}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YuanHHDCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZambranoTTYV23, author = {Patricio Zambrano and Jenny Torres and Luis Tello{-}Oquendo and {\'{A}}ngel Y{\'{a}}nez and Luis Vel{\'{a}}squez}, title = {On the modeling of cyber-attacks associated with social engineering: {A} parental control prototype}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103501}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103501}, doi = {10.1016/J.JISA.2023.103501}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZambranoTTYV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCLCYG23, author = {Bo Zhang and Helei Cui and Xiaoning Liu and Yaxing Chen and Zhiwen Yu and Bin Guo}, title = {Decentralized and secure deduplication with dynamic ownership in MLaaS}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103524}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103524}, doi = {10.1016/J.JISA.2023.103524}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangCLCYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangFZH23, author = {Qiuyu Zhang and Minrui Fu and Zhenyu Zhao and Yibo Huang}, title = {Searchable encryption over encrypted speech retrieval scheme in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103542}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103542}, doi = {10.1016/J.JISA.2023.103542}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangFZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLXBWD23, author = {Lianming Zhang and Kui Liu and Xiaowei Xie and Wenji Bai and Baolin Wu and Pingping Dong}, title = {A data-driven network intrusion detection system using feature selection and deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {78}, pages = {103606}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103606}, doi = {10.1016/J.JISA.2023.103606}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangLXBWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLZZLY23, author = {Jinghui Zhang and Boxi Liang and Hancheng Zhang and Wei Zhang and Zhen Ling and Ming Yang}, title = {Mobile applications identification using autoencoder based electromagnetic side channel analysis}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103481}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103481}, doi = {10.1016/J.JISA.2023.103481}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangLZZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangSM23, author = {Hua Zhang and Huiying Sun and Fanli Meng}, title = {Reversible data hiding scheme based on improved interpolation and three-in-one intelligent strategy}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103573}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103573}, doi = {10.1016/J.JISA.2023.103573}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTLLWZL23, author = {Yaoyuan Zhang and Yu{-}an Tan and Mingfeng Lu and Lu Liu and Dianxin Wang and Quanxin Zhang and Yuanzhang Li}, title = {Towards interpreting vulnerability of object detection models via adversarial distillation}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103410}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103410}, doi = {10.1016/J.JISA.2022.103410}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangTLLWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangWZW23, author = {Ziming Zhang and Wenjia Wang and Zihan Zhao and Erfu Wang}, title = {PVO-based reversible data hiding using bit plane segmentation and pixel expansion}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103649}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103649}, doi = {10.1016/J.JISA.2023.103649}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangWZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangZFL23, author = {Hengyan Zhang and Weizhe Zhang and Yuming Feng and Yang Liu}, title = {SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103484}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103484}, doi = {10.1016/J.JISA.2023.103484}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangZFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaoDTLYW23, author = {Meng Zhao and Yong Ding and Shijie Tang and Hai Liang and Changsong Yang and Huiyong Wang}, title = {Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103441}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103441}, doi = {10.1016/J.JISA.2023.103441}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhaoDTLYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Zheng23, author = {Mengce Zheng}, title = {Generalized implicit-key attacks on {RSA}}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103562}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103562}, doi = {10.1016/J.JISA.2023.103562}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Zheng23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhengLLLL23, author = {Long Zheng and Zhi Li and Ruwei Luo and Zhangyu Liu and Changhong Li}, title = {VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images}, journal = {J. Inf. Secur. Appl.}, volume = {79}, pages = {103657}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103657}, doi = {10.1016/J.JISA.2023.103657}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhengLLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouHCY23, author = {Xiaoyu Zhou and Wien Hong and Tung{-}Shou Chen and Guangsong Yang}, title = {Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103425}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103425}, doi = {10.1016/J.JISA.2023.103425}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouHCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouHHGXWW23, author = {Kuo Zhou and Jing Huang and Honggui Han and Bei Gong and Ao Xiong and Wei Wang and Qihui Wu}, title = {Smart contracts vulnerability detection model based on adversarial multi-task learning}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103555}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103555}, doi = {10.1016/J.JISA.2023.103555}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouHHGXWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouLLPLX23, author = {Junwei Zhou and Botian Lei and Huile Lang and Emmanouil Panaousis and Kaitai Liang and Jianwen Xiang}, title = {Secure genotype imputation using homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103386}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103386}, doi = {10.1016/J.JISA.2022.103386}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouLLPLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0002P22, author = {Peter Sabev and Milen Petrov}, title = {Android Password Managers and Vault Applications: Data Storage Security Issues Identification}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103152}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103152}, doi = {10.1016/J.JISA.2022.103152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/0002P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Abd-El-Atty22, author = {Bassem Abd{-}El{-}Atty}, title = {Quaternion with quantum walks for designing a novel color image cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103367}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103367}, doi = {10.1016/J.JISA.2022.103367}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Abd-El-Atty22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbdollahiHT22, author = {Behnaz Abdollahi and Ahad Harati and Amirhossein Taherinia}, title = {Non-additive image steganographic framework based on variational inference in Markov Random Fields}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103254}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103254}, doi = {10.1016/J.JISA.2022.103254}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AbdollahiHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbdullahiSWYWW22, author = {Sani M. Abdullahi and Shuifa Sun and Yifei Wang and Pengpeng Yang and HuaZheng Wang and Beng Wang}, title = {A hybrid {BTP} approach with filtered {BCH} codes for improved performance and security}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103355}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103355}, doi = {10.1016/J.JISA.2022.103355}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AbdullahiSWYWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbuAlghanamQAS22, author = {Orieb AbuAlghanam and Mohammad Qatawneh and Wesam Almobaideen and Maha Saadeh}, title = {A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103173}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103173}, doi = {10.1016/J.JISA.2022.103173}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AbuAlghanamQAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhalawatBTP22, author = {Anchal Ahalawat and Korra Sathya Babu and Ashok Kumar Turuk and Sanjeev Patel}, title = {A low-rate DDoS detection and mitigation for {SDN} using Renyi Entropy with Packet Drop}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103212}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103212}, doi = {10.1016/J.JISA.2022.103212}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhalawatBTP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhalawatBTP22a, author = {Anchal Ahalawat and Korra Sathya Babu and Ashok Kumar Turuk and Sanjeev Patel}, title = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN} using Renyi Entropy with Packet Drop" [Journal of Information Security and Applications 68 {(2022)} 103212]}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103344}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103344}, doi = {10.1016/J.JISA.2022.103344}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadA0T22, author = {Rasheed Ahmad and Izzat Alsmadi and Wasim Alhamdani and Lo'ai Tawalbeh}, title = {A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103196}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103196}, doi = {10.1016/J.JISA.2022.103196}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadA0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadUAK22, author = {Syed Jalal Ahmad and Ishrath Unissa and M. Shoukath Ali and Abhay Kumar}, title = {Enhanced security to MANETs using digital codes}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103147}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103147}, doi = {10.1016/J.JISA.2022.103147}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadUAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhvanooeyZMLKCC22, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Wojciech Mazurczyk and Qianmu Li and Max Kilger and Kim{-}Kwang Raymond Choo and Mauro Conti}, title = {CovertSYS: {A} systematic covert communication approach for providing secure end-to-end conversation via social networks}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103368}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103368}, doi = {10.1016/J.JISA.2022.103368}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhvanooeyZMLKCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AkleylekS22, author = {Sedat Akleylek and Meryem Soysaldi}, title = {A new lattice-based authentication scheme for IoT}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103053}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103053}, doi = {10.1016/J.JISA.2021.103053}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AkleylekS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Al-DweikHMM22, author = {Ahmad Y. Al{-}Dweik and Iqtadar Hussain and Moutaz Saleh Mustafa and M. T. Mustafa}, title = {A novel method to generate key-dependent s-boxes with identical algebraic properties}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103065}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103065}, doi = {10.1016/J.JISA.2021.103065}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Al-DweikHMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Al-OdatKA22, author = {Zeyad A. Al{-}Odat and Samee U. Khan and Eman Al{-}qtiemat}, title = {A modified secure hash design to circumvent collision and length extension attacks}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103376}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103376}, doi = {10.1016/J.JISA.2022.103376}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Al-OdatKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlguliyevAO22, author = {Rasim M. Alguliyev and Fargana J. Abdullayeva and Sabira S. Ojagverdiyeva}, title = {Image-based malicious Internet content filtering method for child protection}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103123}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103123}, doi = {10.1016/J.JISA.2022.103123}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlguliyevAO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliIA22, author = {Noor Ul Ain Ali and Waseem Iqbal and Hammad Afzal}, title = {Carving of the {OOXML} document from volatile memory using unsupervised learning techniques}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103096}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103096}, doi = {10.1016/J.JISA.2021.103096}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AliIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliSLMV22, author = {Mohammad Ali and Mohammadreza Sadeghi and Ximeng Liu and Yinbin Miao and Athanasios V. Vasilakos}, title = {Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103101}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103101}, doi = {10.1016/J.JISA.2021.103101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AliSLMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlorainiJRB22, author = {Fatimah Aloraini and Amir Javed and Omer F. Rana and Pete Burnap}, title = {Adversarial machine learning in IoT from an insider point of view}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103341}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103341}, doi = {10.1016/J.JISA.2022.103341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlsuhibanyP22, author = {Suliman A. Alsuhibany and Mohammad Tanvir Parvez}, title = {Attack-filtered interactive arabic CAPTCHAs}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103318}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103318}, doi = {10.1016/J.JISA.2022.103318}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlsuhibanyP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Anagnostopoulos22, author = {Marios Anagnostopoulos and Stavros Lagos and Georgios Kambourakis}, title = {Large-scale empirical evaluation of {DNS} and {SSDP} amplification attacks}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103168}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103168}, doi = {10.1016/J.JISA.2022.103168}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Anagnostopoulos22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ArtilesCP22, author = {Jos{\'{e}} A. P. Artiles and Daniel Pedro Bezerra Chaves and Cecilio Pimentel}, title = {Robust image watermarking algorithm using chaotic sequences}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103219}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103219}, doi = {10.1016/J.JISA.2022.103219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ArtilesCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BG22, author = {Suma B and Shobha G}, title = {Fractional salp swarm algorithm: An association rule based privacy-preserving strategy for data sanitization}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103224}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103224}, doi = {10.1016/J.JISA.2022.103224}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bagherpour22, author = {Bagher Bagherpour}, title = {An efficient verifiable secret redistribution scheme}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103295}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103295}, doi = {10.1016/J.JISA.2022.103295}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Bagherpour22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bagherpour22a, author = {Bagher Bagherpour}, title = {Corrigendum to "An efficient verifiable secret redistribution scheme" [Journal of information security and applications, 69 {(2022)103295]}}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103356}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103356}, doi = {10.1016/J.JISA.2022.103356}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Bagherpour22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BahramiG22, author = {Somaye Bahrami and Reza Ghasemi}, title = {A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103206}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103206}, doi = {10.1016/J.JISA.2022.103206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BahramiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BaiCDFZ22, author = {Xuemei Bai and Yong Chen and Gangpeng Duan and Chao Feng and Wanli Zhang}, title = {A data hiding scheme based on the difference of image interpolation algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103068}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103068}, doi = {10.1016/J.JISA.2021.103068}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BaiCDFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BarenghiCMPPS22, author = {Alessandro Barenghi and Diego Carrera and Silvia Mella and Andrea Pace and Gerardo Pelosi and Ruggero Susella}, title = {Profiled side channel attacks against the {RSA} cryptosystem using neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103122}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103122}, doi = {10.1016/J.JISA.2022.103122}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BarenghiCMPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BatistaMS22, author = {Edgar Batista and Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and Agusti Solanas}, title = {Privacy-preserving process mining: {A} microaggregation-based approach}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103235}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103235}, doi = {10.1016/J.JISA.2022.103235}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BatistaMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BelaziKATXIE22, author = {Akram Belazi and Sofiane Kharbech and Md Nazish Aslam and Muhammad Talha and Wei Xiang and Abdullah M. Iliyasu and Ahmed A. Abd El{-}Latif}, title = {Improved Sine-Tangent chaotic map with application in medical images encryption}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103131}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103131}, doi = {10.1016/J.JISA.2022.103131}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BelaziKATXIE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BensaoudK22, author = {Ahmed Bensaoud and Jugal Kalita}, title = {Deep multi-task learning for malware image classification}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103057}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103057}, doi = {10.1016/J.JISA.2021.103057}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BensaoudK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BharathirajaKGH22, author = {S. Bharathiraja and B. Rajesh Kanna and S. Geetha and M. Hariharan}, title = {Exposing digital image forgeries from statistical footprints}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103273}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103273}, doi = {10.1016/J.JISA.2022.103273}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BharathirajaKGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhattacharyaRDC22, author = {Munmun Bhattacharya and Sandip Roy and Ashok Kumar Das and Samiran Chattopadhyay and Soumya Banerjee and Ankush Mitra}, title = {DDoS attack resisting authentication protocol for mobile based online social network applications}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103115}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103115}, doi = {10.1016/J.JISA.2022.103115}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BhattacharyaRDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BlancoGRPPMTF22, author = {Carlos Blanco and Diego Garc{\'{\i}}a{-}Saiz and David Garcia Rosado and Antonio Santos{-}Olmo and Jes{\'{u}}s Peral and Alejandro Mat{\'{e}} and Juan Trujillo and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Security policies by design in NoSQL document databases}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103120}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103120}, doi = {10.1016/J.JISA.2022.103120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BlancoGRPPMTF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BoseM22, author = {Anirban Bose and Santi P. Maity}, title = {Secure sparse watermarking on {DWT-SVD} for digital images}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103255}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103255}, doi = {10.1016/J.JISA.2022.103255}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BoseM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BrahimiM22, author = {Mohamed Amine Brahimi and Fatiha Merazka}, title = {Data confidentiality-preserving schemes for random linear network coding-capable networks}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103136}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103136}, doi = {10.1016/J.JISA.2022.103136}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BrahimiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChagantiRP22, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103306}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103306}, doi = {10.1016/J.JISA.2022.103306}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChagantiRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaiLPLZ22, author = {Tingting Chai and Jiahui Li and Shitala Prasad and Qi Lu and Zhaoxin Zhang}, title = {Shape-driven lightweight {CNN} for finger-vein biometrics}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103211}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103211}, doi = {10.1016/J.JISA.2022.103211}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaiLPLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChangMLZW22, author = {Zhuo Chang and Yan Meng and Wenyuan Liu and Haojin Zhu and Lin Wang}, title = {WiCapose: Multi-modal fusion based transparent authentication in mobile environments}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103130}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103130}, doi = {10.1016/J.JISA.2022.103130}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChangMLZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChatzoglouKK22, author = {Efstratios Chatzoglou and Georgios Kambourakis and Constantinos Kolias}, title = {How is your Wi-Fi connection today? DoS attacks on {WPA3-SAE}}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103058}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103058}, doi = {10.1016/J.JISA.2021.103058}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChatzoglouKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChefranovO22, author = {Alexander G. Chefranov and G{\"{u}}rc{\"{u}} {\"{O}}z}, title = {Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified {LSB} for grayscale images}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103314}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103314}, doi = {10.1016/J.JISA.2022.103314}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChefranovO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenALCLSC22, author = {Zigang Chen and Jin Ao and Wenjun Luo and Zhiquan Cheng and Yuhong Liu and Kai Sheng and Long Chen}, title = {A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103247}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103247}, doi = {10.1016/J.JISA.2022.103247}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenALCLSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenC22, author = {Sisheng Chen and Chin{-}Chen Chang}, title = {Reversible data hiding in encrypted images using block-based adaptive MSBs prediction}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103297}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103297}, doi = {10.1016/J.JISA.2022.103297}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCX22, author = {Long Chen and Jianguo Chen and Chunhe Xia}, title = {Social network behavior and public opinion manipulation}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103060}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103060}, doi = {10.1016/J.JISA.2021.103060}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenGTD22, author = {Jinhai Chen and Zheng Gong and Yufeng Tang and Xinfeng Dong}, title = {A comprehensive analysis of lightweight 8-bit sboxes from iterative structures}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103302}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103302}, doi = {10.1016/J.JISA.2022.103302}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenGTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenHSJX22, author = {Aidong Chen and Chen Hong and Xinna Shang and Hongyuan Jing and Sen Xu}, title = {Timing leakage to break {SM2} signature algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103210}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103210}, doi = {10.1016/J.JISA.2022.103210}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenHSJX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenLXW22, author = {Biwen Chen and Xue Li and Tao Xiang and Peng Wang}, title = {{SBRAC:} Blockchain-based sealed-bid auction with bidding price privacy and public verifiability}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103082}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103082}, doi = {10.1016/J.JISA.2021.103082}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenLXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenN22, author = {Liqun Chen and Siaw{-}Lynn Ng}, title = {Securing emergent behaviour in swarm robotics}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103047}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103047}, doi = {10.1016/J.JISA.2021.103047}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenXMZWLSX22, author = {Li{-}Bo Chen and Yihang Xia and Zhenbang Ma and Ruijie Zhao and Yanhao Wang and Yue Liu and Wenqi Sun and Zhi Xue}, title = {{SEAF:} {A} Scalable, Efficient, and Application-independent Framework for container security detection}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103351}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103351}, doi = {10.1016/J.JISA.2022.103351}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenXMZWLSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenYXGH22, author = {Jiyou Chen and Gaobo Yang and Ming Xia and Zhiqing Guo and Tianqiang Huang}, title = {HDNet: {A} dual-stream network with progressive fusion for image hazing detection}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103271}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103271}, doi = {10.1016/J.JISA.2022.103271}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenYXGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChengYLSX22, author = {Jingwen Cheng and Xuehu Yan and Lintao Liu and Yuyuan Sun and Fengyue Xing}, title = {Comprehensive reversible secret image sharing with palette cover images}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103233}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103233}, doi = {10.1016/J.JISA.2022.103233}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChengYLSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChouhanPB22, author = {Vikas Chouhan and Sateesh Kumar Peddoju and Rajkumar Buyya}, title = {\emph{dualDup}: {A} secure and reliable cloud storage framework to deduplicate the encrypted data and key}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103265}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103265}, doi = {10.1016/J.JISA.2022.103265}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChouhanPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ContiVV22, author = {Mauro Conti and P. Vinod and Alessio Vitella}, title = {Obfuscation detection in Android applications using deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103311}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103311}, doi = {10.1016/J.JISA.2022.103311}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ContiVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CoruhB22, author = {Ugur Coruh and Oguz Bayat}, title = {{ESAR:} Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103081}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103081}, doi = {10.1016/J.JISA.2021.103081}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CoruhB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DebnathSMKS22, author = {Sumit Kumar Debnath and Vikas Srivastava and Tapaswini Mohanty and Nibedita Kundu and Kouichi Sakurai}, title = {Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103127}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103127}, doi = {10.1016/J.JISA.2022.103127}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DebnathSMKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeverashettiKP22, author = {Mounika Deverashetti and Ranjitha K. and K. V. Pradeepthi}, title = {Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103171}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103171}, doi = {10.1016/J.JISA.2022.103171}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeverashettiKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeviRS22, author = {Anju Devi and Geetanjali Rathee and Hemraj Saini}, title = {Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using {DPSO} and {M-ITA} Algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103094}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103094}, doi = {10.1016/J.JISA.2021.103094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeviRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeyDSS22, author = {Kunal Dey and Sumit Kumar Debnath and Pantelimon Stanica and Vikas Srivastava}, title = {A post-quantum signcryption scheme using isogeny based cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103280}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103280}, doi = {10.1016/J.JISA.2022.103280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeyDSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Diaz-HonrubiaBS22, author = {Antonio Jes{\'{u}}s D{\'{\i}}az{-}Honrubia and Alberto Bl{\'{a}}zquez{-}Herranz and Luc{\'{\i}}a Prieto Santamar{\'{\i}}a and Ernestina Menasalvas Ruiz and Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and Gustavo {Gonzalez Granadillo} and Rodrigo Diaz and Emmanouil Panaousis and Christos Xenakis}, title = {A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103350}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103350}, doi = {10.1016/J.JISA.2022.103350}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Diaz-HonrubiaBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DingL22, author = {Qingfeng Ding and Jinguo Li}, title = {AnoGLA: An efficient scheme to improve network anomaly detection}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103149}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103149}, doi = {10.1016/J.JISA.2022.103149}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DingL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DouYLX22, author = {Hanyue Dou and Lingyuan Yin and Yuan Lu and Jing Xu}, title = {A probabilistic Proof-of-Stake protocol with fast confirmation}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103268}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103268}, doi = {10.1016/J.JISA.2022.103268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DouYLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuWZLBL22, author = {Zhenyu Du and Xingxing Wei and Weiming Zhang and Fangzheng Liu and Huanyu Bian and Jiayang Liu}, title = {A motional but temporally consistent physical video examples}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103278}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103278}, doi = {10.1016/J.JISA.2022.103278}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DuWZLBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuyHHNP22, author = {Phan The Duy and Hien Do Hoang and Do Thi Thu Hien and Anh Gia{-}Tuan Nguyen and Van{-}Hau Pham}, title = {{B-DAC:} {A} decentralized access control framework on Northbound interface for securing {SDN} using blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103080}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103080}, doi = {10.1016/J.JISA.2021.103080}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DuyHHNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ErolaAGC22, author = {Arnau Erola and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, title = {Insider-threat detection: Lessons from deploying the {CITD} tool in three multinational organisations}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103167}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103167}, doi = {10.1016/J.JISA.2022.103167}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ErolaAGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FanPZDZ22, author = {Guojun Fan and Zhibin Pan and Quan Zhou and Jing Dong and Xiaoran Zhang}, title = {Reversible data hiding in multispectral images for satellite communications}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103180}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103180}, doi = {10.1016/J.JISA.2022.103180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FanPZDZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarzadniaSN22, author = {Ehsan Farzadnia and Hossein Shirazi and Alireza Nowroozi}, title = {Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103349}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103349}, doi = {10.1016/J.JISA.2022.103349}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Figueras-Martin22, author = {Emilio Figueras{-}Mart{\'{\i}}n and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Juan Boubeta{-}Puig}, title = {Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103229}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103229}, doi = {10.1016/J.JISA.2022.103229}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Figueras-Martin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GanganAL22, author = {Manjary P. Gangan and K. Anoop and Lajish V. L.}, title = {Distinguishing natural and computer generated images using Multi-Colorspace fused EfficientNet}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103261}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103261}, doi = {10.1016/J.JISA.2022.103261}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GanganAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoA22, author = {Guangyong Gao and Lord Amoah}, title = {Automatic contrast enhancement with reversible data hiding using bi-histogram shifting}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103223}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103223}, doi = {10.1016/J.JISA.2022.103223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoHSH22, author = {Xianwei Gao and Changzhen Hu and Chun Shan and Weijie Han}, title = {MaliCage: {A} packed malware family classification framework based on {DNN} and {GAN}}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103267}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103267}, doi = {10.1016/J.JISA.2022.103267}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoHSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoLF22, author = {Jian Gao and Zhi Li and Bin Fan}, title = {An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional data}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103106}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103106}, doi = {10.1016/J.JISA.2021.103106}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuBX22, author = {Yuhao Gu and Yuebin Bai and Shubin Xu}, title = {{CS-MIA:} Membership inference attack based on prediction confidence series in federated learning}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103201}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103201}, doi = {10.1016/J.JISA.2022.103201}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuBX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaRMC22, author = {Sandeep Gupta and Kiran B. Raja and Fabio Martinelli and Bruno Crispo}, title = {RiderAuth: {A} cancelable touch-signature based rider authentication scheme for driverless taxis}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103357}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103357}, doi = {10.1016/J.JISA.2022.103357}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaRMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaTMSK22, author = {Ankur Gupta and Meenakshi Tripathi and Samya Muhuri and Gaurav Singal and Neeraj Kumar}, title = {A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103259}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103259}, doi = {10.1016/J.JISA.2022.103259}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaTMSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HarmsMJLF22, author = {P. D. Harms and Alexander Marbut and Allen C. Johnston and Paul Lester and Tyler Fezzey}, title = {Exposing the darkness within: {A} review of dark personality traits, models, and measures and their relationship to insider threats}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103378}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103378}, doi = {10.1016/J.JISA.2022.103378}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HarmsMJLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HokiIILS22, author = {Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto}, title = {Distinguishing and key recovery attacks on the reduced-round {SNOW-V} and SNOW-Vi}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103100}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103100}, doi = {10.1016/J.JISA.2021.103100}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HokiIILS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HossainIA22, author = {Md. Shafaeat Hossain and Mohammad T. Islam and Zahid Akhtar}, title = {Incorporating deep learning into capacitive images for smartphone user authentication}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103290}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103290}, doi = {10.1016/J.JISA.2022.103290}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HossainIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HowH22, author = {Haw{-}Bin How and Swee{-}Huay Heng}, title = {Blockchain-Enabled Searchable Encryption in Clouds: {A} Review}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103183}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103183}, doi = {10.1016/J.JISA.2022.103183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HowH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HsiehW22, author = {Ku{-}Sung Hsieh and Chung{-}Ming Wang}, title = {Constructive image steganography using example-based weighted color transfer}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103126}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103126}, doi = {10.1016/J.JISA.2022.103126}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HsiehW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuYZH22, author = {Xuewei Hu and Bo Yang and Jing Zhang and Meijuan Huang}, title = {Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103380}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103380}, doi = {10.1016/J.JISA.2022.103380}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuYZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuZWCLC22, author = {Shuang Hu and Renjun Zhang and Fuqun Wang and Kefei Chen and Bin Lian and Gongliang Chen}, title = {A sanitizable signcryption scheme with public verifiability via chameleon hash function}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103371}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103371}, doi = {10.1016/J.JISA.2022.103371}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuZWCLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangL22, author = {Zhenjie Huang and Zhiwei Lin}, title = {Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systems}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103066}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103066}, doi = {10.1016/J.JISA.2021.103066}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangWWGG22, author = {Hai Huang and Yongjian Wang and Luyao Wang and Huasheng Ge and Qiang Gu}, title = {Secure word-level sorting based on fully homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103372}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103372}, doi = {10.1016/J.JISA.2022.103372}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangWWGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HughesMS22, author = {Kieran Hughes and Kieran McLaughlin and Sakir Sezer}, title = {A Model-Free Approach to Intrusion Response Systems}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103150}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103150}, doi = {10.1016/J.JISA.2022.103150}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HughesMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HurPK22, author = {Uk Hur and Myungseo Park and Jongsung Kim}, title = {A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103181}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103181}, doi = {10.1016/J.JISA.2022.103181}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HurPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HussainIB22, author = {Muhammad Hussain and Nadeem Iqbal and Zia Bashir}, title = {A chaotic image encryption scheme based on multi-directional confusion and diffusion operations}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103347}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103347}, doi = {10.1016/J.JISA.2022.103347}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HussainIB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IborOOA22, author = {Ayei E. Ibor and Olusoji B. Okunoye and Florence A. Oladeji and Khadeejah A. Abdulsalam}, title = {Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems' Communication Networks based on Bio-inspired Deep Neural Network Structure}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103107}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103107}, doi = {10.1016/J.JISA.2021.103107}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IborOOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ImamVK22, author = {Niddal H. Imam and Vassilios G. Vassilakis and Dimitrios S. Kolovos}, title = {{OCR} post-correction for detecting adversarial text images}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103170}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103170}, doi = {10.1016/J.JISA.2022.103170}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ImamVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IshizakaK22, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Multi-dimensional sub/super-range signatures}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103084}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103084}, doi = {10.1016/J.JISA.2021.103084}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/IshizakaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JanaJLV22, author = {Sharmistha Jana and Biswapati Jana and Tzu{-}Chuen Lu and Thanh Nhan Vo}, title = {Reversible data hiding scheme exploiting center folding with fuzzy weight strategy}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103276}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103276}, doi = {10.1016/J.JISA.2022.103276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JanaJLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JolfaeiMZ22, author = {Amirhossein Adavoudi Jolfaei and Hamid Mala and Maryam Zarezadeh}, title = {{EO-PSI-CA:} Efficient outsourced private set intersection cardinality}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {102996}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.102996}, doi = {10.1016/J.JISA.2021.102996}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JolfaeiMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KacarKC22, author = {Sezgin Ka{\c{c}}ar and Mehmet Zeki Konyar and {\"{U}}nal {\c{C}}avusoglu}, title = {4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103369}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103369}, doi = {10.1016/J.JISA.2022.103369}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KacarKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kakkar0ATS22, author = {Riya Kakkar and Rajesh Gupta and Smita Agrawal and Sudeep Tanwar and Ravi Sharma}, title = {Blockchain-based secure and trusted data sharing scheme for autonomous vehicle underlying 5G}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103179}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103179}, doi = {10.1016/J.JISA.2022.103179}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Kakkar0ATS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KernBGFP22, author = {Sascha Kern and Thomas Baumer and Sebastian Groll and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Optimization of Access Control Policies}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103301}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103301}, doi = {10.1016/J.JISA.2022.103301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KernBGFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhaleghiAR22, author = {Mahmoud Khaleghi and Mohammad Reza Aref and Mehdi Rasti}, title = {Context-Aware Ontology-based Security Measurement Model}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103199}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103199}, doi = {10.1016/J.JISA.2022.103199}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhaleghiAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanKAJ22, author = {Akber Ali Khan and Vinod Kumar and Musheer Ahmad and Srinivas Jangirala}, title = {A secure and energy efficient key agreement framework for vehicle-grid system}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103231}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103231}, doi = {10.1016/J.JISA.2022.103231}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanKAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhorasganiSY22, author = {Alireza Abdellahi Khorasgani and Mahdi Sajadieh and Mohammad Rouhollah Yazdani}, title = {Novel lightweight {RFID} authentication protocols for inexpensive tags}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103191}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103191}, doi = {10.1016/J.JISA.2022.103191}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhorasganiSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimKKK22, author = {Giyoon Kim and Soram Kim and Soojin Kang and Jongsung Kim}, title = {A method for decrypting data infected with Hive ransomware}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103387}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103387}, doi = {10.1016/J.JISA.2022.103387}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KimKKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KuldeepZ22, author = {Gajraj Kuldeep and Qi Zhang}, title = {Multi-class privacy-preserving cloud computing based on compressive sensing for IoT}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103139}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103139}, doi = {10.1016/J.JISA.2022.103139}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KuldeepZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarJ22, author = {Sanjeev Kumar and B. Janet}, title = {{DTMIC:} Deep transfer learning for malware image classification}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103063}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103063}, doi = {10.1016/J.JISA.2021.103063}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarY22, author = {Rajeev Kumar and Jainath Yadav}, title = {Vowel and non-vowel frame segmentation based digital speech watermarking technique using {LPA} method}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103218}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103218}, doi = {10.1016/J.JISA.2022.103218}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeCLCT22, author = {Jung{-}San Lee and Chit{-}Jie Chew and Jo{-}Yun Liu and Ying{-}Chin Chen and Kuo{-}Yu Tsai}, title = {Medical blockchain: Data sharing and privacy preserving of {EHR} based on smart contract}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103117}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103117}, doi = {10.1016/J.JISA.2022.103117}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeCLCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiCYGT22, author = {Xiao Li and Yuanhai Chang and Guixin Ye and Xiaoqing Gong and Zhanyong Tang}, title = {{GENDA:} {A} Graph Embedded Network Based Detection Approach on encryption algorithm of binary program}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103088}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103088}, doi = {10.1016/J.JISA.2021.103088}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiCYGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLD22, author = {Donghan Li and Jinqing Li and Xiaoqiang Di}, title = {A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103304}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103304}, doi = {10.1016/J.JISA.2022.103304}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLGL22, author = {Lang Li and Jinggen Liu and Ying Guo and Botao Liu}, title = {A new S-box construction method meeting strict avalanche criterion}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103135}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103135}, doi = {10.1016/J.JISA.2022.103135}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiSWLZ22, author = {Kunchang Li and Runhua Shi and Mingxia Wu and Yi{-}Fei Li and Xiaoxu Zhang}, title = {A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103214}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103214}, doi = {10.1016/J.JISA.2022.103214}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiSWLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiWP22, author = {Huixian Li and Chenhao Wu and Liaojun Pang}, title = {Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103384}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103384}, doi = {10.1016/J.JISA.2022.103384}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LimYCPHL22, author = {Yirang Lim and MinA Youn and Hyunji Chung and Jungheum Park and Graeme Horsman and Sangjin Lee}, title = {Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103102}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103102}, doi = {10.1016/J.JISA.2021.103102}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LimYCPHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LimbasiyaSD22, author = {Trupil Limbasiya and Sanjay K. Sahay and Debasis Das}, title = {{SAMPARK:} Secure and lightweight communication protocols for smart parking management}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103381}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103381}, doi = {10.1016/J.JISA.2022.103381}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LimbasiyaSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinPSLHLLLC22, author = {Ying{-}Dar Lin and Jehoshua{-}Hanky Pratama and Didik Sudyana and Yuan{-}Cheng Lai and Ren{-}Hung Hwang and Po{-}Ching Lin and Hsuan{-}Yu Lin and Wei{-}Bin Lee and Chen{-}Kuo Chiang}, title = {{ELAT:} Ensemble Learning with Adversarial Training in defending against evaded intrusions}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103348}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103348}, doi = {10.1016/J.JISA.2022.103348}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinPSLHLLLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinWLNHL22, author = {Ying{-}Dar Lin and Ze{-}Yu Wang and Po{-}Ching Lin and Van{-}Linh Nguyen and Ren{-}Hung Hwang and Yuan{-}Cheng Lai}, title = {Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103248}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103248}, doi = {10.1016/J.JISA.2022.103248}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinWLNHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuHGLJ22, author = {Jiaju Liu and Yun Hu and Xiaojun Guo and Tianxing Liang and Weikun Jin}, title = {Differential privacy performance evaluation under the condition of non-uniform noise distribution}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103366}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103366}, doi = {10.1016/J.JISA.2022.103366}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuHGLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuHXSN22, author = {Tian Liu and Xueyang Hu and Hairuo Xu and Tao Shu and Diep N. Nguyen}, title = {High-accuracy low-cost privacy-preserving federated learning in IoT systems via adaptive perturbation}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103309}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103309}, doi = {10.1016/J.JISA.2022.103309}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuHXSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuLLSCZHP22, author = {Jianyi Liu and Ying Liu and Jingwen Li and Wenxin Sun and Jie Cheng and Ru Zhang and Xingjie Huang and Jin Pang}, title = {Two statistical traffic features for certain {APT} group identification}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103207}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103207}, doi = {10.1016/J.JISA.2022.103207}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuLLSCZHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuTTWS22, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Peter Shaojui Wang and Qin{-}Wen Su}, title = {Extension of elliptic curve Qu-Vanstone certificates and their applications}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103176}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103176}, doi = {10.1016/J.JISA.2022.103176}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuTTWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuYHZ22, author = {Yuming Liu and Wang Yong and Feng Hao and Wang Zeyu}, title = {GwPFV: {A} novel packet forwarding verification mechanism based on gateways in SDN-based storage environment}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103354}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103354}, doi = {10.1016/J.JISA.2022.103354}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuYHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuZHZ22, author = {Sheng Liu and Yu{-}Jian Zhuang and Li Huang and Xiaoyi Zhou}, title = {Exploiting {LSB} Self-quantization for Plaintext-related Image Encryption in the Zero-trust Cloud}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103138}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103138}, doi = {10.1016/J.JISA.2022.103138}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuZHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuengoCGHC22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Darren Hurley{-}Smith and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Sensitivity and uniformity in statistical randomness tests}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103322}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103322}, doi = {10.1016/J.JISA.2022.103322}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LuengoCGHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaCKC22, author = {Yi{-}Wei Ma and Jiann{-}Liang Chen and Wen{-}Han Kuo and Yu{-}Chen Chen}, title = {[email protected]: An intelligent framework for defending against malware attacks}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103092}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103092}, doi = {10.1016/J.JISA.2021.103092}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaCKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaJGL22, author = {Sudong Ma and Chenhui Jin and Jie Guan and Shuai Liu}, title = {Improved differential attacks on the reduced-round {SNOW-V} and SNOW-Vi stream cipher}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103379}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103379}, doi = {10.1016/J.JISA.2022.103379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaJGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaoWGXCZB22, author = {Jianghan Mao and Chenyu Wang and Yanhui Guo and Guoai Xu and Shoufeng Cao and Xuanwen Zhang and Zixiang Bi}, title = {A novel model for voice command fingerprinting using deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103085}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103085}, doi = {10.1016/J.JISA.2021.103085}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaoWGXCZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Martinez-DiazLR22, author = {Ismel Mart{\'{\i}}nez{-}D{\'{\i}}az and Carlos Miguel Leg{\'{o}}n{-}P{\'{e}}rez and Omar Rojas and Guillermo Sosa G{\'{o}}mez and Diego Oliva}, title = {Local Search Trajectories over S-box space}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103272}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103272}, doi = {10.1016/J.JISA.2022.103272}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Martinez-DiazLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MelandNBS22, author = {Per H{\aa}kon Meland and Dag Atle Nesheim and Karin Bernsmed and Guttorm Sindre}, title = {Assessing cyber threats for storyless systems}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103050}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103050}, doi = {10.1016/J.JISA.2021.103050}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MelandNBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MenasriaLD22, author = {Soumia Menasria and Mingming Lu and Abdelghani Dahou}, title = {{PGAN} framework for synthesizing sensor data privately}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103204}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103204}, doi = {10.1016/J.JISA.2022.103204}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MenasriaLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohammadiRS22, author = {Mahin Mohammadi and Reza Rawassizadeh and Abbas Sheikhtaheri}, title = {A consumer-centered security framework for sharing health data in social networks}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103303}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103303}, doi = {10.1016/J.JISA.2022.103303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MohammadiRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MurtazaTTARH22, author = {Malik Hamza Murtaza and Hasan Tahir and Shahzaib Tahir and Zahoor Ahmed Alizai and Qaiser Riaz and Mehdi Hussain}, title = {A portable hardware security module and cryptographic key generator}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103332}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103332}, doi = {10.1016/J.JISA.2022.103332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MurtazaTTARH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NafiMBO22, author = {Mohammed Nafi and Mohamed{-}Lamine Messai and Samia Bouzefrane and Mawloud Omar}, title = {{IFKMS:} Inverse Function-based Key Management Scheme for IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103370}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103370}, doi = {10.1016/J.JISA.2022.103370}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NafiMBO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NagunwaKF22, author = {Thomas Nagunwa and Paul Kearney and Shereen Fouad}, title = {A machine learning approach for detecting fast flux phishing hostnames}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103125}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103125}, doi = {10.1016/J.JISA.2022.103125}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NagunwaKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraC22, author = {Hassan N. Noura and Ali Chehab}, title = {Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103264}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103264}, doi = {10.1016/J.JISA.2022.103264}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NouraC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraMC22, author = {Hassan N. Noura and Reem Melki and Ali Chehab}, title = {Network coding and {MPTCP:} Enhancing security and performance in an {SDN} environment}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103165}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103165}, doi = {10.1016/J.JISA.2022.103165}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NouraMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NunesBRL22, author = {Matthew Nunes and Pete Burnap and Philipp Reinecke and Kaelon Lloyd}, title = {Bane or Boon: Measuring the effect of evasive malware on system call classifiers}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103202}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103202}, doi = {10.1016/J.JISA.2022.103202}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NunesBRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Padayachee22, author = {Keshnee Padayachee}, title = {Understanding the effects of situational crime prevention and personality factors on insider compliance}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103338}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103338}, doi = {10.1016/J.JISA.2022.103338}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Padayachee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PaulaMGPGF22, author = {Alexandro de O. Paula and Rodolfo Ipolito Meneguette and Felipe T. Giuntini and Maycon L. M. Peixoto and Vin{\'{\i}}cius P. Gon{\c{c}}alves and Geraldo P. Rocha Filho}, title = {{STRAYER:} {A} Smart Grid adapted automation architecture against cyberattacks}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103195}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103195}, doi = {10.1016/J.JISA.2022.103195}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PaulaMGPGF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengCCLZSZTZZLX22, author = {Junfeng Peng and Ziwei Cai and Zhenyu Chen and Xujiang Liu and Mianyu Zheng and Chufeng Song and Xiongyong Zhu and Yi Teng and Ruilin Zhang and Yanqin Zhou and Xuyang Lv and Jun Xu}, title = {An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103364}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103364}, doi = {10.1016/J.JISA.2022.103364}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PengCCLZSZTZZLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PeretzDK22, author = {Yossi Peretz and Maya Dotan and Aytan Kamienny}, title = {An algorithm for simultaneous nonsymmetric algebraic Riccati equations over finite fields}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103178}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103178}, doi = {10.1016/J.JISA.2022.103178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PeretzDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PraseedT22, author = {Amit Praseed and P. Santhi Thilagam}, title = {{HTTP} request pattern based signatures for early application layer DDoS detection: {A} firewall agnostic approach}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103090}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103090}, doi = {10.1016/J.JISA.2021.103090}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PraseedT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QinZZLHY22, author = {Chuan Qin and Wei Ming Zhang and Hang Zhou and Jiayang Liu and Yuan He and Nenghai Yu}, title = {Robustness enhancement against adversarial steganography via steganalyzer outputs}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103252}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103252}, doi = {10.1016/J.JISA.2022.103252}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/QinZZLHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiuTTMC22, author = {Yiqin Qiu and Hui Tian and Lili Tang and Wojciech Mazurczyk and Chin{-}Chen Chang}, title = {Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103250}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103250}, doi = {10.1016/J.JISA.2022.103250}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiuTTMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QuinteroPVLC22, author = {Antonia M. Reina Quintero and Salvador Mart{\'{\i}}nez Perez and {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca and Mar{\'{\i}}a Teresa G{\'{o}}mez{-}L{\'{o}}pez and Jordi Cabot}, title = {A domain-specific language for the specification of {UCON} policies}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103006}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103006}, doi = {10.1016/J.JISA.2021.103006}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/QuinteroPVLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahmanMB22, author = {Md. Mijanur Rahman and Tanjarul Islam Mishu and Md. Al{-}Amin Bhuiyan}, title = {Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103209}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103209}, doi = {10.1016/J.JISA.2022.103209}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RahmanMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RamanM22, author = {M. R. Gauthama Raman and Aditya P. Mathur}, title = {AICrit: {A} unified framework for real-time anomaly detection in water treatment plants}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103046}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103046}, doi = {10.1016/J.JISA.2021.103046}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RamanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RezaeiAFA22, author = {Aref Rezaei and Yasaman Ahmadiadli and Leili Farzinvash and Mohammad Asadpour}, title = {Low distortion and adaptive image steganography by enhancing DBSCAN, Sobel operator, and {XOR} coding}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103343}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103343}, doi = {10.1016/J.JISA.2022.103343}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RezaeiAFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RiahiNMCC22, author = {Arbia Riahi and Enrico Natalizio and Sahbi Mazlout and Yacine Challal and Zied Chtourou}, title = {Privacy preservation using game theory in e-health application}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103158}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103158}, doi = {10.1016/J.JISA.2022.103158}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RiahiNMCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SafkhaniRBSB22, author = {Masoumeh Safkhani and Samad Rostampour and Ygal Bendavid and Sadegh Sadeghi and Nasour Bagheri}, title = {Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103194}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103194}, doi = {10.1016/J.JISA.2022.103194}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SafkhaniRBSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaglamNH22, author = {Rahime Belen Saglam and Jason R. C. Nurse and Duncan Hodges}, title = {Personal information: Perceptions, types and evolution}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103163}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103163}, doi = {10.1016/J.JISA.2022.103163}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SaglamNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaraswatPBVTS22, author = {Deepti Saraswat and Farnazbanu Patel and Pronaya Bhattacharya and Ashwin Verma and Sudeep Tanwar and Ravi Sharma}, title = {\emph{UpHaaR}: Blockchain-based charity donation scheme to handle financial irregularities}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103245}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103245}, doi = {10.1016/J.JISA.2022.103245}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SaraswatPBVTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SardarU22, author = {Alamgir Sardar and Saiyed Umer}, title = {Implementation of face recognition system using BioCryptosystem as template protection scheme}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103317}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103317}, doi = {10.1016/J.JISA.2022.103317}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SardarU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SendhilA22, author = {R. Sendhil and A. Amuthan}, title = {Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103383}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103383}, doi = {10.1016/J.JISA.2022.103383}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SendhilA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SeyhanA22, author = {K{\"{u}}bra Seyhan and Sedat Akleylek}, title = {Classification of random number generator applications in IoT: {A} comprehensive taxonomy}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103365}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103365}, doi = {10.1016/J.JISA.2022.103365}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SeyhanA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SezerTN22, author = {Bora Bugra Sezer and Sel{\c{c}}uk Topal and Urfat Nuriyev}, title = {{TPPSUPPLY} : {A} traceable and privacy-preserving blockchain system architecture for the supply chain}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103116}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103116}, doi = {10.1016/J.JISA.2022.103116}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SezerTN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShafaiMAEE22, author = {Walid El Shafai and Ahmed K. Mesrega and Hossam Eldin H. Ahmed and Nirmeen A. El{-}Bahnasawy and Fathi E. Abd El{-}Samie}, title = {An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103039}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103039}, doi = {10.1016/J.JISA.2021.103039}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShafaiMAEE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShahSNJH22, author = {Dawood Shah and Tariq Shah and Yasir Naseer and Sajjad Shaukat Jamal and Sadam Hussain}, title = {Cryptographically strong {S-P} boxes and their application in steganography}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103174}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103174}, doi = {10.1016/J.JISA.2022.103174}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShahSNJH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShahidAAAK22, author = {Waleed Bin Shahid and Baber Aslam and Haider Abbas and Hammad Afzal and Saad Bin Khalid}, title = {A deep learning assisted personalized deception system for countering web application attacks}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103169}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103169}, doi = {10.1016/J.JISA.2022.103169}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShahidAAAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharifCSR22, author = {Amir Sharif and Roberto Carbone and Giada Sciarretta and Silvio Ranise}, title = {Best current practices for OAuth/OIDC Native Apps: {A} study of their adoption in popular providers and top-ranked Android clients}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103097}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103097}, doi = {10.1016/J.JISA.2021.103097}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharifCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaRB22, author = {Madhu Sharma and Ranjeet Kumar Ranjan and Vishal Bharti}, title = {A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103299}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103299}, doi = {10.1016/J.JISA.2022.103299}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SharmaRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShawD22, author = {Surbhi Shaw and Ratna Dutta}, title = {Post-quantum secure identity-based signature achieving forward secrecy}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103275}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103275}, doi = {10.1016/J.JISA.2022.103275}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShawD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShenSWZY22, author = {Yizhou Shen and Shigen Shen and Zongda Wu and Haiping Zhou and Shui Yu}, title = {Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103140}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103140}, doi = {10.1016/J.JISA.2022.103140}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShenSWZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShiYMZ22, author = {Ming Shi and Yang Yang and Jian Meng and Weiming Zhang}, title = {Reversible data hiding with enhancing contrast and preserving brightness in medical image}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103324}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103324}, doi = {10.1016/J.JISA.2022.103324}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShiYMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghC22, author = {Jaimandeep Singh and Naveen Kumar Chaudhary}, title = {OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103091}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103091}, doi = {10.1016/J.JISA.2021.103091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SisaudiaV22, author = {Varsha Sisaudia and Virendra P. Vishwakarma}, title = {A secure gray-scale image watermarking technique in fractional {DCT} domain using zig-zag scrambling}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103296}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103296}, doi = {10.1016/J.JISA.2022.103296}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SisaudiaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SonLMAD22, author = {Tran The Son and Chando Lee and Hoa Le Minh and Nauman Aslam and Vuong Cong Dat}, title = {An enhancement for image-based malware classification using machine learning with low dimension normalized input images}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103308}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103308}, doi = {10.1016/J.JISA.2022.103308}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SonLMAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SongM22, author = {Fagen Song and Tinghuai Ma}, title = {A location privacy protection method in spatial crowdsourcing}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103095}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103095}, doi = {10.1016/J.JISA.2021.103095}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SongM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Soria-LorenteBN22, author = {Anier Soria{-}Lorente and Stefan Berres and Yenner J. D{\'{\i}}az N{\'{u}}{\~{n}}ez and Ernesto Avila{-}Domenech}, title = {Hiding data inside images using orthogonal moments}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103192}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103192}, doi = {10.1016/J.JISA.2022.103192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Soria-LorenteBN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SuomalainenJHRY22, author = {Jani Suomalainen and Jukka Julku and Antti Heikkinen and Seppo J. Rantala and Anastasia Yastrebova}, title = {Security-driven prioritization for tactical mobile networks}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103198}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103198}, doi = {10.1016/J.JISA.2022.103198}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SuomalainenJHRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TanveerAKAE22, author = {Muhammad Tanveer and Musheer Ahmad and Hany S. Khalifa and Ahmed Alkhayyat and Ahmed A. Abd El{-}Latif}, title = {A new anonymous authentication framework for secure smart grids applications}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103336}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103336}, doi = {10.1016/J.JISA.2022.103336}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TanveerAKAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TehB22, author = {Je Sen Teh and Alex Biryukov}, title = {Differential cryptanalysis of {WARP}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103316}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103316}, doi = {10.1016/J.JISA.2022.103316}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TehB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TehTJY22, author = {Je Sen Teh and Li Jing Tham and Norziana Jamil and Wun{-}She Yap}, title = {New differential cryptanalysis results for the lightweight block cipher {BORON}}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103129}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103129}, doi = {10.1016/J.JISA.2022.103129}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TehTJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TianC22, author = {Chuanjun Tian and Guanrong Chen}, title = {An infinite perfect-secrecy system with non-uniformly distributed keys}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103256}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103256}, doi = {10.1016/J.JISA.2022.103256}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TianC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TkachenkoTF22, author = {Iuliia Tkachenko and Alain Tr{\'{e}}meau and Thierry Fournel}, title = {Authentication of rotogravure print-outs using a regular test pattern}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103133}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103133}, doi = {10.1016/J.JISA.2022.103133}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TkachenkoTF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TsengFL22, author = {Yi{-}Fan Tseng and Chun{-}I Fan and Zi{-}Cheng Liu}, title = {Fast keyword search over encrypted data with short ciphertext in clouds}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103320}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103320}, doi = {10.1016/J.JISA.2022.103320}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TsengFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/UllahJHDUF22, author = {Shamsher Ullah and Jiangbin Zheng and Muhammad Tanveer Hussain and Nizamud Din and Farhan Ullah and Muhammad Umar Farooq}, title = {A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103346}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103346}, doi = {10.1016/J.JISA.2022.103346}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/UllahJHDUF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/UlusoyKE22, author = {Sirri Erdem Ulusoy and Orhun Kara and Mehmet {\"{O}}nder Efe}, title = {Plaintext recovery and tag guessing attacks on authenticated encryption algorithm {COLM}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103342}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103342}, doi = {10.1016/J.JISA.2022.103342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/UlusoyKE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ValandarABI22, author = {Milad Yousefi Valandar and Peyman Ayubi and Milad Jafari Barani and Behzad Yosefnezhad Irani}, title = {A chaotic video steganography technique for carrying different types of secret messages}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103160}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103160}, doi = {10.1016/J.JISA.2022.103160}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ValandarABI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VallabhadasS22, author = {Dilip Kumar Vallabhadas and Mulagala Sandhya}, title = {Securing multimodal biometric template using local random projection and homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103339}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103339}, doi = {10.1016/J.JISA.2022.103339}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VallabhadasS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VeroniNX22, author = {Eleni Veroni and Christoforos Ntantogian and Christos Xenakis}, title = {A large-scale analysis of Wi-Fi passwords}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103190}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103190}, doi = {10.1016/J.JISA.2022.103190}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VeroniNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VouvoutsisCP22, author = {Vasilis Vouvoutsis and Fran Casino and Constantinos Patsakis}, title = {On the effectiveness of binary emulation in malware classification}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103258}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103258}, doi = {10.1016/J.JISA.2022.103258}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VouvoutsisCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VuVL22, author = {Duy{-}Hien Vu and Trong{-}Sinh Vu and The{-}Dung Luong}, title = {An efficient and practical approach for privacy-preserving Naive Bayes classification}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103215}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103215}, doi = {10.1016/J.JISA.2022.103215}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VuVL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangGF22, author = {Yifeng Wang and Yuanbo Guo and Chen Fang}, title = {An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103373}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103373}, doi = {10.1016/J.JISA.2022.103373}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangGF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangJXKH22, author = {Yifan Wang and Xiaoying Jia and Yongbo Xia and Muhammad Khurram Khan and Debiao He}, title = {A blockchain-based conditional privacy-preserving authentication scheme for edge computing services}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103334}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103334}, doi = {10.1016/J.JISA.2022.103334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangJXKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCH22, author = {Xu Wang and Liyao Li and Ching{-}Chun Chang and Yongfeng Huang}, title = {Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103067}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103067}, doi = {10.1016/J.JISA.2021.103067}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangLCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCWD22, author = {Shangping Wang and Huan Li and Juanjuan Chen and Jifang Wang and Yingjuan Deng}, title = {{DAG} blockchain-based lightweight authentication and authorization scheme for IoT devices}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103134}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103134}, doi = {10.1016/J.JISA.2022.103134}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangLCWD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCWR22, author = {Yixiang Wang and Jiqiang Liu and Xiaolin Chang and Jianhua Wang and Ricardo J. Rodr{\'{\i}}guez}, title = {{AB-FGSM:} AdaBelief optimizer and FGSM-based approach to generate adversarial examples}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103227}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103227}, doi = {10.1016/J.JISA.2022.103227}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLCWR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangPNY22, author = {Xiangyang Wang and Fanchen Peng and Panpan Niu and Hongying Yang}, title = {Statistical image watermark decoder using {NSM-HMT} in {NSCT-FGPCET} magnitude domain}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103312}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103312}, doi = {10.1016/J.JISA.2022.103312}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangPNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangQ22, author = {Qianhui Wang and Quan Qian}, title = {Malicious code classification based on opcode sequences and textCNN network}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103151}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103151}, doi = {10.1016/J.JISA.2022.103151}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangSTNY22, author = {Xiangyang Wang and Xin Shen and Jia{-}lin Tian and Pan{-}pan Niu and Hongying Yang}, title = {Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudes}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103105}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103105}, doi = {10.1016/J.JISA.2021.103105}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangSTNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangWWWHS22, author = {Bo Wang and Shiqi Wu and Fei Wei and Yue Wang and Jiayao Hou and Xue Sui}, title = {Virtual sample generation for few-shot source camera identification}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103153}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103153}, doi = {10.1016/J.JISA.2022.103153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangWWWHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZH22, author = {Huanran Wang and Weizhe Zhang and Hui He}, title = {You are what the permissions told me! Android malware detection based on hybrid tactics}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103159}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103159}, doi = {10.1016/J.JISA.2022.103159}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZZ22, author = {Quanyv Wang and Xiaoqiang Zhang and Xiaohu Zhao}, title = {Image encryption algorithm based on improved Zigzag transformation and quaternary {DNA} coding}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103340}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103340}, doi = {10.1016/J.JISA.2022.103340}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZXWF22, author = {Qiyu Wu and Fucai Zhou and Jian Xu and Qiang Wang and Da Feng}, title = {Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103270}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103270}, doi = {10.1016/J.JISA.2022.103270}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZXWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZZX22, author = {Hao{-}Tian Wu and Tao Zhou and Zhenwei Zhuang and Chuhua Xian}, title = {Reversible transformation of tetrahedral mesh models for data protection and information hiding}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103161}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103161}, doi = {10.1016/J.JISA.2022.103161}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiaoW22, author = {Haiyan Xiao and Lifang Wang}, title = {The differential fault analysis on block cipher {KLEIN-96}}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103205}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103205}, doi = {10.1016/J.JISA.2022.103205}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiaoW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongBILMM22, author = {Pulei Xiong and Scott Buffett and Shahrear Iqbal and Philippe Lamontagne and Mohammad Saiful Islam Mamun and Heather Molyneaux}, title = {Towards a robust and trustworthy machine learning system development: An engineering perspective}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103121}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103121}, doi = {10.1016/J.JISA.2022.103121}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiongBILMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongCFZ22, author = {Xiangguang Xiong and Yi Chen and Mengting Fan and Siyao Zhong}, title = {Adaptive reversible data hiding algorithm for interpolated images using sorting and coding}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103137}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103137}, doi = {10.1016/J.JISA.2022.103137}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiongCFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuTYWKFW22, author = {Rongze Xu and Zhanyong Tang and Guixin Ye and Huanting Wang and Xin Ke and Dingyi Fang and Zheng Wang}, title = {Detecting code vulnerabilities by learning from large-scale open source repositories}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103293}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103293}, doi = {10.1016/J.JISA.2022.103293}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuTYWKFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuXLZHZ22, author = {Runqing Xu and Zejun Xiang and Da Lin and Shasha Zhang and Debiao He and Xiangyong Zeng}, title = {High-throughput block cipher implementations with {SIMD}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103333}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103333}, doi = {10.1016/J.JISA.2022.103333}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuXLZHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YanFTYD22, author = {Xixi Yan and Suwei Feng and Yongli Tang and Pei Yin and Dazhi Deng}, title = {Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103353}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103353}, doi = {10.1016/J.JISA.2022.103353}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YanFTYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangHA22, author = {Gi{-}Chul Yang and Qinwen Hu and Muhammad Rizwan Asghar}, title = {{TIM:} Secure and usable authentication for smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {71}, pages = {103374}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103374}, doi = {10.1016/J.JISA.2022.103374}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLWZD22, author = {Luhui Yang and Guangjie Liu and Jinwei Wang and Jiangtao Zhai and Yuewei Dai}, title = {A semantic element representation model for malicious domain name detection}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103148}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103148}, doi = {10.1016/J.JISA.2022.103148}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLWZD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangSLQ22, author = {Yang Yang and Jianguo Sun and Zechao Liu and Yuqing Qiao}, title = {Practical revocable and multi-authority {CP-ABE} scheme from {RLWE} for Cloud Computing}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103108}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103108}, doi = {10.1016/J.JISA.2022.103108}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangSLQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWXTW22, author = {Xiaodong Yang and Jiaqi Wang and Wanting Xi and Tian Tian and Caifen Wang}, title = {A blockchain-based keyword search scheme with dual authorization for electronic health record sharing}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103154}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103154}, doi = {10.1016/J.JISA.2022.103154}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWXTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWY22, author = {Cheng{-}Hsing Yang and Chi{-}Yao Weng and Yu{-}Zhen Yang}, title = {{TPEIP:} Thumbnail preserving encryption based on sum preserving for image privacy}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103352}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103352}, doi = {10.1016/J.JISA.2022.103352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangZZZLX22, author = {Liqun Yang and You Zhai and Yipeng Zhang and Yufei Zhao and Zhoujun Li and Tongge Xu}, title = {A new methodology for anomaly detection of attacks in {IEC} 61850-based substation system}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103262}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103262}, doi = {10.1016/J.JISA.2022.103262}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangZZZLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YeohTC22, author = {Wei{-}Zhu Yeoh and Je Sen Teh and Jiageng Chen}, title = {Automated enumeration of block cipher differentials: An optimized branch-and-bound {GPU} framework}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103087}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103087}, doi = {10.1016/J.JISA.2021.103087}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YeohTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YiTY22, author = {Yufeng Yi and Wuzheng Tan and Yaxi Yang}, title = {Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search of large-scale databases}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103335}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103335}, doi = {10.1016/J.JISA.2022.103335}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YiTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuW22, author = {Huifang Yu and Han Wang}, title = {Elliptic curve threshold signature scheme for blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103345}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103345}, doi = {10.1016/J.JISA.2022.103345}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YuW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuZL22, author = {Huifang Yu and Shuai Zhang and Yue Liu}, title = {Certificateless multivariate ring signcryption scheme}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103220}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103220}, doi = {10.1016/J.JISA.2022.103220}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanCTMJL22, author = {Chong Yuan and Jingxuan Cai and Donghai Tian and Rui Ma and Xiaoqi Jia and Wenmao Liu}, title = {Towards time evolved malware identification using two-head neural network}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103098}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103098}, doi = {10.1016/J.JISA.2021.103098}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanCTMJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanMRXH22, author = {Manli Yuan and Yi Mu and Fatemeh Rezaeibagha and Li Xu and Xinyi Huang}, title = {Controllable software licensing system for sub-licensing}, journal = {J. Inf. Secur. Appl.}, volume = {64}, pages = {103061}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103061}, doi = {10.1016/J.JISA.2021.103061}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanMRXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YueZWYBH22, author = {Xiaohan Yue and Shuaishuai Zeng and Xibo Wang and Lixin Yang and Shi Bai and Yuan He}, title = {A practical privacy-preserving communication scheme for CAMs in {C-ITS}}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103103}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103103}, doi = {10.1016/J.JISA.2021.103103}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YueZWYBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZaidiCPS22, author = {Ahmad Zairi bin Zaidi and Chun Yong Chong and Rajendran Parthiban and Ali Safaa Sadiq}, title = {A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103217}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103217}, doi = {10.1016/J.JISA.2022.103217}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZaidiCPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZengPZZC22, author = {ZengRi Zeng and Wei Peng and Detian Zeng and Chong Zeng and Yifan Chen}, title = {Intrusion detection framework based on causal reasoning for DDoS}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103124}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103124}, doi = {10.1016/J.JISA.2022.103124}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZengPZZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaiSM22, author = {Zhonghao Zhai and Subin Shen and Yan{-}qin Mao}, title = {{BPKI:} {A} secure and scalable blockchain-based public key infrastructure system for web services}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103226}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103226}, doi = {10.1016/J.JISA.2022.103226}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhaiSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLLS22, author = {Yi Zhang and Guoqiang Liu and Chao Li and Xuan Shen}, title = {Impossible differential cryptanalysis of {FBC-128}}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103279}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103279}, doi = {10.1016/J.JISA.2022.103279}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangLX22, author = {Wenzheng Zhang and Shiyun Liu and Zhe Xia}, title = {A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103118}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103118}, doi = {10.1016/J.JISA.2022.103118}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangWBL22, author = {Jinbao Zhang and Jiehua Wang and Ge Bin and Jianhua Li}, title = {An efficient differential fault attack against {SIMON} key schedule}, journal = {J. Inf. Secur. Appl.}, volume = {66}, pages = {103155}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103155}, doi = {10.1016/J.JISA.2022.103155}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangWBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangWZZ22, author = {Meiling Zhang and Liusheng Wang and Bingyu Zhao and Dong Zheng}, title = {Bit-policy based chosen-plaintext collision attack on reused-mask {AES}}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103222}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103222}, doi = {10.1016/J.JISA.2022.103222}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangWZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaoWZW22, author = {Xiaojie Zhao and Shangping Wang and Yaling Zhang and Yu Wang}, title = {Attribute-based access control scheme for data sharing on hyperledger fabric}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103182}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103182}, doi = {10.1016/J.JISA.2022.103182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhaoWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhuTWZ22, author = {Ding Zhu and Xiaojun Tong and Zhu Wang and Miao Zhang}, title = {A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic System}, journal = {J. Inf. Secur. Appl.}, volume = {69}, pages = {103289}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103289}, doi = {10.1016/J.JISA.2022.103289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhuTWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZouCTW22, author = {Binghui Zou and Chunjie Cao and Fangjian Tao and Longjuan Wang}, title = {IMCLNet: {A} lightweight deep neural network for Image-based Malware Classification}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103313}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103313}, doi = {10.1016/J.JISA.2022.103313}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZouCTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0001FLY21, author = {Zhijun Wu and Wenzhi Feng and Jin Lei and Meng Yue}, title = {{I-CIFA:} An improved collusive interest flooding attack in named data networking}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102912}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102912}, doi = {10.1016/J.JISA.2021.102912}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/0001FLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0002SRSAAA21, author = {Khalid Mahmood and Salman Shamshad and Minahil Rana and Akasha Shafiq and Shafiq Ahmad and Muhammad Arslan Akram and Ruhul Amin}, title = {{PUF} enable lightweight key-exchange and mutual authentication protocol for multi-server based {D2D} communication}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102900}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102900}, doi = {10.1016/J.JISA.2021.102900}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/0002SRSAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0003L0ZZGL21, author = {Hongmin Li and Tie Li and Wei Feng and Jing Zhang and Jun Zhang and Lixia Gan and Chunlai Li}, title = {A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusion}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102844}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102844}, doi = {10.1016/J.JISA.2021.102844}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/0003L0ZZGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0009WFLWL021, author = {Haifeng Li and Yuxin Wang and Xingbing Fu and Caihui Lan and Caifen Wang and Fagen Li and He Guo}, title = {{PSCPAC:} Post-quantum secure certificateless public auditing scheme in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102927}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102927}, doi = {10.1016/J.JISA.2021.102927}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/0009WFLWL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0034G21, author = {Zheng Wang and Yang Guo}, title = {Neural networks based domain name generation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102948}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102948}, doi = {10.1016/J.JISA.2021.102948}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/0034G21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/0294WZXFSH21, author = {Wei Wang and Lianhai Wang and Peijun Zhang and Shujiang Xu and Kunlun Fu and Lianxin Song and Shanshan Hu}, title = {A privacy protection scheme for telemedicine diagnosis based on double blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102845}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102845}, doi = {10.1016/J.JISA.2021.102845}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/0294WZXFSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AbusittaLF21, author = {Adel Abusitta and Miles Q. Li and Benjamin C. M. Fung}, title = {Malware classification and composition analysis: {A} survey of recent developments}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102828}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102828}, doi = {10.1016/J.JISA.2021.102828}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AbusittaLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AcharyaD21, author = {Kamalesh Acharya and Ratna Dutta}, title = {Constructing provable secure broadcast encryption scheme with dealership}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102736}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102736}, doi = {10.1016/J.JISA.2020.102736}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AcharyaD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AgarwalH21, author = {Himanshu Agarwal and Farooq Husain}, title = {Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and {SURF}}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102846}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102846}, doi = {10.1016/J.JISA.2021.102846}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AgarwalH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AgarwalPRM21, author = {Abhishek Agarwal and Ayush Prasad and Rishabh Rustogi and Sweta Mishra}, title = {Detection and mitigation of fraudulent resource consumption attacks in cloud using deep learning approach}, journal = {J. Inf. Secur. Appl.}, volume = {56}, pages = {102672}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102672}, doi = {10.1016/J.JISA.2020.102672}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AgarwalPRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadKAKC21, author = {Khaleel Ahmad and Afsar Kamal and Khairol Amali Bin Ahmad and Manju Khari and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {Fast hybrid-MixNet for security and privacy using {NTRU} algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102872}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102872}, doi = {10.1016/J.JISA.2021.102872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadKAKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadKAKC21a, author = {Khaleel Ahmad and Afsar Kamal and Khairol Amali Bin Ahmad and Manju Khari and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {Corrigendum to Fast hybrid-MixNet for security and privacy using {NTRU} algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page-End page/102872]}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102917}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102917}, doi = {10.1016/J.JISA.2021.102917}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadKAKC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlayaS21, author = {Bechir Alaya and Lamaa Sellami}, title = {Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban {VANET} networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102779}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102779}, doi = {10.1016/J.JISA.2021.102779}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlayaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AminPS21, author = {Ruhul Amin and Isha Pali and Venkatasamy Sureshkumar}, title = {Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102729}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102729}, doi = {10.1016/J.JISA.2020.102729}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AminPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AmmarTYM21, author = {Ikhlass Ammar and Yamen El Touati and Moez Yeddes and John Mullins}, title = {Bounded opacity for timed systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102926}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102926}, doi = {10.1016/J.JISA.2021.102926}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AmmarTYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnC21, author = {Haoyang An and Jiageng Chen}, title = {ElearnChain: {A} privacy-preserving consortium blockchain system for e-learning educational records}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103013}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103013}, doi = {10.1016/J.JISA.2021.103013}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnthiWRBW21, author = {Eirini Anthi and Lowri Williams and Matilda Rhode and Pete Burnap and Adam Wedgbury}, title = {Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102717}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102717}, doi = {10.1016/J.JISA.2020.102717}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Antwi-BoasiakoZ21, author = {Emmanuel Antwi{-}Boasiako and Shijie Zhou and Yongjian Liao and Qihe Liu and Yuyu Wang and Kwabena Owusu{-}Agyemang}, title = {Privacy preservation in Distributed Deep Learning: {A} survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102949}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102949}, doi = {10.1016/J.JISA.2021.102949}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Antwi-BoasiakoZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AparnaBSVSRPE21, author = {H. Aparna and B. Bhumijaa and R. Santhiyadevi and K. Vaishanavi and M. Sathanarayanan and Amirtharajan Rengarajan and Padmapriya Praveenkumar and Ahmed A. Abd El{-}Latif}, title = {Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102972}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102972}, doi = {10.1016/J.JISA.2021.102972}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AparnaBSVSRPE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AraujoAA0HK21, author = {Frederico Araujo and Gbadebo Ayoade and Khaled Al{-}Naami and Yang Gao and Kevin W. Hamlen and Latifur Khan}, title = {Crook-sourced intrusion detection as a service}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102880}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102880}, doi = {10.1016/J.JISA.2021.102880}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AraujoAA0HK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ArifRMAIF21, author = {Juliza Mohamad Arif and Mohd Faizal Ab Razak and Sharfah Ratibah Tuan Mat and Suryanti Awang and Nor Syahidatul Nadiah Binti Ismail and Ahmad Firdaus}, title = {Android mobile malware detection using fuzzy {AHP}}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102929}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102929}, doi = {10.1016/J.JISA.2021.102929}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ArifRMAIF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ArunpandianD21, author = {S. Arunpandian and S. S. Dhenakaran}, title = {A novel key and image concealing with static-dynamic pattern using modified periodic table}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103019}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103019}, doi = {10.1016/J.JISA.2021.103019}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ArunpandianD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BarretoFS21, author = {Luciano Barreto and Joni da Silva Fraga and Frank Siqueira}, title = {An intrusion tolerant identity provider with user attributes confidentiality}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103045}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103045}, doi = {10.1016/J.JISA.2021.103045}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BarretoFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BerguigLH21, author = {Yousra Berguig and Jalal Laassiri and Sanae Hanaoui}, title = {Anonymous and lightweight secure authentication protocol for mobile Agent system}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103007}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103007}, doi = {10.1016/J.JISA.2021.103007}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BerguigLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhavinTSTK21, author = {Makwana Bhavin and Sudeep Tanwar and Navneet Sharma and Sudhanshu Tyagi and Neeraj Kumar}, title = {Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications}, journal = {J. Inf. Secur. Appl.}, volume = {56}, pages = {102673}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102673}, doi = {10.1016/J.JISA.2020.102673}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BhavinTSTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BisogniILN21, author = {Carmen Bisogni and Gerardo Iovane and Riccardo Emanuele Landi and Michele Nappi}, title = {{ECB2:} {A} novel encryption scheme using face biometrics for signing blockchain transactions}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102814}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102814}, doi = {10.1016/J.JISA.2021.102814}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BisogniILN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BouchaalaGS21, author = {Mariem Bouchaala and Cherif Ghazel and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, title = {{TRAK-CPABE:} {A} novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102914}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102914}, doi = {10.1016/J.JISA.2021.102914}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BouchaalaGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BoutetC21, author = {Antoine Boutet and Mathieu Cunche}, title = {Privacy protection for Wi-Fi location positioning systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102635}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102635}, doi = {10.1016/J.JISA.2020.102635}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BoutetC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BraekenCT21, author = {An Braeken and Ji{-}Jian Chin and Syh{-}Yuan Tan}, title = {{ECQV-IBI:} Identity-based identification with implicit certification}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103027}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103027}, doi = {10.1016/J.JISA.2021.103027}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BraekenCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BrignoliCCDLMRR21, author = {Mauro Alberto Brignoli and Alessio P. Caforio and Francesco Caturano and Maurizio D'Arienzo and Marco Latini and Walter Matta and Simon Pietro Romano and B. Ruggiero}, title = {A distributed security tomography framework to assess the exposure of {ICT} infrastructures to network threats}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102833}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102833}, doi = {10.1016/J.JISA.2021.102833}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BrignoliCCDLMRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CalderoniPP21, author = {Luca Calderoni and Paolo Palmieri and Constantinos Patsakis}, title = {Introduction to the special issue on privacy and security for location-based services and devices}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102800}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102800}, doi = {10.1016/J.JISA.2021.102800}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CalderoniPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaSKP21, author = {Jeonghun Cha and Sushil Kumar Singh and Tae Woo Kim and Jong Hyuk Park}, title = {Blockchain-empowered cloud architecture based on secret sharing for smart city}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102686}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102686}, doi = {10.1016/J.JISA.2020.102686}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaSKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChanCG21, author = {Wai Kok Chan and Ji{-}Jian Chin and Vik Tor Goh}, title = {Simple and scalable blockchain with privacy}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102700}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102700}, doi = {10.1016/J.JISA.2020.102700}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChanCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaouchDDMBO21, author = {Asma Chaouch and Laurent{-}St{\'{e}}phane Didier and Fangan{-}Yssouf Dosso and Nadia El Mrabet and Belgacem Bouallegue and Bouraoui Ouni}, title = {Two hardware implementations for modular multiplication in the {AMNS:} Sequential and semi-parallel}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102770}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102770}, doi = {10.1016/J.JISA.2021.102770}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaouchDDMBO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChatterjeeGCGS21, author = {Agneet Chatterjee and Soulib Ghosh and Anuran Chakraborty and Sudipta Kumar Ghosal and Ram Sarkar}, title = {A two-phase gradient based feature embedding approach}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102898}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102898}, doi = {10.1016/J.JISA.2021.102898}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChatterjeeGCGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChatterjeeN21, author = {Moitrayee Chatterjee and Akbar Siami Namin}, title = {A fuzzy Dempster-Shafer classifier for detecting Web spams}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102793}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102793}, doi = {10.1016/J.JISA.2021.102793}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChatterjeeN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCM21, author = {Yu{-}Chen Chen and Jiann{-}Liang Chen and Yi{-}Wei Ma}, title = {[email protected] Intelligent technical support scam detection system}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102921}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102921}, doi = {10.1016/J.JISA.2021.102921}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenGHC21, author = {Jiahui Chen and Wensheng Gan and Muchuang Hu and Chien{-}Ming Chen}, title = {On the construction of a post-quantum blockchain for smart city}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102780}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102780}, doi = {10.1016/J.JISA.2021.102780}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenGHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenH21, author = {Xiaofeng Chen and Chaoqun Hong}, title = {An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102702}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102702}, doi = {10.1016/J.JISA.2020.102702}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenHWLC21, author = {Peng Chen and Dezhi Han and Tien{-}Hsiung Weng and Kuan{-}Ching Li and Arcangelo Castiglione}, title = {A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102821}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102821}, doi = {10.1016/J.JISA.2021.102821}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenHWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenMRMAABK21, author = {Mengji Chen and Taj Malook and Ateeq Ur Rehman and Yar Muhammad and Mohammad Dahman Alshehri and Aamir Akbar and Muhammad Bilal and Muazzam Ali Khan}, title = {Blockchain-Enabled healthcare system for detection of diabetes}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102771}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102771}, doi = {10.1016/J.JISA.2021.102771}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenMRMAABK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CherifiOA21, author = {Feriel Cherifi and Mawloud Omar and Kamal Amroun}, title = {An efficient biometric-based continuous authentication scheme with {HMM} prehensile movements modeling}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102739}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102739}, doi = {10.1016/J.JISA.2020.102739}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CherifiOA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChiW21, author = {Po{-}Wen Chi and Ming{-}Hung Wang}, title = {Deniable search of encrypted cloud-storage data}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102806}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102806}, doi = {10.1016/J.JISA.2021.102806}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChiuMJ21, author = {Wei{-}Yang Chiu and Weizhi Meng and Christian Damsgaard Jensen}, title = {My data, my control: {A} secure data sharing and access scheme over blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103020}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103020}, doi = {10.1016/J.JISA.2021.103020}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChiuMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DabraBK21, author = {Vivek Dabra and Anju Bala and Saru Kumari}, title = {Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102889}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102889}, doi = {10.1016/J.JISA.2021.102889}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DabraBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DasGK21, author = {Tanmoy Kanti Das and Subhojit Ghosh and Ebha Koley}, title = {Prevention and detection of {FDIA} on power-network protection scheme using multiple support set}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103054}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103054}, doi = {10.1016/J.JISA.2021.103054}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DasGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DebnathCKD21, author = {Sumit Kumar Debnath and Tanmay Choudhury and Nibedita Kundu and Kunal Dey}, title = {Post-quantum secure multi-party private set-intersection in star network topology}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102731}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102731}, doi = {10.1016/J.JISA.2020.102731}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DebnathCKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeebakA21, author = {Bakkiam David Deebak and Fadi M. Al{-}Turjman}, title = {Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102689}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102689}, doi = {10.1016/J.JISA.2020.102689}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeebakA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeebakA21a, author = {Bakkiam David Deebak and Fadi M. Al{-}Turjman}, title = {Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102749}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102749}, doi = {10.1016/J.JISA.2021.102749}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeebakA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DingGWJG21, author = {Lin Ding and Dawu Gu and Lei Wang and Chenhui Jin and Jie Guan}, title = {A real-time related key attack on the {WG-16} stream cipher for securing 4G-LTE networks}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103015}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103015}, doi = {10.1016/J.JISA.2021.103015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DingGWJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EddineFFM21, author = {Merzougui Salah Eddine and Mohamed Amine Ferrag and Othmane Friha and Leandros A. Maglaras}, title = {{EASBF:} An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102802}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102802}, doi = {10.1016/J.JISA.2021.102802}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/EddineFFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ErdodiSZ21, author = {L{\'{a}}szl{\'{o}} Erd{\"{o}}di and {\AA}vald {\AA}slaugson Sommervoll and Fabio Massimo Zennaro}, title = {Simulating {SQL} injection vulnerability exploitation using Q-learning reinforcement learning agents}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102903}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102903}, doi = {10.1016/J.JISA.2021.102903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ErdodiSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EttianeCE21, author = {Raja Ettiane and Abdelaali Chaoub and Rachid Elkouch}, title = {Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and promising solutions}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102943}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102943}, doi = {10.1016/J.JISA.2021.102943}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/EttianeCE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FanKY21, author = {Chun{-}I Fan and Arijit Karati and Pei{-}Shan Yang}, title = {Reliable file transfer protocol with producer anonymity for Named Data Networking}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102851}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102851}, doi = {10.1016/J.JISA.2021.102851}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FanKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarzadniaSN21, author = {Ehsan Farzadnia and Hossein Shirazi and Alireza Nowroozi}, title = {A novel sophisticated hybrid method for intrusion detection using the artificial immune system}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102721}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102721}, doi = {10.1016/J.JISA.2020.102721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FarzadniaSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FehisNK21, author = {Saad Fehis and Omar Nouali and M. Tahar Kechadi}, title = {Secure encryption key management as a SecaaS based on Chinese wall security policy}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102975}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102975}, doi = {10.1016/J.JISA.2021.102975}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FehisNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FerrettiLMCPT21, author = {Luca Ferretti and Francesco Longo and Giovanni Merlino and Michele Colajanni and Antonio Puliafito and Nachiket Tapas}, title = {Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102848}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102848}, doi = {10.1016/J.JISA.2021.102848}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FerrettiLMCPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Fischer-HubnerA21, author = {Simone Fischer{-}H{\"{u}}bner and Cristina Alcaraz and Afonso Ferreira and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez and Evangelos P. Markatos and Lejla Islami and Mahdi Akil}, title = {Stakeholder perspectives and requirements on cybersecurity in Europe}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102916}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102916}, doi = {10.1016/J.JISA.2021.102916}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Fischer-HubnerA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GassaraR21, author = {Amal Gassara and Ismael Bouassida Rodriguez}, title = {Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102775}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102775}, doi = {10.1016/J.JISA.2021.102775}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GassaraR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GhaiTD21, author = {Deepika Ghai and Shailendra Tiwari and N. N. Das}, title = {Bottom-boosting differential evolution based digital image security analysis}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102811}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102811}, doi = {10.1016/J.JISA.2021.102811}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GhaiTD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GountiaR21, author = {Debasis Gountia and Sudip Roy}, title = {Security model for protecting intellectual property of state-of-the-art microfluidic biochips}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102773}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102773}, doi = {10.1016/J.JISA.2021.102773}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GountiaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloFMAZ21, author = {Gustavo {Gonzalez Granadillo} and Mario Faiella and Ib{\'{e}}ria Medeiros and Rui Azevedo and Susana Gonzalez Zarzosa}, title = {{ETIP:} An Enriched Threat Intelligence Platform for improving {OSINT} correlation, analysis, visualization and sharing capabilities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102715}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102715}, doi = {10.1016/J.JISA.2020.102715}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GranadilloFMAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuerberRL21, author = {Christophe Guerber and Micka{\"{e}}l Royer and Nicolas Larrieu}, title = {Machine Learning and Software Defined Network to secure communications in a swarm of drones}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102940}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102940}, doi = {10.1016/J.JISA.2021.102940}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuerberRL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaGGAGS21, author = {Sejal Gupta and Ritu Garg and Nitin Gupta and Waleed S. Alnumay and Uttam Ghosh and Pradip Kumar Sharma}, title = {Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102768}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102768}, doi = {10.1016/J.JISA.2021.102768}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaGGAGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaTK21, author = {Rajesh Gupta and Sudeep Tanwar and Neeraj Kumar}, title = {Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect {CSI}}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102812}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102812}, doi = {10.1016/J.JISA.2021.102812}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GuptaTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HaberfeldHL21, author = {Carl Haberfeld and Md. Shafaeat Hossain and Lisa Lancor}, title = {Open code biometric tap pad for smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102688}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102688}, doi = {10.1016/J.JISA.2020.102688}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HaberfeldHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HaqS21, author = {Tanveer ul Haq and Tariq Shah}, title = {4D mixed chaotic system and its application to {RGB} image encryption using substitution-diffusion}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102931}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102931}, doi = {10.1016/J.JISA.2021.102931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HaqS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HasanAKT21, author = {Shaikha Hasan and Mazen Ali and Sherah Kurnia and Ramayah Thurasamy}, title = {Evaluating the cyber security readiness of organizations and its influence on performance}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102726}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102726}, doi = {10.1016/J.JISA.2020.102726}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HasanAKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HazzaaSAC21, author = {Firas Hazzaa and Antesar M. Shabut and Nada Hussein M. Ali and Marcian N. Cirstea}, title = {Security Scheme Enhancement for Voice over Wireless Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102798}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102798}, doi = {10.1016/J.JISA.2021.102798}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HazzaaSAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Hernandez-Castro21, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and David F. Barrero and Mar{\'{\i}}a D. R.{-}Moreno}, title = {{BASECASS:} {A} methodology for CAPTCHAs security assurance}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103018}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103018}, doi = {10.1016/J.JISA.2021.103018}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Hernandez-Castro21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HijawiAAHF21, author = {Wadi' Hijawi and Ja'far Alqatawna and Ala' M. Al{-}Zoubi and Mohammad A. Hassonah and Hossam Faris}, title = {Android botnet detection using machine learning models based on a comprehensive static analysis approach}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102735}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102735}, doi = {10.1016/J.JISA.2020.102735}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HijawiAAHF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HongF21, author = {Yuxiang Hong and Steven Furnell}, title = {Understanding cybersecurity behavioral habits: Insights from situational support}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102710}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102710}, doi = {10.1016/J.JISA.2020.102710}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HongF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HozhabrAJ21, author = {Maryam Hozhabr and Parvaneh Asghari and Hamid Haj Seyyed Javadi}, title = {Dynamic secure multi-keyword ranked search over encrypted cloud data}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102902}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102902}, doi = {10.1016/J.JISA.2021.102902}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HozhabrAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HsuHXZL21, author = {Chingfang Hsu and Lein Harn and Zhe Xia and Maoyuan Zhang and Quanrun Li}, title = {Design of ideal secret sharing based on new results on representable quadripartite matroids}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102724}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102724}, doi = {10.1016/J.JISA.2020.102724}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HsuHXZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuaZZW21, author = {Siliang Hua and Huiguo Zhang and Jingya Zhang and Shuchang Wang}, title = {Optimization and implementation of the number theoretic transform butterfly unit for large integer multiplication}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102857}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102857}, doi = {10.1016/J.JISA.2021.102857}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuaZZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangCLL21, author = {Peng{-}Cheng Huang and Chinchen Chang and Yung{-}Hui Li and Yanjun Liu}, title = {Enhanced (n, n)-threshold {QR} code secret sharing scheme based on error correction mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102719}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102719}, doi = {10.1016/J.JISA.2020.102719}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangCLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangTLY21, author = {Junjie Huang and Liang Tan and Wenjuan Li and Keping Yu}, title = {RON-enhanced blockchain propagation mechanism for edge-enabled smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102936}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102936}, doi = {10.1016/J.JISA.2021.102936}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuangTLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangW21, author = {Hai Huang and Luyao Wang}, title = {Efficient privacy-preserving face verification scheme}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103055}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103055}, doi = {10.1016/J.JISA.2021.103055}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HussainUKKCK21, author = {Saddam Hussain and Insaf Ullah and Hizbullah Khattak and Muhammad Asghar Khan and Chien{-}Ming Chen and Saru Kumari}, title = {A lightweight and provable secure identity-based generalized proxy signcryption {(IBGPS)} scheme for Industrial Internet of Things (IIoT)}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102625}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102625}, doi = {10.1016/J.JISA.2020.102625}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HussainUKKCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HusseinSMO21, title = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable Video Streaming in Fog Computing" Journal of Information Security and Applications 51 {(2020)} 102412}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102807}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102807}, doi = {10.1016/J.JISA.2021.102807}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IqbalHAKR21, author = {Nadeem Iqbal and Muhammad Hanif and Sagheer Abbas and Muhammad Adnan Khan and Zia Ul Rehman}, title = {Dynamic 3D scrambled image based {RGB} image encryption scheme using hyperchaotic system and {DNA} encoding}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102809}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102809}, doi = {10.1016/J.JISA.2021.102809}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IqbalHAKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IslamB21, author = {SK Hafizul Islam and Swagatam Basu}, title = {{PB-3PAKA:} Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103026}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103026}, doi = {10.1016/J.JISA.2021.103026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IslamB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ItoSSLI21, author = {Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe}, title = {Bit-wise cryptanalysis on {AND-RX} permutation Friet-PC}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102860}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102860}, doi = {10.1016/J.JISA.2021.102860}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ItoSSLI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JahangirS21, author = {Saira Jahangir and Tariq Shah}, title = {A novel multiple color image encryption scheme based on algebra \emph{M}(2, \emph{F}\({}_{\mbox{2}}\)[\emph{u}]/{\unicode{12296}}\emph{u}\({}^{\mbox{8}}\){\unicode{12297}}) and chaotic map}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102831}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102831}, doi = {10.1016/J.JISA.2021.102831}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JahangirS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JanY0W21, author = {Mian Ahmad Jan and Kuo{-}Hui Yeh and Zhiyuan Tan and Yulei Wu}, title = {Blockchain for edge-enabled smart cities applications}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102937}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102937}, doi = {10.1016/J.JISA.2021.102937}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JanY0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JananiB21, author = {T. Janani and M. Brindha}, title = {A secure medical image transmission scheme aided by quantum representation}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102832}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102832}, doi = {10.1016/J.JISA.2021.102832}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JananiB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JavanmardiSMNPP21, author = {Saeed Javanmardi and Mohammad Shojafar and Reza Mohammadi and Amin Nazari and Valerio Persico and Antonio Pescap{\`{e}}}, title = {{FUPE:} {A} security driven task scheduling approach for SDN-based IoT-Fog networks}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102853}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102853}, doi = {10.1016/J.JISA.2021.102853}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JavanmardiSMNPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiangYFQH21, author = {Shuai Jiang and Hong Yao and Cai Fu and Yekui Qian and Lansheng Han}, title = {Function-level obfuscation detection method based on Graph Convolutional Networks}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102953}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102953}, doi = {10.1016/J.JISA.2021.102953}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiangYFQH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KallelCCKO21, author = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Ahmed Hadj Kacem and Lotfi Ben Othmane}, title = {Special issue on risk and security of smart systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102925}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102925}, doi = {10.1016/J.JISA.2021.102925}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KallelCCKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamalI21, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Searchable encryption using secret sharing scheme that realizes direct search of encrypted documents and disjunctive search of multiple keywords}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102824}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102824}, doi = {10.1016/J.JISA.2021.102824}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KamalI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamilO21, author = {Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin}, title = {A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102994}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102994}, doi = {10.1016/J.JISA.2021.102994}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KamilO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KarLL21, author = {Jayaprakash Kar and Xiaoguang Liu and Fagen Li}, title = {{CL-ASS:} An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102905}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102905}, doi = {10.1016/J.JISA.2021.102905}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KarLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kasim21, author = {{\"{O}}mer Kasim}, title = {An ensemble classification-based approach to detect attack level of {SQL} injections}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102852}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102852}, doi = {10.1016/J.JISA.2021.102852}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Kasim21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KaurK21, author = {Damandeep Kaur and Devender Kumar}, title = {Cryptanalysis and improvement of a two-factor user authentication scheme for smart home}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102787}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102787}, doi = {10.1016/J.JISA.2021.102787}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KaurK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KekulEA21, author = {Hakan Kek{\"{u}}l and Burhan Ergen and Halil Arslan}, title = {A multiclass hybrid approach to estimating software vulnerability vectors and severity score}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103028}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103028}, doi = {10.1016/J.JISA.2021.103028}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KekulEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KellyGB21, author = {Daniel Kelly and Frank G. Glavin and Enda Barrett}, title = {Denial of wallet - Defining a looming threat to serverless computing}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102843}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102843}, doi = {10.1016/J.JISA.2021.102843}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KellyGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhalidMAJ21, author = {Rabiya Khalid and Muhammad Waseem Malik and Turki Ali Alghamdi and Nadeem Javaid}, title = {A consortium blockchain based energy trading scheme for Electric Vehicles in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102998}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102998}, doi = {10.1016/J.JISA.2021.102998}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhalidMAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanBBJA21, author = {Faraz Ahmad Khan and Ahmed Bouridane and Said Boussakta and Richard Jiang and Somaya Almaadeed}, title = {Secure facial recognition in the encrypted domain using a local ternary pattern approach}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102810}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102810}, doi = {10.1016/J.JISA.2021.102810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanBBJA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanK21, author = {Jan Sher Khan and Sema Ko{\c{c}} Kayhan}, title = {Chaos and compressive sensing based novel image encryption scheme}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102711}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102711}, doi = {10.1016/J.JISA.2020.102711}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimLAP21, author = {Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park}, title = {Practical dynamic group signature with efficient concurrent joins and batch verifications}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103003}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103003}, doi = {10.1016/J.JISA.2021.103003}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimLAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kiperberg21, author = {Michael Kiperberg}, title = {Preventing malicious communication using virtualization}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102871}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102871}, doi = {10.1016/J.JISA.2021.102871}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Kiperberg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KonyarS21, author = {Mehmet Zeki Konyar and Serdar Burak Solak}, title = {Efficient data hiding method for videos based on adaptive inverted {LSB332} and secure frame selection with enhanced Vigenere cipher}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103037}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103037}, doi = {10.1016/J.JISA.2021.103037}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KonyarS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kumar21, author = {Sachin Kumar}, title = {Image data security using Quasigroup combined with Fibonacci Q-transformation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102941}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102941}, doi = {10.1016/J.JISA.2021.102941}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Kumar21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunangNSS21, author = {Yesi Novaria Kunang and Siti Nurmaini and Deris Stiawan and Bhakti Yudho Suprapto}, title = {Attack classification of an intrusion detection system using deep learning and hyperparameter optimization}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102804}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102804}, doi = {10.1016/J.JISA.2021.102804}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunangNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunduDM21, author = {Nibedita Kundu and Sumit Kumar Debnath and Dheerendra Mishra}, title = {A secure and efficient group signature scheme based on multivariate public key cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102776}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102776}, doi = {10.1016/J.JISA.2021.102776}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunduDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KuribayashiW21, author = {Minoru Kuribayashi and KokSheik Wong}, title = {StealthPDF: Data hiding method for {PDF} file with no visual degradation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102875}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102875}, doi = {10.1016/J.JISA.2021.102875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KuribayashiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaiLLJ21, author = {Yen{-}Lung Lai and Minyi Li and Shiuan{-}Ni Liang and Zhe Jin}, title = {Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102695}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102695}, doi = {10.1016/J.JISA.2020.102695}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaiLLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaiphrakpamWBBB21, author = {Dolendro Singh Laiphrakpam and Leepeng Singh Waikhom and Digambar Brahma and Pratikshit Baruah and Sarthak Biswas}, title = {Image compression-encryption scheme using {SPIHT} and chaotic systems}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103010}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103010}, doi = {10.1016/J.JISA.2021.103010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaiphrakpamWBBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LakshmiSP21, author = {V. S. Lakshmi and Deepthi Sundaran and Deepthi P. P.}, title = {Collusion resistant secret sharing scheme for secure data storage and processing over cloud}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102869}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102869}, doi = {10.1016/J.JISA.2021.102869}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LakshmiSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaskawiecCKV21, author = {Sebastian Laskawiec and Michal Choras and Rafal Kozik and Vijayakumar Varadarajan}, title = {Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks}, journal = {J. Inf. Secur. Appl.}, volume = {56}, pages = {102685}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102685}, doi = {10.1016/J.JISA.2020.102685}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LaskawiecCKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeC21, author = {Tian{-}Fu Lee and Wei{-}Yu Chen}, title = {Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102817}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102817}, doi = {10.1016/J.JISA.2021.102817}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiCHCN21, author = {Ying Li and Jiaxing Cheng and Cheng Huang and Zhouguo Chen and Weina Niu}, title = {NEDetector: Automatically extracting cybersecurity neologisms from hacker forums}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102784}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102784}, doi = {10.1016/J.JISA.2021.102784}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiCHCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiGZWFY21, author = {Hao Li and Min Gao and Fengtao Zhou and Yueyang Wang and Qilin Fan and Linda Yang}, title = {Fusing hypergraph spectral features for shilling attack detection}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103051}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103051}, doi = {10.1016/J.JISA.2021.103051}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiGZWFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLDW21, author = {Yanbin Li and Yu Liu and Yongheng Dai and Pengda Wang}, title = {A party-adaptive variant of LowGear}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102763}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102763}, doi = {10.1016/J.JISA.2021.102763}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLW21, author = {Peng Li and Junzuo Lai and Yongdong Wu}, title = {Event-oriented linkable and traceable anonymous authentication and its application to voting}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102865}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102865}, doi = {10.1016/J.JISA.2021.102865}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiTB21, author = {Yue Li and Benedetta Tondi and Mauro Barni}, title = {Spread-Transform Dither Modulation Watermarking of Deep Neural Network}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103004}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103004}, doi = {10.1016/J.JISA.2021.103004}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiWQYGWQ21, author = {Haiyu Li and Tao Wang and Zirui Qiao and Bo Yang and Yueyang Gong and Jingyi Wang and Guoyong Qiu}, title = {Blockchain-based searchable encryption with efficient result verification and fair payment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102791}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102791}, doi = {10.1016/J.JISA.2021.102791}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiWQYGWQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinWGY21, author = {Yijian Lin and Xiaoming Wang and Qingqing Gan and Mengting Yao}, title = {A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103022}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103022}, doi = {10.1016/J.JISA.2021.103022}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinWGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuJWRZ21, author = {Lidong Liu and Donghua Jiang and Xingyuan Wang and Xianwei Rong and Renxiu Zhang}, title = {2D Logistic-Adjusted-Chebyshev map for visual color image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102854}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102854}, doi = {10.1016/J.JISA.2021.102854}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuJWRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuTTM21, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo}, title = {Designated-ciphertext searchable encryption}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102709}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102709}, doi = {10.1016/J.JISA.2020.102709}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuTTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LizardoBNCA21, author = {Andr{\'{e}} Lizardo and Raul Barbosa and Samuel Neves and Jaime Correia and Filipe Ara{\'{u}}jo}, title = {End-to-end secure group communication for the Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102772}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102772}, doi = {10.1016/J.JISA.2021.102772}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LizardoBNCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Logrippo21, author = {Luigi Logrippo}, title = {Multi-level models for data security in networks and in the Internet of things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102778}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102778}, doi = {10.1016/J.JISA.2021.102778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Logrippo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LvYZHT21, author = {Lingling Lv and Zhipeng Yang and Lei Zhang and Quanzhen Huang and Zhihong Tian}, title = {Multi-party transaction framework for drone services based on alliance blockchain in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102792}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102792}, doi = {10.1016/J.JISA.2021.102792}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LvYZHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaitraSSG21, author = {Tanmoy Maitra and Shiwangi Singh and Ritwik Saurabh and Debasis Giri}, title = {Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102915}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102915}, doi = {10.1016/J.JISA.2021.102915}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaitraSSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MandalD21, author = {Mriganka Mandal and Ratna Dutta}, title = {Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102870}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102870}, doi = {10.1016/J.JISA.2021.102870}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MandalD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MannaPD21, author = {Michele La Manna and Pericle Perazzo and Gianluca Dini}, title = {{SEA-BREW:} {A} scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102692}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102692}, doi = {10.1016/J.JISA.2020.102692}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MannaPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MathurPKNJ21, author = {Akshay Mathur and Laxmi Mounika Podila and Keyur Kulkarni and Quamar Niyaz and Ahmad Y. Javaid}, title = {NATICUSdroid: {A} malware detection framework for Android using native and custom permissions}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102696}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102696}, doi = {10.1016/J.JISA.2020.102696}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MathurPKNJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MedjekTDR21, author = {Faiza Medjek and Djamel Tandjaoui and Nabil Djedjig and Imed Romdhani}, title = {Multicast {DIS} attack mitigation in RPL-based IoT-LLNs}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102939}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102939}, doi = {10.1016/J.JISA.2021.102939}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MedjekTDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MillarMRM21, author = {Stuart Millar and Niall McLaughlin and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and Paul Miller}, title = {Multi-view deep learning for zero-day Android malware detection}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102718}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102718}, doi = {10.1016/J.JISA.2020.102718}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MillarMRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraA21, author = {Zeesha Mishra and Bibhudendra Acharya}, title = {High throughput novel architectures of {TEA} family for high speed IoT and {RFID} applications}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102906}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102906}, doi = {10.1016/J.JISA.2021.102906}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraIZ21, author = {Nimish Mishra and SK Hafizul Islam and Sherali Zeadally}, title = {A comprehensive review on collision-resistant hash functions on lattices}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102782}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102782}, doi = {10.1016/J.JISA.2021.102782}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraIZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraR21, author = {Dheerendra Mishra and Saurabh Rana}, title = {A provably secure content distribution framework for portable {DRM} systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102928}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102928}, doi = {10.1016/J.JISA.2021.102928}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mitchell21, author = {Chris J. Mitchell}, title = {Yet another insecure group key distribution scheme using secret sharing}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102713}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102713}, doi = {10.1016/J.JISA.2020.102713}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mitchell21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mohit21, author = {Prerna Mohit}, title = {An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102992}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102992}, doi = {10.1016/J.JISA.2021.102992}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mohit21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MokbalWWZF21, author = {Fawaz Mahiuob Mohammed Mokbal and Dan Wang and Xiaoxi Wang and Wenbin Zhao and Lihua Fu}, title = {{XGBXSS:} An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102813}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102813}, doi = {10.1016/J.JISA.2021.102813}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MokbalWWZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MondalSHBAA21, author = {Dipankar Kumar Mondal and Bikash Chandra Singh and Haibo Hu and Shivazi Biswas and Md. Zulfikar Alom and Mohammad Abdul Azim}, title = {SeizeMaliciousURL: {A} novel learning approach to detect malicious URLs}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102967}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102967}, doi = {10.1016/J.JISA.2021.102967}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MondalSHBAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MousaviG21, author = {Seyyed Keyvan Mousavi and Ali Ghaffari}, title = {Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102945}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102945}, doi = {10.1016/J.JISA.2021.102945}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MousaviG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MukherjeeSM21, author = {Subhadip Mukherjee and Sunita Sarkar and Somnath Mukhopadhyay}, title = {Pencil shell matrix based image steganography with elevated embedding capacity}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102955}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102955}, doi = {10.1016/J.JISA.2021.102955}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MukherjeeSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NaseerSS21, author = {Yasir Naseer and Tariq Shah and Dawood Shah}, title = {A novel hybrid permutation substitution base colored image encryption scheme for multimedia data}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102829}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102829}, doi = {10.1016/J.JISA.2021.102829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NaseerSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NavdetiBG21, author = {Chandrakant Navdeti and Indrajit Banerjee and Chandan Giri}, title = {Privacy preservation and secure data sharing scheme in fog based vehicular ad-hoc network}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103014}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103014}, doi = {10.1016/J.JISA.2021.103014}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NavdetiBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NayakT21, author = {Sanjeet Kumar Nayak and Somanath Tripathy}, title = {{SEPS:} Efficient public-key based secure search over outsourced data}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102932}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102932}, doi = {10.1016/J.JISA.2021.102932}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NayakT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NayarTE21, author = {Gayathri R. Nayar and Tony Thomas and Sabu Emmanuel}, title = {Graph based secure cancelable palm vein biometrics}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102991}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102991}, doi = {10.1016/J.JISA.2021.102991}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NayarTE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NespoliLM21, author = {Pantaleone Nespoli and Daniel D{\'{\i}}az L{\'{o}}pez and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol}, title = {Cyberprotection in IoT environments: {A} dynamic rule-based solution to defend smart devices}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102878}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102878}, doi = {10.1016/J.JISA.2021.102878}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NespoliLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NikniaCK21, author = {Ahad Niknia and Miguel Correia and Jaber Karimpour}, title = {Secure cloud-of-clouds storage with space-efficient secret sharing}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102826}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102826}, doi = {10.1016/J.JISA.2021.102826}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NikniaCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NishaB21, author = {O. S. Jannath Nisha and Somasundaram Mary Saira Bhanu}, title = {Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102751}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102751}, doi = {10.1016/J.JISA.2021.102751}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NishaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraMC21, author = {Hassan N. Noura and Reem Melki and Ali Chehab}, title = {Efficient data confidentiality scheme for 5G wireless {NOMA} communications}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102781}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102781}, doi = {10.1016/J.JISA.2021.102781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NouraMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NtantogianBAPX21, author = {Christoforos Ntantogian and Panagiotis Bountakas and Dimitris Antonaropoulos and Constantinos Patsakis and Christos Xenakis}, title = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102752}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102752}, doi = {10.1016/J.JISA.2021.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Olukoya21, author = {Oluwafemi Olukoya}, title = {Distilling blockchain requirements for digital investigation platforms}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102969}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102969}, doi = {10.1016/J.JISA.2021.102969}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Olukoya21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PanjaR21, author = {Somnath Panja and Bimal Roy}, title = {A secure end-to-end verifiable e-voting system using blockchain and cloud server}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102815}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102815}, doi = {10.1016/J.JISA.2021.102815}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PanjaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PareekP21, author = {Gaurav Pareek and B. R. Purushothama}, title = {Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102799}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102799}, doi = {10.1016/J.JISA.2021.102799}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PareekP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PareekP21a, author = {Gaurav Pareek and B. R. Purushothama}, title = {{KAPRE:} Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103009}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103009}, doi = {10.1016/J.JISA.2021.103009}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PareekP21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ParishST21, author = {Zach Parish and Amirali Salehi{-}Abari and Julie Thorpe}, title = {A study on priming methods for graphical passwords}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102913}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102913}, doi = {10.1016/J.JISA.2021.102913}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ParishST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatidarS21, author = {Arpita Patidar and Gaurav Somani}, title = {Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102818}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102818}, doi = {10.1016/J.JISA.2021.102818}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatidarS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatsakisC21, author = {Constantinos Patsakis and Fran Casino}, title = {Exploiting statistical and structural features for the detection of Domain Generation Algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102725}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102725}, doi = {10.1016/J.JISA.2020.102725}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatsakisC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PaulIS21, author = {Mahit Kumar Paul and Md. Rabiul Islam and A. H. M. Sarowar Sattar}, title = {An efficient perturbation approach for multivariate data in sensitive and reliable data mining}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102954}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102954}, doi = {10.1016/J.JISA.2021.102954}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PaulIS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengCQGJL21, author = {Jin{-}cheng Peng and Yunhe Cui and Qing Qian and Chun Guo and Chaohui Jiang and Saifei Li}, title = {{ADVICE:} Towards adaptive scheduling for data collection and DDoS detection in {SDN}}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103017}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103017}, doi = {10.1016/J.JISA.2021.103017}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PengCQGJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PolapSY21, author = {Dawid Polap and Gautam Srivastava and Keping Yu}, title = {Agent architecture of an intelligent medical system based on federated learning and blockchain technology}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102748}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102748}, doi = {10.1016/J.JISA.2021.102748}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PolapSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PrasadP21, author = {Shilpee Prasad and B. R. Purushothama}, title = {{CCA} secure and efficient proxy re-encryption scheme without bilinear pairing}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102703}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102703}, doi = {10.1016/J.JISA.2020.102703}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PrasadP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QinTZZ21, author = {Shiyue Qin and Zhenhua Tan and Bin Zhang and Fucai Zhou}, title = {Distributed secret sharing scheme based on the high-dimensional rotation paraboloid}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102797}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102797}, doi = {10.1016/J.JISA.2021.102797}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QinTZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QureshiASMJ21, author = {Kashif Naseer Qureshi and Adi Alhudhaif and Adeel Abass Shah and Saqib Majeed and Gwanggil Jeon}, title = {Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102864}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102864}, doi = {10.1016/J.JISA.2021.102864}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QureshiASMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RabieBK21, author = {Tamer Rabie and Mohammed Baziyad and Ibrahim Kamel}, title = {Secure high payload steganography: {A} model-based approach}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103043}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103043}, doi = {10.1016/J.JISA.2021.103043}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RabieBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ReddyBNNGS21, author = {Dukka Karun Kumar Reddy and Himansu Sekhar Behera and Janmenjoy Nayak and Bighnaraj Naik and Uttam Ghosh and Pradip Kumar Sharma}, title = {Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102866}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102866}, doi = {10.1016/J.JISA.2021.102866}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ReddyBNNGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenCW21, author = {Yanzhen Ren and Sen Cai and Lina Wang}, title = {Secure {AAC} steganography scheme based on multi-view statistical distortion (SofMvD)}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102863}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102863}, doi = {10.1016/J.JISA.2021.102863}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenLSYZ21, author = {Yanli Ren and Xiangyu Li and Shifeng Sun and Xingliang Yuan and Xinpeng Zhang}, title = {Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102698}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102698}, doi = {10.1016/J.JISA.2020.102698}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RezaeiMH21, author = {Tina Rezaei and Farnoush Manavi and Ali Hamzeh}, title = {A {PE} header-based method for malware detection using clustering and deep embedding techniques}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102876}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102876}, doi = {10.1016/J.JISA.2021.102876}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RezaeiMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RhahlaAA21, author = {Mouna Rhahla and Sahar Allegue and Takoua Abdellatif}, title = {Guidelines for {GDPR} compliance in Big Data systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102896}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102896}, doi = {10.1016/J.JISA.2021.102896}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RhahlaAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RodriguezMBS21, author = {Jes{\'{u}}s Garc{\'{\i}}a Rodr{\'{\i}}guez and Rafael Torres Moreno and Jorge Bernal Bernab{\'{e}} and Antonio F. Skarmeta}, title = {Implementation and evaluation of a privacy-preserving distributed {ABC} scheme based on multi-signatures}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102971}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102971}, doi = {10.1016/J.JISA.2021.102971}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RodriguezMBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RoySRPN21, author = {Satyabrata Roy and Manu Shrivastava and Umashankar Rawat and Chirag Vinodkumar Pandey and Sanjeet Kumar Nayak}, title = {{IESCA:} An efficient image encryption scheme using 2-D cellular automata}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102919}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102919}, doi = {10.1016/J.JISA.2021.102919}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RoySRPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RyuPC21, author = {Gwonsang Ryu and Hosung Park and Daeseon Choi}, title = {Adversarial attacks by attaching noise markers on the face against deep face recognition}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102874}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102874}, doi = {10.1016/J.JISA.2021.102874}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RyuPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SK21, author = {Ajish S and K. S. Anil Kumar}, title = {Secure mobile internet voting system using biometric authentication and wavelet based {AES}}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102908}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102908}, doi = {10.1016/J.JISA.2021.102908}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SabirGM21, author = {Shazia Sabir and Vandana Guleria and Deep Chandra Mishra}, title = {Security of multiple {RGB} images in the time domain and frequency domain}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103005}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103005}, doi = {10.1016/J.JISA.2021.103005}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SabirGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaharanLBG21, author = {Shweta Saharan and Vijay Laxmi and Bruhadeshwar Bezawada and Manoj Singh Gaur}, title = {\emph{Scaling {\&} fuzzing: } Personal image privacy from automated attacks in mobile cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102850}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102850}, doi = {10.1016/J.JISA.2021.102850}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SaharanLBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahinKAK21, author = {Durmus {\"{O}}zkan Sahin and Oguz Emre Kural and Sedat Akleylek and Erdal Kili{\c{c}}}, title = {Permission-based Android malware analysis by using dimension reduction with {PCA} and {LDA}}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102995}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102995}, doi = {10.1016/J.JISA.2021.102995}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SahinKAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahuSSH21, author = {Aditya Kumar Sahu and Gandharba Swain and Monalisa Sahu and J. Hemalatha}, title = {Multi-directional block based {PVD} and modulus function image steganography to avoid {FOBP} and {IEP}}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102808}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102808}, doi = {10.1016/J.JISA.2021.102808}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SahuSSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SailMMB21, author = {Soufiane Sail and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Inmaculada Medina{-}Bulo and Halima Bouden}, title = {Preserving authentication and availability security services through Multivariate Statistical Network Monitoring}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102785}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102785}, doi = {10.1016/J.JISA.2021.102785}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SailMMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaleemIAMH21, author = {Muhammad Asad Saleem and SK Hafizul Islam and Shafiq Ahmed and Khalid Mahmood and Majid Hussain}, title = {Provably secure biometric-based client-server secure communication over unreliable networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102769}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102769}, doi = {10.1016/J.JISA.2021.102769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SaleemIAMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SarahBD21, author = {Izza Sarah and Mustapha Benssalah and Karim Drouiche}, title = {An enhanced scalable and secure {RFID} authentication protocol for {WBAN} within an IoT environment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102705}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102705}, doi = {10.1016/J.JISA.2020.102705}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SarahBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenguptaL21, author = {Binanda Sengupta and Anantharaman Lakshminarayanan}, title = {DistriTrust: Distributed and low-latency access validation in zero-trust architecture}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103023}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103023}, doi = {10.1016/J.JISA.2021.103023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SenguptaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SethiYKB21, author = {Kamalakanta Sethi and Venu Madhav Yatam and Rahul Kumar and Padmalochan Bera}, title = {Attention based multi-agent intrusion detection systems using reinforcement learning}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102923}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102923}, doi = {10.1016/J.JISA.2021.102923}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SethiYKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SeyhanNACI21, author = {K{\"{u}}bra Seyhan and Tu N. Nguyen and Sedat Akleylek and Korhan Cengiz and SK Hafizul Islam}, title = {Bi-GISIS {KE:} Modified key exchange protocol with reusable keys for IoT security}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102788}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102788}, doi = {10.1016/J.JISA.2021.102788}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SeyhanNACI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShahASTTK21, author = {Jay Shah and Sarthak Agarwal and Arpit Shukla and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar}, title = {Blockchain-based scheme for the mobile number portability}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102764}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102764}, doi = {10.1016/J.JISA.2021.102764}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShahASTTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaJM21, author = {Pratima Sharma and Rajni Jindal and Dutta Borah Malaya}, title = {Blockchain-based decentralized architecture for cloud storage system}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102970}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102970}, doi = {10.1016/J.JISA.2021.102970}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SharmaJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaWG21, author = {Rahul Sharma and Mohammad Wazid and Prosanta Gope}, title = {A blockchain based secure communication framework for community interaction}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102790}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102790}, doi = {10.1016/J.JISA.2021.102790}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharmaWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghA21, author = {Roop Singh and Alaknanda Ashok}, title = {An optimized robust watermarking technique using {CKGSA} in frequency domain}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102734}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102734}, doi = {10.1016/J.JISA.2020.102734}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghSSM21, author = {Nongmeikapam Brajabidhu Singh and Moirangthem Marjit Singh and Arindam Sarkar and Jyotsna Kumar Mandal}, title = {A novel wide {\&} deep transfer learning stacked {GRU} framework for network intrusion detection}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102899}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102899}, doi = {10.1016/J.JISA.2021.102899}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghSSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SlimanOTSR21, author = {Layth Sliman and Tasnime Omrani and Zahir Tari and Abed Ellatif Samhat and Rhouma Rhouma}, title = {Towards an ultra lightweight block ciphers for Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102897}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102897}, doi = {10.1016/J.JISA.2021.102897}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SlimanOTSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SoniPISK21, author = {Preeti Soni and Arup Kumar Pal and SK Hafizul Islam and Aadarsh Singh and Priyanshu Kumar}, title = {Provably secure and biometric-based secure access of e-Governance services using mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103016}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103016}, doi = {10.1016/J.JISA.2021.103016}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SoniPISK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SowjanyaDR21, author = {K. Sowjanya and Mou Dasgupta and Sangram Ray}, title = {Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102761}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102761}, doi = {10.1016/J.JISA.2021.102761}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SowjanyaDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SravaniS21, author = {Mesala M. Sravani and Ananiah Durai Sundararajan}, title = {Attacks on cryptosystems implemented via {VLSI:} {A} review}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102861}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102861}, doi = {10.1016/J.JISA.2021.102861}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SravaniS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StudiawanS21, author = {Hudan Studiawan and Ferdous Sohel}, title = {Anomaly detection in a forensic timeline with deep autoencoders}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103002}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103002}, doi = {10.1016/J.JISA.2021.103002}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/StudiawanS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Suzen21, author = {Ahmet Ali S{\"{u}}zen}, title = {{UNI-CAPTCHA:} {A} Novel Robust and Dynamic User-Non-Interaction {CAPTCHA} Model Based on Hybrid biLSTM+Softmax}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103036}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103036}, doi = {10.1016/J.JISA.2021.103036}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Suzen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SyrrisG21, author = {Vasileios Syrris and Dimitris Geneiatakis}, title = {On machine learning effectiveness for malware detection in Android {OS} using static analysis data}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102794}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102794}, doi = {10.1016/J.JISA.2021.102794}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SyrrisG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TaftiMB21, author = {Forough Sadat Mirkarimzade Tafti and Shahriar Mohammadi and Mehdi Babagoli}, title = {A new {NFC} mobile payment protocol using improved {GSM} based authentication}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102997}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102997}, doi = {10.1016/J.JISA.2021.102997}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TaftiMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TosunS21, author = {Tolun Tosun and Erkay Savas}, title = {{FSDS:} {A} practical and fully secure document similarity search over encrypted data with lightweight client}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102830}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102830}, doi = {10.1016/J.JISA.2021.102830}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TosunS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Trujillo-Rasua21, author = {Rolando Trujillo{-}Rasua}, title = {Secure memory erasure in the presence of man-in-the-middle attackers}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102730}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102730}, doi = {10.1016/J.JISA.2020.102730}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Trujillo-Rasua21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TsafackINNKABE21, author = {Nestor Tsafack and Abdullah M. Iliyasu and Jean De Dieu Nkapkop and Zeric Tabekoueng Njitacke and Jacques Kengne and Bassem Abd{-}El{-}Atty and Akram Belazi and Ahmed A. Abd El{-}Latif}, title = {A memristive {RLC} oscillator dynamics applied to image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102944}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102944}, doi = {10.1016/J.JISA.2021.102944}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TsafackINNKABE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/UllahAH21, author = {Ikram Ullah and Naveed Ahmed Azam and Umar Hayat}, title = {Efficient and secure substitution box and random number generators over Mordell elliptic curves}, journal = {J. Inf. Secur. Appl.}, volume = {56}, pages = {102619}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102619}, doi = {10.1016/J.JISA.2020.102619}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/UllahAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VarandaSCOR21, author = {Artur Varanda and Leonel Santos and Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and Adail Oliveira and Carlos Rabad{\~{a}}o}, title = {Log pseudonymization: Privacy maintenance in practice}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103021}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103021}, doi = {10.1016/J.JISA.2021.103021}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VarandaSCOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VermaBST21, author = {Ashwin Verma and Pronaya Bhattacharya and Deepti Saraswat and Sudeep Tanwar}, title = {\emph{NyaYa}: Blockchain-based electronic law record management scheme for judicial investigations}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103025}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103025}, doi = {10.1016/J.JISA.2021.103025}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VermaBST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VijayI21, author = {M. Vijay and G. Indumathi}, title = {Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102707}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102707}, doi = {10.1016/J.JISA.2020.102707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VijayI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wang0DZW21, author = {Huili Wang and Wenping Ma and Fuyang Deng and Haibin Zheng and Qianhong Wu}, title = {Dynamic threshold {ECDSA} signature and application to asset custody in blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102805}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102805}, doi = {10.1016/J.JISA.2021.102805}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Wang0DZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangDD21, author = {Rui Wang and Guoqiang Deng and Xue{-}Feng Duan}, title = {An image encryption scheme based on double chaotic cyclic shift and Josephus problem}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102699}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102699}, doi = {10.1016/J.JISA.2020.102699}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangGLCLX21, author = {Yu Wang and Gaopeng Gou and Chang Liu and Mingxin Cui and Zhen Li and Gang Xiong}, title = {Survey of security supervision on blockchain from the perspective of technology}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102859}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102859}, doi = {10.1016/J.JISA.2021.102859}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangGLCLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangMHHD21, author = {Xiaochao Wang and Ding Ma and Kun Hu and Jianping Hu and Ling Du}, title = {Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102820}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102820}, doi = {10.1016/J.JISA.2021.102820}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangMHHD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangS21, author = {Mengli Wang and Lipeng Song}, title = {Efficient defense strategy against spam and phishing email: An evolutionary game model}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102947}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102947}, doi = {10.1016/J.JISA.2021.102947}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiaFGWTW21, author = {Zhuoqun Xia and Zhenwei Fang and Ke Gu and Jin Wang and Jingjing Tan and Guanghui Wang}, title = {Effective charging identity authentication scheme based on fog computing in {V2G} networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102649}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102649}, doi = {10.1016/J.JISA.2020.102649}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiaFGWTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuHZ21, author = {Bingfeng Xu and Gaofeng He and Haiting Zhu}, title = {ME-Box: {A} reliable method to detect malicious encrypted traffic}, journal = {J. Inf. Secur. Appl.}, volume = {59}, pages = {102823}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102823}, doi = {10.1016/J.JISA.2021.102823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuSD21, author = {Congyuan Xu and Jizhong Shen and Xin Du}, title = {Low-rate DoS attack detection method based on hybrid deep neural networks}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102879}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102879}, doi = {10.1016/J.JISA.2021.102879}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XuSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XueSWHWL21, author = {Mingfu Xue and Shichang Sun and Zhiyu Wu and Can He and Jian Wang and Weiqiang Liu}, title = {SocialGuard: An adversarial example based privacy-preserving technique for social images}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {102993}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102993}, doi = {10.1016/J.JISA.2021.102993}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XueSWHWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XueYHWL21, author = {Mingfu Xue and Chengxiang Yuan and Can He and Jian Wang and Weiqiang Liu}, title = {NaturalAE: Natural and robust physical adversarial examples for object detectors}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102694}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102694}, doi = {10.1016/J.JISA.2020.102694}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XueYHWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YadavPS21, author = {Anil Yadav and Sujata Pandey and Rajat Kumar Singh}, title = {Lightweight capability-token for consent-based authentication protocol for smart sensor nodes}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103024}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103024}, doi = {10.1016/J.JISA.2021.103024}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YadavPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YaminUUK21, author = {Muhammad Mudassar Yamin and Mohib Ullah and Habib Ullah and Basel Katt}, title = {Weaponized {AI} for cyber attacks}, journal = {J. Inf. Secur. Appl.}, volume = {57}, pages = {102722}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102722}, doi = {10.1016/J.JISA.2020.102722}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YaminUUK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangKW21, author = {Ching{-}Nung Yang and Chung{-}Lun Kao and Chang{-}Ji Wang}, title = {Two-dimensional diagonal layer hash chain based key pre-distribution scheme}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103038}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103038}, doi = {10.1016/J.JISA.2021.103038}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLWBZD21, author = {Luhui Yang and Guangjie Liu and Jinwei Wang and Huiwen Bai and Jiangtao Zhai and Yuewei Dai}, title = {Fast3DS: {A} real-time full-convolutional malicious domain name detection system}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102933}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102933}, doi = {10.1016/J.JISA.2021.102933}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLWBZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangTL21, author = {Ching{-}Nung Yang and Po{-}Yu Tsai and Yanxiao Liu}, title = {A (\emph{k, n}) secret document sharing with meaningful shares}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {102973}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102973}, doi = {10.1016/J.JISA.2021.102973}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWLK21, author = {Ching{-}Nung Yang and Xiaotian Wu and Hsuan{-}Yu Lin and Cheonshik Kim}, title = {Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102910}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102910}, doi = {10.1016/J.JISA.2021.102910}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWSZ21, author = {Wencheng Yang and Song Wang and Muhammad Shahzad and Wei Zhou}, title = {A cancelable biometric authentication system based on feature-adaptive random projection}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102704}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102704}, doi = {10.1016/J.JISA.2020.102704}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Yavuz21, author = {Erdem Yavuz}, title = {A new parallel processing architecture for accelerating image encryption based on chaos}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103056}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103056}, doi = {10.1016/J.JISA.2021.103056}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Yavuz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YilmazCAH21, author = {Yagiz Yilmaz and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Investigating the impact of ransomware splash screens}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102934}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102934}, doi = {10.1016/J.JISA.2021.102934}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YilmazCAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YouLG21, author = {Zhaoning You and Yan Liu and Tiegang Gao}, title = {A lossless self-recovery watermarking scheme with {JPEG-LS} compression}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102733}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102733}, doi = {10.1016/J.JISA.2020.102733}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YouLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCJ21, author = {Jiyan Zhang and Ting Cui and Chenhui Jin}, title = {A generic framework for decomposing block cipher structure with secret components}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102855}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102855}, doi = {10.1016/J.JISA.2021.102855}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCKAKR21, author = {Yanbin Zhang and Ke Cheng and Fazlullah Khan and Ryan Alturki and Rahim Khan and Ateeq Ur Rehman}, title = {A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102683}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102683}, doi = {10.1016/J.JISA.2020.102683}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangCKAKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangGGS21, author = {Lei Zhang and Yajun Guo and Xiaowei Guo and Xiaowei Shao}, title = {Does the layout of the Android unlock pattern affect the security and usability of the password?}, journal = {J. Inf. Secur. Appl.}, volume = {62}, pages = {103011}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103011}, doi = {10.1016/J.JISA.2021.103011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangGGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouDW21, author = {Yu Zhou and Xinfeng Dong and Yongzhuang Wei}, title = {On the transparency order relationships between one Boolean function and its decomposition functions}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102738}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102738}, doi = {10.1016/J.JISA.2020.102738}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhouDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhuG21, author = {Hui Zhu and Christian Gehrmann}, title = {Lic-Sec: An enhanced AppArmor Docker security profile generator}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102924}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102924}, doi = {10.1016/J.JISA.2021.102924}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhuG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhuGZ21, author = {Hegui Zhu and Yujia Guo and Libo Zhang}, title = {An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102952}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102952}, doi = {10.1016/J.JISA.2021.102952}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhuGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Acharya20, author = {Kamalesh Acharya}, title = {Secure and efficient public key multi-channel broadcast encryption schemes}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102436}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102436}, doi = {10.1016/J.JISA.2019.102436}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Acharya20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmedASAM20, author = {Kazi Wasif Ahmed and Md Momin Al Aziz and Md. Nazmus Sadat and Dima Alhadidi and Noman Mohammed}, title = {Nearest neighbour search over encrypted data using intel {SGX}}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102579}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102579}, doi = {10.1016/J.JISA.2020.102579}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmedASAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Al-WesabiMN20, author = {Fahd N. Al{-}Wesabi and Khalid Mahmood and Nadhem Nemri}, title = {A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102473}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102473}, doi = {10.1016/J.JISA.2020.102473}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Al-WesabiMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlEroudAAA20, author = {Ahmed Aleroud and Emad Abu{-}Shanab and Ahmad Al{-}Aiad and Yazan Alshboul}, title = {An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102614}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102614}, doi = {10.1016/J.JISA.2020.102614}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlEroudAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlbahraniML20, author = {Ekhlas Abbas Albahrani and Amal Abdulbaqi Maryoosh and Sadeq H. Lafta}, title = {Block image encryption based on modified playfair and chaotic system}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102445}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102445}, doi = {10.1016/J.JISA.2019.102445}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlbahraniML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlhadawiLZA20, author = {Hussam S. Alhadawi and Dragan Lambic and Mohamad Fadli Zolkipli and Musheer Ahmad}, title = {Globalized firefly algorithm and chaos for designing substitution box}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102671}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102671}, doi = {10.1016/J.JISA.2020.102671}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlhadawiLZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliGKCIG20, author = {Zeeshan Ali and Anwar Ghani and Imran Khan and Shehzad Ashraf Chaudhry and SK Hafizul Islam and Debasis Giri}, title = {A robust authentication and access control protocol for securing wireless healthcare sensor networks}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102502}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102502}, doi = {10.1016/J.JISA.2020.102502}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AliGKCIG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AoufiDG20, author = {Souhila Aoufi and Abdelouahid Derhab and Mohamed Guerroumi}, title = {Survey of false data injection in smart power grid: Attacks, countermeasures and challenges}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102518}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102518}, doi = {10.1016/J.JISA.2020.102518}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AoufiDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AriefKP20, author = {Raditya Arief and Nima Khakzad and Wolter Pieters}, title = {Mitigating cyberattack related domino effects in process plants via {ICS} segmentation}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102450}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102450}, doi = {10.1016/J.JISA.2020.102450}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AriefKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AskariH20, author = {Sikdar Md. S. Askari and Md. Anwar Hussain}, title = {{IFDTC4.5:} Intuitionistic fuzzy logic based decision tree for E-transactional fraud detection}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102469}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102469}, doi = {10.1016/J.JISA.2020.102469}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AskariH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AskarinWP20, author = {Mohammad Mogharen Askarin and KokSheik Wong and Rapha{\"{e}}l C.{-}W. Phan}, title = {Reduced contact lifting of latent fingerprints from curved surfaces}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102520}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102520}, doi = {10.1016/J.JISA.2020.102520}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AskarinWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AsvijaEB20, author = {B. Asvija and Rajagopal Eswari and M. B. Bijoy}, title = {Bayesian attack graphs for platform virtualized infrastructures in clouds}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102455}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102455}, doi = {10.1016/J.JISA.2020.102455}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AsvijaEB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AyebieS20, author = {Edoukou Berenger Ayebie and El Mamoun Souidi}, title = {Rank-metric code-based mutual authentication protocol for {RFID}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102598}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102598}, doi = {10.1016/J.JISA.2020.102598}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AyebieS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AyubSAMK20, author = {Muhammad Faizan Ayub and Muhammad Asad Saleem and Izwa Altaf and Khalid Mahmood and Saru Kumari}, title = {Fuzzy extraction and {PUF} based three party authentication protocol using {USB} as mass storage device}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102585}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102585}, doi = {10.1016/J.JISA.2020.102585}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AyubSAMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AyubiSR20, author = {Peyman Ayubi and Saeed Setayeshi and Amir Masoud Rahmani}, title = {Deterministic chaos game: {A} new fractal based pseudo-random number generator and its cryptographic application}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102472}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102472}, doi = {10.1016/J.JISA.2020.102472}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AyubiSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BabaghayouLALF20, author = {Messaoud Babaghayou and Nabila Labraoui and Ado Adamou Abba Ari and Nasreddine Lagraa and Mohamed Amine Ferrag}, title = {Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: {A} survey}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102618}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102618}, doi = {10.1016/J.JISA.2020.102618}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BabaghayouLALF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BanerjeeRODCRP20, author = {Soumya Banerjee and Sandip Roy and Vanga Odelu and Ashok Kumar Das and Samiran Chattopadhyay and Joel J. P. C. Rodrigues and Youngho Park}, title = {Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102503}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102503}, doi = {10.1016/J.JISA.2020.102503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BanerjeeRODCRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BaraniAVI20, author = {Milad Jafari Barani and Peyman Ayubi and Milad Yousefi Valandar and Behzad Yosefnezhad Irani}, title = {A new Pseudo random number generator based on generalized Newton complex map with dynamic key}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102509}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102509}, doi = {10.1016/J.JISA.2020.102509}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BaraniAVI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BarrereHNEP20, author = {Mart{\'{\i}}n Barr{\`{e}}re and Chris Hankin and Nicolas Nicolaou and Demetrios G. Eliades and Thomas Parisini}, title = {Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102471}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102471}, doi = {10.1016/J.JISA.2020.102471}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BarrereHNEP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BelhamraS20, author = {Mohamed Amine Belhamra and El Mamoun Souidi}, title = {Steganography over Redundant Residue Number System Codes}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102434}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102434}, doi = {10.1016/J.JISA.2019.102434}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BelhamraS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BerlatoC20, author = {Stefano Berlato and Mariano Ceccato}, title = {A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102463}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102463}, doi = {10.1016/J.JISA.2020.102463}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BerlatoC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bidgoly20, author = {Amir Jalaly Bidgoly}, title = {Robustness verification of soft security systems}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102632}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102632}, doi = {10.1016/J.JISA.2020.102632}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Bidgoly20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BokharaieJ20, author = {Vahhab Samadi Bokharaie and A. Jahanian}, title = {Side-channel leakage assessment metrics and methodologies at design cycle: {A} case study for a cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102561}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102561}, doi = {10.1016/J.JISA.2020.102561}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BokharaieJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BouakkazS20, author = {Samra Bouakkaz and Fouzi Semchedine}, title = {A certificateless ring signature scheme with batch verification for applications in {VANET}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102669}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102669}, doi = {10.1016/J.JISA.2020.102669}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BouakkazS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BoussahaCBB20, author = {Ryma Boussaha and Yacine Challal and Abdelmadjid Bouabdallah and Malika Bessedik}, title = {Optimized in-network authentication against pollution attacks in software-defined-named data networking}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102409}, doi = {10.1016/J.JISA.2019.102409}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BoussahaCBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Broumandnia20, author = {Ali Broumandnia}, title = {Image encryption algorithm based on the finite fields in chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102553}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102553}, doi = {10.1016/J.JISA.2020.102553}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Broumandnia20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CaesarS20, author = {Matthias Caesar and Jan Steffan}, title = {A location privacy analysis of Bluetooth mesh}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102563}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102563}, doi = {10.1016/J.JISA.2020.102563}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CaesarS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CalderoniBM20, author = {Luca Calderoni and Samantha Bandini and Dario Maio}, title = {Privacy preservation in outsourced mobility traces through compact data structures}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102630}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102630}, doi = {10.1016/J.JISA.2020.102630}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CalderoniBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChSGMB20, author = {Rupa Ch. and Gautam Srivastava and Thippa Reddy Gadekallu and Praveen Kumar Reddy Maddikunta and Sweta Bhattacharya}, title = {Security and privacy of {UAV} data using blockchain technology}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102670}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102670}, doi = {10.1016/J.JISA.2020.102670}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChSGMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCMTLR20, author = {Zhanwen Chen and Jiageng Chen and Weizhi Meng and Je Sen Teh and Pei Li and Bingqing Ren}, title = {Analysis of differential distribution of lightweight block cipher based on parallel processing on {GPU}}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102565}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102565}, doi = {10.1016/J.JISA.2020.102565}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenCMTLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenCN20, author = {Longbin Chen and Li{-}Chiou Chen and Nader Nassar}, title = {Carp: {A} cost-aware relaxed protocol for encrypted data stores}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102501}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102501}, doi = {10.1016/J.JISA.2020.102501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenLZH20, author = {Bolin Chen and Weiqi Luo and Peijia Zheng and Jiwu Huang}, title = {Universal stego post-processing for enhancing image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102664}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102664}, doi = {10.1016/J.JISA.2020.102664}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenLZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenSLCW20, author = {Yong{-}qing Chen and Wei{-}jiao Sun and Liyao Li and Chin{-}Chen Chang and Xu Wang}, title = {An efficient general data hiding scheme based on image interpolation}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102584}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102584}, doi = {10.1016/J.JISA.2020.102584}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenSLCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChowdhuriJ20, author = {Partha Chowdhuri and Biswapati Jana}, title = {Hiding data in dual color images reversibly via weighted matrix}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102420}, doi = {10.1016/J.JISA.2019.102420}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChowdhuriJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CimatoGSAD20, author = {Stelvio Cimato and Gabriele Gianini and Maryam Sepehri and Rasool Asal and Ernesto Damiani}, title = {A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102462}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102462}, doi = {10.1016/J.JISA.2020.102462}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CimatoGSAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaleziosSKG20, author = {Nikolaos Dalezios and Stavros Shiaeles and Nicholas Kolokotronis and Bogdan Ghita}, title = {Digital forensics cloud log unification: Implementing {CADF} in Apache CloudStack}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102555}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102555}, doi = {10.1016/J.JISA.2020.102555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DaleziosSKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaneshgarA20, author = {Fatemeh Faraji Daneshgar and Maghsoud Abbaspour}, title = {A two-phase sequential pattern mining framework to detect stealthy {P2P} botnets}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102645}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102645}, doi = {10.1016/J.JISA.2020.102645}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DaneshgarA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DavidT20, author = {Jisa David and Ciza Thomas}, title = {Detection of distributed denial of service attacks based on information theoretic approach in time series models}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102621}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102621}, doi = {10.1016/J.JISA.2020.102621}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DavidT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeviS20, author = {Hidangmayum Saxena Devi and Khumanthem Manglem Singh}, title = {Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102424}, doi = {10.1016/J.JISA.2019.102424}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DeviS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DhoogeWVT20, author = {Laurens D'hooge and Tim Wauters and Bruno Volckaert and Filip De Turck}, title = {Inter-dataset generalization strength of supervised machine learning methods for intrusion detection}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102564}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102564}, doi = {10.1016/J.JISA.2020.102564}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DhoogeWVT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DjedjigTMR20, author = {Nabil Djedjig and Djamel Tandjaoui and Faiza Medjek and Imed Romdhani}, title = {Trust-aware and cooperative routing protocol for IoT security}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102467}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102467}, doi = {10.1016/J.JISA.2020.102467}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DjedjigTMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DwivediAV20, author = {Sanjeev Kumar Dwivedi and Ruhul Amin and Satyanarayana Vollala}, title = {Blockchain based secured information sharing protocol in supply chain management system with key distribution mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102554}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102554}, doi = {10.1016/J.JISA.2020.102554}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DwivediAV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ElmahdiYS20, author = {Elbasher Elmahdi and Seong{-}Moo Yoo and Kumar Sharshembiev}, title = {Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102425}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102425}, doi = {10.1016/J.JISA.2019.102425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ElmahdiYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FalmariB20, author = {Vinod Ramesh Falmari and M. Brindha}, title = {Privacy preserving cloud based secure digital locker using Paillier based difference function and chaos based cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102513}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102513}, doi = {10.1016/J.JISA.2020.102513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FalmariB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FeronLL20, author = {Cyrielle Feron and Lo{\"{\i}}c Lagadec and Vianney Lap{\^{o}}tre}, title = {Automated exploration of homomorphic encryption scheme input parameters}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102627}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102627}, doi = {10.1016/J.JISA.2020.102627}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FeronLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FerragBY20, author = {Mohamed Amine Ferrag and Messaoud Babaghayou and Mehmet Akif Yazici}, title = {Cyber security for fog-based smart grid {SCADA} systems: Solutions and challenges}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102500}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102500}, doi = {10.1016/J.JISA.2020.102500}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FerragBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FerragMMJ20, author = {Mohamed Amine Ferrag and Leandros A. Maglaras and Sotiris Moschoyiannis and Helge Janicke}, title = {Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102419}, doi = {10.1016/J.JISA.2019.102419}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FerragMMJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FouladiEA20, author = {Ramin Fadaei Fouladi and Orhan Ermis and Emin Anarim}, title = {A DDoS attack detection and defense scheme using time-series analysis for {SDN}}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102587}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102587}, doi = {10.1016/J.JISA.2020.102587}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FouladiEA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FranciaGGS20, author = {Matteo Francia and Enrico Gallinucci and Matteo Golfarelli and Nicola Santolini}, title = {{DART:} De-Anonymization of personal gazetteers through social trajectories}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102634}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102634}, doi = {10.1016/J.JISA.2020.102634}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FranciaGGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaniQ20, author = {Gulnawaz Gani and Fasel Qadir}, title = {A robust copy-move forgery detection technique based on discrete cosine transform and cellular automata}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102510}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102510}, doi = {10.1016/J.JISA.2020.102510}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaniQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoGC20, author = {Hang Gao and Tiegang Gao and Renhong Cheng}, title = {Robust detection of median filtering based on data-pair histogram feature and local configuration pattern}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102506}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102506}, doi = {10.1016/J.JISA.2020.102506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoHSLNX20, author = {Xianwei Gao and Changzhen Hu and Chun Shan and Baoxu Liu and Zequn Niu and Hui Xie}, title = {Malware classification for the cloud via semi-supervised transfer learning}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102661}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102661}, doi = {10.1016/J.JISA.2020.102661}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoHSLNX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoWL20, author = {Juntao Gao and Tong Wu and Xuelian Li}, title = {Secure, fair and instant data trading scheme based on bitcoin}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102511}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102511}, doi = {10.1016/J.JISA.2020.102511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GaoWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GaoYHWW20, author = {Xi Gao and Lei Yu and Houhua He and Xiaoyu Wang and Yiwen Wang}, title = {A research of security in website account binding}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102444}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102444}, doi = {10.1016/J.JISA.2019.102444}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GaoYHWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GodquinBGGB20, author = {Tanguy Godquin and Morgan Barbier and Chrystel Gaber and Jean{-}Luc Grimault and Jean{-}Marie Le Bars}, title = {Applied graph theory to security: {A} qualitative placement of security solutions within IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102640}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102640}, doi = {10.1016/J.JISA.2020.102640}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GodquinBGGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloDGKF20, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Joaqu{\'{\i}}n Garc{\'{\i}}a and Igor V. Kotenko and Andrey Fedorchenko}, title = {Stateful RORI-based countermeasure selection using hypergraphs}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102541}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102541}, doi = {10.1016/J.JISA.2020.102541}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GranadilloDGKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloDGKF20a, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Joaqu{\'{\i}}n Garc{\'{\i}}a and Igor V. Kotenko and Andrey Fedorchenko}, title = {Stateful RORI-based countermeasure selection using hypergraphs}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102562}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102562}, doi = {10.1016/J.JISA.2020.102562}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GranadilloDGKF20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuleriaSM20, author = {Vandana Guleria and Shazia Sabir and Deep Chandra Mishra}, title = {Security of multiple {RGB} images by {RSA} cryptosystem combined with FrDCT and Arnold transform}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102524}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102524}, doi = {10.1016/J.JISA.2020.102524}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuleriaSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuriSE20, author = {Mordechai Guri and Yosef A. Solewicz and Yuval Elovici}, title = {Speaker-to-speaker covert ultrasonic communication}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102458}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102458}, doi = {10.1016/J.JISA.2020.102458}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GuriSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HaqS20, author = {Tanveer ul Haq and Tariq Shah}, title = {Algebra-chaos amalgam and {DNA} transform based multiple digital image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102592}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102592}, doi = {10.1016/J.JISA.2020.102592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HaqS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HaqWZM20, author = {Inam ul Haq and Jian Wang and Youwen Zhu and Saad Maqbool}, title = {A survey of authenticated key agreement protocols for multi-server architecture}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102639}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102639}, doi = {10.1016/J.JISA.2020.102639}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HaqWZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HasanR20, author = {Md. Golam Moula Mehedi Hasan and Mohammad Ashiqur Rahman}, title = {A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102397}, doi = {10.1016/J.JISA.2019.102397}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HasanR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HathaliyaTE20, author = {Jigna J. Hathaliya and Sudeep Tanwar and Richard Evans}, title = {Securing electronic healthcare records: {A} mobile-based biometric authentication approach}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102528}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102528}, doi = {10.1016/J.JISA.2020.102528}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HathaliyaTE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouYZZH20, author = {Hong{-}xia Hou and Bo Yang and Mingrui Zhang and Yanwei Zhou and Meijuan Huang}, title = {Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102521}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102521}, doi = {10.1016/J.JISA.2020.102521}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouYZZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuLZLXT20, author = {Hao Hu and Jing Liu and Yuchen Zhang and Yuling Liu and Xiaoyu Xu and Jinglei Tan}, title = {Attack scenario reconstruction approach using attack graph and alert data mining}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102522}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102522}, doi = {10.1016/J.JISA.2020.102522}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuLZLXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuYA20, author = {Qinwen Hu and Se{-}Young Yu and Muhammad Rizwan Asghar}, title = {Analysing performance issues of open-source intrusion detection systems in high-speed networks}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102426}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102426}, doi = {10.1016/J.JISA.2019.102426}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuYA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Islam20, author = {SK Hafizul Islam}, title = {Provably secure two-party authenticated key agreement protocol for post-quantum environments}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102468}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102468}, doi = {10.1016/J.JISA.2020.102468}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Islam20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IslamZ20, author = {SK Hafizul Islam and Sherali Zeadally}, title = {Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102540}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102540}, doi = {10.1016/J.JISA.2020.102540}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IslamZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IsmailI20, author = {Umar Mukhtar Ismail and Shareeful Islam}, title = {A unified framework for cloud security transparency and audit}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102594}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102594}, doi = {10.1016/J.JISA.2020.102594}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IsmailI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiWTFRWS20, author = {Tiantian Ji and Zhongru Wang and Zhihong Tian and Binxing Fang and Qiang Ruan and Haichen Wang and Wei Shi}, title = {AFLPro: Direction sensitive fuzzing}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102497}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102497}, doi = {10.1016/J.JISA.2020.102497}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiWTFRWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JithinS20, author = {K. C. Jithin and Syam Sankar}, title = {Colour image encryption algorithm combining, Arnold map, {DNA} sequence operation, and a Mandelbrot set}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102428}, doi = {10.1016/J.JISA.2019.102428}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JithinS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JonesJMX20, author = {Kevin I. Jones and Helge Janicke and Leandros A. Maglaras and Christos Xenakis}, title = {Introduction to the special issue of the journal of information security and applications on" cyber security in {ICS} {\&} {SCADA} systems"}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102542}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102542}, doi = {10.1016/J.JISA.2020.102542}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JonesJMX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KandarD20, author = {Shyamalendu Kandar and Bibhas Chandra Dhara}, title = {A verifiable secret sharing scheme with combiner verification and cheater identification}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102430}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102430}, doi = {10.1016/J.JISA.2019.102430}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KandarD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kar20, author = {Jayaprakash Kar}, title = {Provably secure certificateless deniable authenticated encryption scheme}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102581}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102581}, doi = {10.1016/J.JISA.2020.102581}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Kar20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KareemR20, author = {Suhad Muhajer Kareem and Abdul Monem S. Rahma}, title = {A novel approach for the development of the Twofish algorithm based on multi-level key space}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102410}, doi = {10.1016/J.JISA.2019.102410}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KareemR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KarimSA20, author = {Nader Abdel Karim and Zarina Shukur and AbedElkarim M. AL{-}banna}, title = {{UIPA:} User authentication method based on user interface preferences for account recovery process}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102466}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102466}, doi = {10.1016/J.JISA.2020.102466}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KarimSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kaur20, author = {Gagandeep Kaur}, title = {A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102601}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102601}, doi = {10.1016/J.JISA.2020.102601}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Kaur20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanM20, author = {Haibat Khan and Keith M. Martin}, title = {A survey of subscription privacy on the 5G radio interface - The past, present and future}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102537}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102537}, doi = {10.1016/J.JISA.2020.102537}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhattakTAADA20, author = {Hasan Ali Khattak and Komal Tehreem and Ahmad Almogren and Zoobia Ameer and Ikram Ud Din and Muhammad Adnan}, title = {Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102615}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102615}, doi = {10.1016/J.JISA.2020.102615}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhattakTAADA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KoCB20, author = {Ili Ko and Desmond Chambers and Enda Barrett}, title = {Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102647}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102647}, doi = {10.1016/J.JISA.2020.102647}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KoCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KokAJ20, author = {S. H. Kok and Azween B. Abdullah and N. Z. Jhanjhi}, title = {Evaluation metric for crypto-ransomware detection using machine learning}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102646}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102646}, doi = {10.1016/J.JISA.2020.102646}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KokAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KreimelEMST20, author = {Philipp Kreimel and Oliver Eigner and Francesco Mercaldo and Antonella Santone and Paul Tavolato}, title = {Anomaly detection in substation networks}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102527}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102527}, doi = {10.1016/J.JISA.2020.102527}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KreimelEMST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarSAK20, author = {Ashish Kumar and Rahul Saha and Mamoun Alazab and Gulshan Kumar}, title = {A Lightweight Signcryption Method for Perception Layer in Internet-of-Things}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102662}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102662}, doi = {10.1016/J.JISA.2020.102662}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarSAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumariJAKA20, author = {Adesh Kumari and Srinivas Jangirala and M. Yahya Abbasi and Vinod Kumar and Mansaf Alam}, title = {{ESEAP:} {ECC} based secure and efficient mutual authentication protocol using smart card}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102443}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102443}, doi = {10.1016/J.JISA.2019.102443}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumariJAKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunduDMC20, author = {Nibedita Kundu and Sumit Kumar Debnath and Dheerendra Mishra and Tanmay Choudhury}, title = {Post-quantum digital signature scheme based on multivariate cubic problem}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102512}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102512}, doi = {10.1016/J.JISA.2020.102512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunduDMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KushwahR20, author = {Gopal Singh Kushwah and Virender Ranga}, title = {Voting extreme learning machine based distributed denial of service attack detection in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102532}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102532}, doi = {10.1016/J.JISA.2020.102532}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KushwahR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LawrenceACL20, author = {Tandoh Lawrence and Ikram Ali and Tandoh Christopher and Fagen Li}, title = {A bandwidth efficient HMAC-based authentication scheme for network coding}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102658}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102658}, doi = {10.1016/J.JISA.2020.102658}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LawrenceACL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeKRWKL20, author = {Hakjun Lee and Dongwoo Kang and Jihyeon Ryu and Dongho Won and Hyoungshick Kim and Youngsook Lee}, title = {A three-factor anonymous user authentication scheme for Internet of Things environments}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102494}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102494}, doi = {10.1016/J.JISA.2020.102494}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeKRWKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Li20, author = {Hui Li}, title = {Pseudo-random scalar multiplication based on group isomorphism}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102534}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102534}, doi = {10.1016/J.JISA.2020.102534}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Li20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiL20, author = {Li Li and Jiayong Liu}, title = {SecACS: Enabling lightweight secure auditable cloud storage with data dynamics}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102545}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102545}, doi = {10.1016/J.JISA.2020.102545}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiWLX20, author = {Wenjuan Li and Yu Wang and Jin Li and Yang Xiang}, title = {Toward supervised shape-based behavioral authentication on smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102591}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102591}, doi = {10.1016/J.JISA.2020.102591}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiWLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiXLY20, author = {Yanan Li and Ming Xia and Xin Liu and Gaobo Yang}, title = {Identification of various image retargeting techniques using hybrid features}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102459}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102459}, doi = {10.1016/J.JISA.2020.102459}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiXLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LimS20, author = {Lee Peng Lim and Manmeet Mahinderjit Singh}, title = {Resolving the imbalance issue in short messaging service spam dataset using cost-sensitive techniques}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102558}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102558}, doi = {10.1016/J.JISA.2020.102558}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LimS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuHXMW20, author = {Yongshuang Liu and Haiping Huang and Fu Xiao and Reza Malekian and Wenming Wang}, title = {Classification and recognition of encrypted {EEG} data based on neural network}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102567}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102567}, doi = {10.1016/J.JISA.2020.102567}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuHXMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LorenzoMMMS20, author = {Andrea De Lorenzo and Fabio Martinelli and Eric Medvet and Francesco Mercaldo and Antonella Santone}, title = {Visualizing the outcome of dynamic analysis of Android malware with VizMal}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102423}, doi = {10.1016/J.JISA.2019.102423}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LorenzoMMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaFF20, author = {Mimi Ma and Shuqin Fan and Dengguo Feng}, title = {Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102652}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102652}, doi = {10.1016/J.JISA.2020.102652}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaHFF20, author = {Mimi Ma and Debiao He and Shuqin Fan and Dengguo Feng}, title = {Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102429}, doi = {10.1016/J.JISA.2019.102429}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaHFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaLO20, author = {Yunling Ma and Chengqing Li and Bo Ou}, title = {Cryptanalysis of an image block encryption algorithm based on chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102566}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102566}, doi = {10.1016/J.JISA.2020.102566}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mandal20, author = {Mriganka Mandal}, title = {Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102666}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102666}, doi = {10.1016/J.JISA.2020.102666}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Mandal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MasaeliJE20, author = {Nafiseh Masaeli and Hamid Haj Seyyed Javadi and Seyed Hossein Erfani}, title = {Key pre-distribution scheme based on transversal design in large mobile fog networks with multi-clouds}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102519}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102519}, doi = {10.1016/J.JISA.2020.102519}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MasaeliJE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MasmoudiMSAB20, author = {Fatma Masmoudi and Zakaria Maamar and Mohamed Sellami and Ali Ismail Awad and Vanilson Arruda Bur{\'{e}}gio}, title = {A Guiding Framework for Vetting the Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102644}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102644}, doi = {10.1016/J.JISA.2020.102644}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MasmoudiMSAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MatousekRGH20, author = {Petr Matousek and Ondrej Rysav{\'{y}} and Matej Gr{\'{e}}gr and Vojtech Havlena}, title = {Flow based monitoring of {ICS} communication in the smart grid}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102535}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102535}, doi = {10.1016/J.JISA.2020.102535}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MatousekRGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MeenaT20, author = {Kunj Bihari Meena and Vipin Tyagi}, title = {A copy-move image forgery detection technique based on tetrolet transform}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102481}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102481}, doi = {10.1016/J.JISA.2020.102481}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MeenaT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mimura20, author = {Mamoru Mimura}, title = {Adjusting lexical features of actual proxy logs for intrusion detection}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102408}, doi = {10.1016/J.JISA.2019.102408}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mimura20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Mimura20a, author = {Mamoru Mimura}, title = {Using fake text vectors to improve the sensitivity of minority class for macro malware detection}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102600}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102600}, doi = {10.1016/J.JISA.2020.102600}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Mimura20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraA20, author = {Zeesha Mishra and Bibhudendra Acharya}, title = {High throughput and low area architectures of secure IoT algorithm for medical image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102533}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102533}, doi = {10.1016/J.JISA.2020.102533}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraDYRVK20, author = {Dheerendra Mishra and Dharminder Dharminder and Preeti Yadav and Y. Sreenivasa Rao and Pandi Vijayakumar and Neeraj Kumar}, title = {A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102648}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102648}, doi = {10.1016/J.JISA.2020.102648}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraVG20, author = {Preeti Mishra and Ishita Verma and Saurabh Gupta}, title = {KVMInspector: {KVM} Based introspection approach to detect malware in cloud environment}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102460}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102460}, doi = {10.1016/J.JISA.2020.102460}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MishraVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoussailebNC20, author = {Routa Moussaileb and Renzo E. Navas and Nora Cuppens}, title = {Watch out! Doxware on the way..}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102668}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102668}, doi = {10.1016/J.JISA.2020.102668}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MoussailebNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MusannaK20, author = {Farhan Musanna and Sanjeev Kumar}, title = {A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102560}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102560}, doi = {10.1016/J.JISA.2020.102560}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MusannaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NejadMH20, author = {Mohsen Yoosefi Nejad and Mohammad Mosleh and Saeed Rasouli Heikalabad}, title = {A blind quantum audio watermarking based on quantum discrete cosine transform}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102495}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102495}, doi = {10.1016/J.JISA.2020.102495}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NejadMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NikooghadamAK20, author = {Mahdi Nikooghadam and Haleh Amintoosi and Saru Kumari}, title = {A provably secure ECC-based roaming authentication scheme for global mobility networks}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102588}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102588}, doi = {10.1016/J.JISA.2020.102588}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NikooghadamAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/OkumuraOS20, author = {Naomi Okumura and Kazuhiro Ogata and Yoichi Shinoda}, title = {Formal analysis of {RFC} 8120 authentication protocol for {HTTP} under different assumptions}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102529}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102529}, doi = {10.1016/J.JISA.2020.102529}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/OkumuraOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/OliveroBMEM20, author = {Miguel Angel Olivero and Antonia Bertolino and Francisco Jos{\'{e}} Dom{\'{\i}}nguez Mayo and Mar{\'{\i}}a Jos{\'{e}} Escalona and Ilaria Matteucci}, title = {Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102492}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102492}, doi = {10.1016/J.JISA.2020.102492}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/OliveroBMEM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PakniatSE20, author = {Nasrollah Pakniat and Danial Shiraly and Ziba Eslami}, title = {Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102525}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102525}, doi = {10.1016/J.JISA.2020.102525}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PakniatSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PareekP20, author = {Gaurav Pareek and B. R. Purushothama}, title = {Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102543}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102543}, doi = {10.1016/J.JISA.2020.102543}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PareekP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatelTGK20, author = {Mohil Maheshkumar Patel and Sudeep Tanwar and Rajesh Gupta and Neeraj Kumar}, title = {A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102583}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102583}, doi = {10.1016/J.JISA.2020.102583}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PatelTGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatilP20, author = {Shravani Mahesh Patil and B. R. Purushothama}, title = {Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102411}, doi = {10.1016/J.JISA.2019.102411}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PatilP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatroSNA20, author = {K. Abhimanyu Kumar Patro and Ayushi Soni and Pradeep Kumar Netam and Bibhudendra Acharya}, title = {Multiple grayscale image encryption using cross-coupled chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102470}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102470}, doi = {10.1016/J.JISA.2020.102470}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatroSNA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PeltonenSA20, author = {Aleksi Peltonen and Mohit Sethi and Tuomas Aura}, title = {Formal verification of misbinding attacks on secure device pairing and bootstrapping}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102461}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102461}, doi = {10.1016/J.JISA.2020.102461}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PeltonenSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengCZCH20, author = {Cong Peng and Jianhua Chen and Lu Zhou and Kim{-}Kwang Raymond Choo and Debiao He}, title = {CsiIBS: {A} post-quantum identity-based signature scheme based on isogenies}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102504}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102504}, doi = {10.1016/J.JISA.2020.102504}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PengCZCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Powell20, author = {Brian A. Powell}, title = {Detecting malicious logins as graph anomalies}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102557}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102557}, doi = {10.1016/J.JISA.2020.102557}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Powell20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QurashiAK20, author = {Mohammed Al Qurashi and Constantinos Marios Angelopoulos and Vasilios Katos}, title = {An architecture for resilient intrusion detection in ad-hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102530}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102530}, doi = {10.1016/J.JISA.2020.102530}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QurashiAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RabaninejadAAA20, author = {Reyhaneh Rabaninejad and Mahmoud Ahmadian{-}Attari and Maryam Rajabzadeh Asaar and Mohammad Reza Aref}, title = {A lightweight identity-based provable data possession supporting users' identity privacy and traceability}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102454}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102454}, doi = {10.1016/J.JISA.2020.102454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RabaninejadAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaghavendraK20, author = {Raghavendra Raghuram Jinagde and R. Sanjeev Kunte}, title = {Extended Local Ternary Co-relation Pattern: {A} novel feature descriptor for face Anti-spoofing}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102482}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102482}, doi = {10.1016/J.JISA.2020.102482}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaghavendraK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaghuvanshiKK20, author = {Kamlesh Kumar Raghuvanshi and Subodh Kumar and Sunil Kumar}, title = {A data encryption model based on intertwining logistic map}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102622}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102622}, doi = {10.1016/J.JISA.2020.102622}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaghuvanshiKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahmanHMA20, author = {Mohammad Ashiqur Rahman and Md. Golam Moula Mehedi Hasan and Mohammad Hossein Manshaei and Ehab Al{-}Shaer}, title = {A game-theoretic analysis to defend against remote operating system fingerprinting}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102456}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102456}, doi = {10.1016/J.JISA.2020.102456}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RahmanHMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RawatD20, author = {Arjun Singh Rawat and Maroti Deshmukh}, title = {Tree and elliptic curve based efficient and secure group key agreement protocol}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102599}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102599}, doi = {10.1016/J.JISA.2020.102599}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RawatD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RomdhaneY20, author = {Imene Romdhane and Heba Yuksel}, title = {A low-complexity security technique in physical layer for fixed LiFi communication systems}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102514}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102514}, doi = {10.1016/J.JISA.2020.102514}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RomdhaneY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RoyGRDC20, author = {Satyabrata Roy and Rohit Kumar Gupta and Umashankar Rawat and Nilanjan Dey and Rub{\'{e}}n Gonz{\'{a}}lez Crespo}, title = {{PCHET:} An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102624}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102624}, doi = {10.1016/J.JISA.2020.102624}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RoyGRDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RtayliE20, author = {Naoufal Rtayli and Nourddine Enneya}, title = {Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102596}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102596}, doi = {10.1016/J.JISA.2020.102596}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RtayliE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahaRK20, author = {Tushar Kanti Saha and Deevashwer Rathee and Takeshi Koshiba}, title = {Efficient protocols for private wildcards pattern matching}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102609}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102609}, doi = {10.1016/J.JISA.2020.102609}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SahaRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SangaviT20, author = {V. Sangavi and P. Thangavel}, title = {An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine map}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102626}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102626}, doi = {10.1016/J.JISA.2020.102626}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SangaviT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SazdarGMKW20, author = {Amir Mahdi Sazdar and Seyed Ali Ghorashi and Vahideh Moghtadaiee and Ahmad Khonsari and David Windridge}, title = {A Low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102515}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102515}, doi = {10.1016/J.JISA.2020.102515}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SazdarGMKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SeiboldSHE20, author = {Clemens Seibold and Wojciech Samek and Anna Hilsmann and Peter Eisert}, title = {Accurate and robust neural networks for face morphing attack detection}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102526}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102526}, doi = {10.1016/J.JISA.2020.102526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SeiboldSHE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SenM20, author = {Amartya Sen and Sanjay Madria}, title = {Application design phase risk assessment framework using cloud security domains}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102617}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102617}, doi = {10.1016/J.JISA.2020.102617}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SenM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Sendi20, author = {Alireza Shameli{-}Sendi}, title = {An efficient security data-driven approach for implementing risk assessment}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102593}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102593}, doi = {10.1016/J.JISA.2020.102593}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Sendi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SethiPB20, author = {Kamalakanta Sethi and Ankit Pradhan and Padmalochan Bera}, title = {Practical traceable multi-authority {CP-ABE} with outsourcing decryption and access policy updation}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102435}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102435}, doi = {10.1016/J.JISA.2019.102435}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SethiPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamshadRMKC20, author = {Salman Shamshad and Minahil Rana and Khalid Mahmood and Saru Kumari and Chien{-}Ming Chen}, title = {A secure blockchain-based e-health records storage and sharing scheme}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102590}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102590}, doi = {10.1016/J.JISA.2020.102590}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ShamshadRMKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamshirbandFCM20, author = {Shahab Shamshirband and Mahdis Fathi and Anthony T. Chronopoulos and Antonio Montieri and Fabio Palumbo and Antonio Pescap{\`{e}}}, title = {Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102582}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102582}, doi = {10.1016/J.JISA.2020.102582}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShamshirbandFCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShuaiLYXW20, author = {Mengxia Shuai and Bin Liu and Nenghai Yu and Ling Xiong and Changhui Wang}, title = {Efficient and privacy-preserving authentication scheme for wireless body area networks}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102499}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102499}, doi = {10.1016/J.JISA.2020.102499}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShuaiLYXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghDN20, author = {Karanbir Singh and Kanwalvir Singh Dhindsa and Deepa Nehra}, title = {{T-CAD:} {A} threshold based collaborative DDoS attack detection in multiple autonomous systems}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102457}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102457}, doi = {10.1016/J.JISA.2020.102457}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghKGSKS20, author = {Indu Singh and Narendra Kumar and Srinivasa K. G. and Tript Sharma and Vaibhav Kumar and Siddharth Singhal}, title = {Database intrusion detection using role and user behavior based risk assessment}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102654}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102654}, doi = {10.1016/J.JISA.2020.102654}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghKGSKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghRAS20, author = {Kunwar Singh and C. Pandu Rangan and Richa Agrawal and Samir Sheshank}, title = {Provably secure lattice based identity based unidirectional {PRE} and {PRE+} schemes}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102569}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102569}, doi = {10.1016/J.JISA.2020.102569}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghRAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SkopikLWVMFPKWT20, author = {Florian Skopik and Max Landauer and Markus Wurzenberger and Gernot Vormayr and Jelena Milosevic and Joachim Fabini and Wolfgang Pr{\"{u}}ggler and Oskar Kruschitz and Benjamin Widmann and Kevin Truckenthanner and Stefan Rass and Michael Simmer and Christoph Zauner}, title = {synERGY: Cross-correlation of operational and contextual data to timely detect and mitigate attacks to cyber-physical systems}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102544}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102544}, doi = {10.1016/J.JISA.2020.102544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SkopikLWVMFPKWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SleemNC20, author = {Lama Sleem and Hassan N. Noura and Rapha{\"{e}}l Couturier}, title = {Towards a secure {ITS:} Overview, challenges and solutions}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102637}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102637}, doi = {10.1016/J.JISA.2020.102637}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SleemNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SouzaCBH20, author = {Nivio Paula de Souza and Cec{\'{\i}}lia de Azevedo Castro C{\'{e}}sar and Juliana de Melo Bezerra and Celso Massaki Hirata}, title = {Extending {STPA} with {STRIDE} to identify cybersecurity loss scenarios}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102620}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102620}, doi = {10.1016/J.JISA.2020.102620}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SouzaCBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SowjanyaD20, author = {K. Sowjanya and Mou Dasgupta}, title = {A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on {ECC}}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102559}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102559}, doi = {10.1016/J.JISA.2020.102559}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SowjanyaD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SurendranTE20, author = {Roopak Surendran and Tony Thomas and Sabu Emmanuel}, title = {A {TAN} based hybrid model for android malware detection}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102483}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102483}, doi = {10.1016/J.JISA.2020.102483}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SurendranTE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SureshkumarAOK20, author = {Venkatasamy Sureshkumar and Ruhul Amin and Mohammad S. Obaidat and Isswarya Karthikeyan}, title = {An enhanced mutual authentication and key establishment protocol for {TMIS} using chaotic map}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102539}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102539}, doi = {10.1016/J.JISA.2020.102539}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SureshkumarAOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SusiloTY20, author = {Willy Susilo and Joseph Tonien and Guomin Yang}, title = {A generalised bound for the Wiener attack on {RSA}}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102531}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102531}, doi = {10.1016/J.JISA.2020.102531}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SusiloTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TanwarPE20, author = {Sudeep Tanwar and Karan Parekh and Richard Evans}, title = {Blockchain-based electronic healthcare record system for healthcare 4.0 applications}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102407}, doi = {10.1016/J.JISA.2019.102407}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TanwarPE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TaoCZ20, author = {Ye Tao and Wenhua Cui and Zhao Zhang}, title = {Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102650}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102650}, doi = {10.1016/J.JISA.2020.102650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TaoCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TehAS20, author = {Je Sen Teh and Moatsum Alawida and You Cheng Sii}, title = {Implementation and practical problems of chaos-based cryptography revisited}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102421}, doi = {10.1016/J.JISA.2019.102421}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TehAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ThokchomS20, author = {Surmila Thokchom and Dilip Kr. Saikia}, title = {Privacy preserving integrity checking of shared dynamic cloud data with user revocation}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102427}, doi = {10.1016/J.JISA.2019.102427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ThokchomS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TianMXL20, author = {Guohua Tian and Hua Ma and Ying Xie and Zhenhua Liu}, title = {Randomized deduplication with ownership management and data sharing in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102432}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102432}, doi = {10.1016/J.JISA.2019.102432}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TianMXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TselikisDMM20, author = {Christos Tselikis and Christos Douligeris and Leandros A. Maglaras and Sarandis Mitropoulos}, title = {On the conference key distribution system with user anonymity}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102556}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102556}, doi = {10.1016/J.JISA.2020.102556}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TselikisDMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VidhyaB20, author = {R. Vidhya and M. Brindha}, title = {A novel conditional Butterfly Network Topology based chaotic image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102484}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102484}, doi = {10.1016/J.JISA.2020.102484}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VidhyaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WandaJ20, author = {Putra Wanda and Huang Jin Jie}, title = {DeepProfile: Finding fake profile in online social network using dynamic {CNN}}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102465}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102465}, doi = {10.1016/J.JISA.2020.102465}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WandaJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangG20, author = {Dongping Wang and Tiegang Gao}, title = {An efficient {USM} sharpening detection method for small-size {JPEG} image}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102451}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102451}, doi = {10.1016/J.JISA.2020.102451}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangKC20, author = {Yilan Wang and Xiaobing Kang and Yajun Chen}, title = {Robust and accurate detection of image copy-move forgery using {PCET-SVD} and histogram of block similarity measures}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102536}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102536}, doi = {10.1016/J.JISA.2020.102536}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangML20, author = {Xiao{-}di Wang and Weizhi Meng and Yi{-}Ning Liu}, title = {Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102628}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102628}, doi = {10.1016/J.JISA.2020.102628}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangNLLJ20, author = {Jinwei Wang and Qiye Ni and Guangjie Liu and Xiangyang Luo and Sunil Kr. Jha}, title = {Image splicing detection based on convolutional neural network with weight combination strategy}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102523}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102523}, doi = {10.1016/J.JISA.2020.102523}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangNLLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangWXWZ20, author = {Chen Wang and Andi Wang and Jian Xu and Qiang Wang and Fucai Zhou}, title = {Outsourced privacy-preserving decision tree classification service over encrypted data}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102517}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102517}, doi = {10.1016/J.JISA.2020.102517}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangWXWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangXLX20, author = {Peng Wang and Tao Xiang and Xiaoguo Li and Hong Xiang}, title = {Public key encryption with conjunctive keyword search on lattice}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102433}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102433}, doi = {10.1016/J.JISA.2019.102433}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangXLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZL20, author = {Pengfei Wang and Xu Zhou and Kai Lu}, title = {Sabotaging the system boundary: {A} study of the inter-boundary vulnerability}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102496}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102496}, doi = {10.1016/J.JISA.2020.102496}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZLWZ20, author = {Juan Wang and Haoxi Zhang and Fei Li and Zuli Wang and Jun Zhao}, title = {Intelligent vehicle knowledge representation and anomaly detection using neural knowledge {DNA}}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102498}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102498}, doi = {10.1016/J.JISA.2020.102498}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangZLWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wicker20, author = {Stephen B. Wicker}, title = {eBook surveillance and the threat to freedom of association}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102643}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102643}, doi = {10.1016/J.JISA.2020.102643}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Wicker20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuYY20, author = {Xiaotian Wu and Ching{-}Nung Yang and Yi{-}Yun Yang}, title = {A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102452}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102452}, doi = {10.1016/J.JISA.2020.102452}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WuYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongLLCN20, author = {Xingxing Xiong and Shubo Liu and Dan Li and Zhaohui Cai and Xiaoguang Niu}, title = {Real-time and private spatio-temporal data aggregation with local differential privacy}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102633}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102633}, doi = {10.1016/J.JISA.2020.102633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiongLLCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiongWSY20, author = {Hu Xiong and Yan Wu and Chunhua Su and Kuo{-}Hui Yeh}, title = {A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102507}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102507}, doi = {10.1016/J.JISA.2020.102507}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XiongWSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuHWVC20, author = {Zhiyan Xu and Debiao He and Huaqun Wang and Pandi Vijayakumar and Kim{-}Kwang Raymond Choo}, title = {A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102453}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102453}, doi = {10.1016/J.JISA.2020.102453}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuHWVC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YadollahiENLC20, author = {Mehdi Yadollahi and Rasul Enayatifar and Hossein Nematzadeh and Malrey Lee and Jae{-}Young Choi}, title = {A novel image security technique based on nucleic acid concepts}, journal = {J. Inf. Secur. Appl.}, volume = {53}, pages = {102505}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102505}, doi = {10.1016/J.JISA.2020.102505}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YadollahiENLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLL20, author = {Ching{-}Nung Yang and Yi{-}Chin Lin and Peng Li}, title = {Cheating immune \emph{k}-out-of-\emph{n} block-based progressive visual cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102660}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102660}, doi = {10.1016/J.JISA.2020.102660}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangZZX20, author = {Min Yang and Shibin Zhang and Hang Zhang and Jinyue Xia}, title = {Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 {(2019)} 102371}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102405}, doi = {10.1016/J.JISA.2019.102405}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YangZZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuL20, author = {Huifang Yu and Wen Li}, title = {A certificateless signature for multi-source network coding}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102655}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102655}, doi = {10.1016/J.JISA.2020.102655}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCLJC20, author = {Hongxia Zhang and Xingshu Chen and Xiao Lan and Hongjian Jin and Qi Cao}, title = {{BTCAS:} {A} Blockchain-Based Thoroughly Cross-Domain Authentication Scheme}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102538}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102538}, doi = {10.1016/J.JISA.2020.102538}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangCLJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTCHZ20, author = {Xiaojun Zhang and Yao Tang and Sheng Cao and Chao Huang and Shuang Zheng}, title = {Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102568}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102568}, doi = {10.1016/J.JISA.2020.102568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangTCHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangTSS20, author = {Jing Zhang and Rong Tan and Chunhua Su and Wen Si}, title = {Design and application of a personal credit information sharing platform based on consortium blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102659}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102659}, doi = {10.1016/J.JISA.2020.102659}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangTSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouHWCC20, author = {Xiaoyu Zhou and Wien Hong and Shaowei Weng and Tung{-}Shou Chen and Jeanne Chen}, title = {Reversible and recoverable authentication method for demosaiced images using adaptive coding technique}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102629}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102629}, doi = {10.1016/J.JISA.2020.102629}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhouHWCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouWD20, author = {Quanqiang Zhou and Jinxia Wu and Liangliang Duan}, title = {Recommendation attack detection based on deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102493}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102493}, doi = {10.1016/J.JISA.2020.102493}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouWXPX20, author = {Fucai Zhou and Qiang Wang and Jian Xu and Su Peng and Zifeng Xu}, title = {Chameleon accumulator and its applications}, journal = {J. Inf. Secur. Appl.}, volume = {50}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102422}, doi = {10.1016/J.JISA.2019.102422}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouWXPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZoppiCSB20, author = {Tommaso Zoppi and Andrea Ceccarelli and Lorenzo Salani and Andrea Bondavalli}, title = {On the educated selection of unsupervised algorithms via attacks and anomaly classes}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102474}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102474}, doi = {10.1016/J.JISA.2020.102474}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZoppiCSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZulkefliS20, author = {Zakiah Zulkefli and Manmeet Mahinderjit Singh}, title = {Sentient-based Access Control model: {A} mitigation technique for Advanced Persistent Threats in Smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102431}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2019.102431}, doi = {10.1016/J.JISA.2019.102431}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZulkefliS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HusseinSMO20, title = {A hybrid security strategy (HS\({}^{\mbox{2}}\)) for reliable video streaming in fog computing}, journal = {J. Inf. Secur. Appl.}, volume = {51}, pages = {102412}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.1016/j.jisa.2019.102412}, doi = {10.1016/J.JISA.2019.102412}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HusseinSMO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AghiliM19, author = {Seyed Farhad Aghili and Hamid Mala}, title = {New authentication/ownership transfer protocol for {RFID} objects}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102401}, doi = {10.1016/J.JISA.2019.102401}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AghiliM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlOmariMMMLB19, author = {Ruba AlOmari and Miguel Vargas Martin and Shane MacDonald and Amit Maraj and Ramiro Liscano and Christopher Bellman}, title = {Inside out - {A} study of users' perceptions of password memorability and recall}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {223--234}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.009}, doi = {10.1016/J.JISA.2019.05.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlOmariMMMLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlOmariT19, author = {Ruba AlOmari and Julie Thorpe}, title = {On password behaviours and attitudes in different populations}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {79--89}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.008}, doi = {10.1016/J.JISA.2018.12.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlOmariT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliSCK19, author = {Muhammad Ali and Stavros Shiaeles and Nathan L. Clarke and Dimitrios Kontogeorgis}, title = {A proactive malicious software identification approach for digital forensic examiners}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {139--155}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.013}, doi = {10.1016/J.JISA.2019.04.013}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AliSCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlloghaniAABMHA19, author = {Mohamed Alloghani and Mohammed M. Alani and Dhiya Al{-}Jumeily and Thar Baker and Jamila Mustafina and Abir Hussain and Ahmed J. Aljaaf}, title = {A systematic review on the status and progress of homomorphic encryption technologies}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102362}, doi = {10.1016/J.JISA.2019.102362}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlloghaniAABMHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlmalkawiHAAA19, author = {Islam T. Almalkawi and Rami Halloush and Ayoub Alsarhan and Ahmed Yassin Al{-}Dubai and Jamal N. Al{-}Karaki}, title = {A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102384}, doi = {10.1016/J.JISA.2019.102384}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlmalkawiHAAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlphonsaM19, author = {M. M. Annie Alphonsa and N. MohanaSundaram}, title = {A reformed grasshopper optimization with genetic principle for securing medical data}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {410--420}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.007}, doi = {10.1016/J.JISA.2019.05.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlphonsaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlshahraniT19, author = {Mohammed Alshahrani and Issa Traor{\'{e}}}, title = {Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {156--175}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.003}, doi = {10.1016/J.JISA.2019.02.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlshahraniT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AltiganiHSB19, author = {Abdelrahman Altigani and Shafaatunnur Hasan and Siti Mariyam Shamsuddin and Bazara I. A. Barry}, title = {A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {210--221}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.013}, doi = {10.1016/J.JISA.2019.03.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AltiganiHSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnadaYKWS19, author = {Hiroaki Anada and Takanori Yasuda and Junpei Kawamoto and Jian Weng and Kouichi Sakurai}, title = {{RSA} public keys with inside structure: Proofs of key generation and identities for web-of-trust}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {10--19}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.006}, doi = {10.1016/J.JISA.2018.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnadaYKWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnandkumarK19, author = {Ramakrishnan Anandkumar and Ramanujam Kalpana}, title = {Designing a fast image encryption scheme using fractal function and 3D Henon Map}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102390}, doi = {10.1016/J.JISA.2019.102390}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnandkumarK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AndradeY19, author = {Roberto O. Andrade and Sang Guun Yoo}, title = {Cognitive security: {A} comprehensive study of cognitive science in cybersecurity}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.008}, doi = {10.1016/J.JISA.2019.06.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AndradeY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AssidiAS19, author = {Hafsa Assidi and Edoukou Berenger Ayebie and El Mamoun Souidi}, title = {An efficient code-based threshold ring signature scheme}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {52--60}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.006}, doi = {10.1016/J.JISA.2019.01.006}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AssidiAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BakshiP19, author = {Arvind Bakshi and Anoop Kumar Patel}, title = {Secure telemedicine using {RONI} halftoned visual cryptography without pixel expansion}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {281--295}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.004}, doi = {10.1016/J.JISA.2019.03.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BakshiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BanikSL19, author = {Arpita Banik and Zeba Shamsi and Dolendro Singh Laiphrakpam}, title = {An encryption scheme for securing multiple medical images}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102398}, doi = {10.1016/J.JISA.2019.102398}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BanikSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BhattacharjeeM19, author = {Tapasi Bhattacharjee and Santi P. Maity}, title = {Progressive and hierarchical share-in-share scheme over cloud}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {108--120}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.003}, doi = {10.1016/J.JISA.2019.03.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BhattacharjeeM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BiswasATM19, author = {Md. Rafiul Biswas and Kazi Md. Rokibul Alam and Shinsuke Tamura and Yasuhiko Morimoto}, title = {A technique for {DNA} cryptography based on dynamic mechanisms}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102363}, doi = {10.1016/J.JISA.2019.102363}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BiswasATM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Broumandnia19, author = {Ali Broumandnia}, title = {Designing digital image encryption using 2D and 3D reversible modular chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {188--198}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.004}, doi = {10.1016/J.JISA.2019.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Broumandnia19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BuckleyN19, author = {Oliver Buckley and Jason R. C. Nurse}, title = {The language of biometrics: Analysing public perceptions}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {112--119}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.001}, doi = {10.1016/J.JISA.2019.05.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BuckleyN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BuriroCC19, author = {Attaullah Buriro and Bruno Crispo and Mauro Conti}, title = {AnswerAuth: {A} bimodal behavioral biometric-based user authentication scheme for smartphones}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {89--103}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.008}, doi = {10.1016/J.JISA.2018.11.008}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BuriroCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CartaFRS19, author = {Salvatore Carta and Gianni Fenu and Diego Reforgiato Recupero and Roberto Saia}, title = {Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {13--22}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.007}, doi = {10.1016/J.JISA.2019.02.007}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CartaFRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DabasS19, author = {Neelam Dabas and Ram Pal Singh}, title = {ELM-Kernel and reduced kernel {ELM} based watermarking scheme}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {173--192}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.005}, doi = {10.1016/J.JISA.2019.03.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DabasS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DamopoulosK19, author = {Dimitrios Damopoulos and Georgios Kambourakis}, title = {Hands-Free one-Time and continuous authentication using glass wearable devices}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {138--150}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.002}, doi = {10.1016/J.JISA.2019.02.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DamopoulosK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DanielRS19, author = {Renu Mary Daniel and Elijah Blessing Rajsingh and Salaja Silas}, title = {An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {156--172}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.003}, doi = {10.1016/J.JISA.2019.05.003}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DanielRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DattaDM19, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.009}, doi = {10.1016/J.JISA.2019.06.009}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DattaDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DengZZL19, author = {Zhiliang Deng and Ying Zhang and Xiaorui Zhang and Lingling Li}, title = {Privacy-preserving quantum multi-party computation based on circular structure}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {120--124}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.011}, doi = {10.1016/J.JISA.2019.04.011}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DengZZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DyerDD19, author = {James Dyer and Martin E. Dyer and Karim Djemame}, title = {Order-preserving encryption using approximate common divisors}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102391}, doi = {10.1016/J.JISA.2019.102391}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DyerDD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ElsayedZ19, author = {Marwa Elsayed and Mohammad Zulkernine}, title = {Offering security diagnosis as a service for cloud SaaS applications}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {32--48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.006}, doi = {10.1016/J.JISA.2018.11.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ElsayedZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EssaidASM19, author = {Mohamed Essaid and Ismail Akharraz and Abderrahim Saaidi and Ali Mouhib}, title = {Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {173--187}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.006}, doi = {10.1016/J.JISA.2019.05.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/EssaidASM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FatahbeygiT19, author = {Ali Fatahbeygi and Fardin Akhlaghian Tab}, title = {A highly robust and secure image watermarking based on classification and visual cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {71--78}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.005}, doi = {10.1016/J.JISA.2019.01.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FatahbeygiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FatimaYLWAY19, author = {Rubia Fatima and Affan Yasin and Lin Liu and Jianmin Wang and Wasif Afzal and Awaid Yasin}, title = {Sharing information online rationally: An observation of user privacy concerns and awareness using serious game}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.007}, doi = {10.1016/J.JISA.2019.06.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FatimaYLWAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FerreiraA19, author = {Rui Ferreira and Rui L. Aguiar}, title = {Repositioning privacy concerns: Web servers controlling {URL} metadata}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {121--137}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.010}, doi = {10.1016/J.JISA.2019.03.010}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FerreiraA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FocardiLW19, author = {Riccardo Focardi and Flaminia L. Luccio and Heider A. M. Wahsheh}, title = {Usable security for {QR} code}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102369}, doi = {10.1016/J.JISA.2019.102369}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FocardiLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Frattolillo19, author = {Franco Frattolillo}, title = {A multiparty watermarking protocol for cloud environments}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {246--257}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.011}, doi = {10.1016/J.JISA.2019.05.011}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Frattolillo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GajbhiyeKSS19, author = {Samta Gajbhiye and Sanjeev Karmakar and Monisha Sharma and Sanjay Sharma}, title = {Bluetooth Secure Simple Pairing with enhanced security level}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {170--183}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.009}, doi = {10.1016/J.JISA.2018.11.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GajbhiyeKSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GhosalM19, author = {Sudipta Kumar Ghosal and Jyotsna Kumar Mandal}, title = {On the use of the Stirling Transform in image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {320--330}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.04.003}, doi = {10.1016/J.JISA.2018.04.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GhosalM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuWY19, author = {Ke Gu and Keming Wang and Lulu Yang}, title = {Traceable attribute-based signature}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102400}, doi = {10.1016/J.JISA.2019.102400}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuerraCV19, author = {Jorge L. Guerra and Carlos Adri{\'{a}}n Catania and Eduardo E. Veas}, title = {Active learning approach to label network traffic datasets}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102388}, doi = {10.1016/J.JISA.2019.102388}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuerraCV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Guri19, author = {Mordechai Guri}, title = {Optical air-gap exfiltration attack via invisible images}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {222--230}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.004}, doi = {10.1016/J.JISA.2019.02.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Guri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HarmouchK19, author = {Youssef Harmouch and Rachid El Kouch}, title = {The benefit of using chaos in key schedule algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {143--155}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.001}, doi = {10.1016/J.JISA.2019.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HarmouchK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HasrounySBL19, author = {Hamssa Hasrouny and Abed Ellatif Samhat and Carole Bassil and Anis Laouiti}, title = {Misbehavior detection and efficient revocation within {VANET}}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {193--209}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.001}, doi = {10.1016/J.JISA.2019.03.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HasrounySBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HeYHW19, author = {Yongzhong He and Xuejun Yang and Binghui Hu and Wei Wang}, title = {Dynamic privacy leakage analysis of Android third-party libraries}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {259--270}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.014}, doi = {10.1016/J.JISA.2019.03.014}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HeYHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HouJGS19, author = {Jinqiu Hou and Mingming Jiang and Yuyan Guo and Wangan Song}, title = {Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {329--334}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.015}, doi = {10.1016/J.JISA.2019.05.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HouJGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuAB19, author = {Qinwen Hu and Muhammad Rizwan Asghar and Nevil Brownlee}, title = {Checking certificate revocation efficiently using certificate revocation guard}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.012}, doi = {10.1016/J.JISA.2019.06.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HuAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuL19, author = {Yan{-}Xiang Hu and Yi{-}Ning Liu}, title = {A progressively essential secret image sharing scheme using hierarchy shadow}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {371--376}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.003}, doi = {10.1016/J.JISA.2019.06.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiaCLYLLW19, author = {Hongyong Jia and Yue Chen and Yan Li and Xincheng Yan and Fenlin Liu and Xiangyang Luo and Bo Wang}, title = {Attributes revocation through ciphertext puncturation}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.011}, doi = {10.1016/J.JISA.2019.06.011}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiaCLYLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiangCYSZ19, author = {Leqi Jiang and Yi Cao and Chengsheng Yuan and Xingming Sun and Xiaoli Zhu}, title = {An effective comparison protocol over encrypted data in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102367}, doi = {10.1016/J.JISA.2019.102367}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiangCYSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JinCYZJS19, author = {Chunhua Jin and Guanhua Chen and Changhui Yu and Jianyang Zhao and Ying Jin and Jinsong Shan}, title = {Heterogeneous deniable authentication and its application to e-voting systems}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {104--111}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.009}, doi = {10.1016/J.JISA.2019.04.009}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JinCYZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KabiriradE19, author = {Saeideh Kabirirad and Ziba Eslami}, title = {Improvement of (\emph{n, n})-multi-secret image sharing schemes based on Boolean operations}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {16--27}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.018}, doi = {10.1016/J.JISA.2019.03.018}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KabiriradE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamalI19, author = {A. H. M. Kamal and Mohammad Mahfuzul Islam}, title = {A prediction error based histogram association and mapping technique for data embedment}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102368}, doi = {10.1016/J.JISA.2019.102368}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KamalI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamilO19, author = {Ismaila Adeniyi Kamil and Sunday Oyinlola Ogundoyin}, title = {An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {184--200}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.004}, doi = {10.1016/J.JISA.2018.12.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KamilO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KandarCBD19, author = {Shyamalendu Kandar and Dhaibat Chaudhuri and Apurbaa Bhattacharjee and Bibhas Chandra Dhara}, title = {Image encryption using sequence generated by cyclic group}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {117--129}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.003}, doi = {10.1016/J.JISA.2018.12.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KandarCBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KavianpourTS19, author = {Sanaz Kavianpour and Ali Tamimi and Bharanidharan Shanmugam}, title = {A privacy-preserving model to control social interaction behaviors in social network sites}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102402}, doi = {10.1016/J.JISA.2019.102402}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KavianpourTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanP19, author = {Saad Khan and Simon Parkinson}, title = {Discovering and utilising expert knowledge from security event logs}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102375}, doi = {10.1016/J.JISA.2019.102375}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhosraviKKN19, author = {Behrooz Khosravi and Behnam Khosravi and Bahman Khosravi and Khashayar Nazarkardeh}, title = {A new method for pdf steganography in justified texts}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {61--70}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.003}, doi = {10.1016/J.JISA.2019.01.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhosraviKKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarGA19, author = {Devender Kumar and Harmanpreet Singh Grover and Adarsh}, title = {A secure authentication protocol for wearable devices environment using {ECC}}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {8--15}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.008}, doi = {10.1016/J.JISA.2019.03.008}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarKJ19, author = {Rajeev Kumar and Dae{-}Soo Kim and Ki{-}Hyun Jung}, title = {Enhanced {AMBTC} based data hiding method using hamming distance and pixel value differencing}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {94--103}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.007}, doi = {10.1016/J.JISA.2019.04.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarKKK19, author = {Subodh Kumar and Rajendra Kumar and Sushil Kumar and Sunil Kumar}, title = {Cryptographic construction using coupled map lattice as a diffusion model to enhanced security}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {70--83}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.011}, doi = {10.1016/J.JISA.2019.02.011}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarKKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarN19, author = {Avishek Kumar and Naveen K. Nishchal}, title = {Quick response code and interference-based optical asymmetric cryptosystem}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {35--43}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.004}, doi = {10.1016/J.JISA.2019.01.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarN19a, author = {Jalesh Kumar and Shivananda Nirmala}, title = {Securing the regions comprising information in a document image with novel key selection technique - a parallel approach}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {84--95}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.006}, doi = {10.1016/J.JISA.2019.03.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarN19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunzPGFP19, author = {Michael Kunz and Alexander Puchta and Sebastian Groll and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Attribute quality management for dynamic identity and access management}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {64--79}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.004}, doi = {10.1016/J.JISA.2018.11.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KunzPGFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiDCW19, author = {Dongmei Li and Xiaolei Dong and Zhenfu Cao and Haijiang Wang}, title = {Privacy-preserving outsourced image feature extraction}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {59--64}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.020}, doi = {10.1016/J.JISA.2019.03.020}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiDCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiK19, author = {Wenjuan Li and Lam For Kwok}, title = {Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: {A} further analysis}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {1--7}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.019}, doi = {10.1016/J.JISA.2019.03.019}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiXZ19, author = {Shanshan Li and Chunxiang Xu and Yuan Zhang}, title = {{CSED:} Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {250--258}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.015}, doi = {10.1016/J.JISA.2019.03.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiZRTLXC19, author = {Pei Li and Shihao Zhou and Bingqing Ren and Shuman Tang and Ting Li and Chang Xu and Jiageng Chen}, title = {Efficient implementation of lightweight block ciphers on volta and pascal architecture}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {235--245}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.006}, doi = {10.1016/J.JISA.2019.04.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiZRTLXC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiZX19, author = {Chengqing Li and Yun Zhang and Eric Yong Xie}, title = {When an attacker meets a cipher-image in 2018: {A} year in review}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102361}, doi = {10.1016/J.JISA.2019.102361}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiZX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiangZKR19, author = {Pengfei Liang and Leyou Zhang and Li Kang and Juan Ren}, title = {Privacy-preserving decentralized {ABE} for secure sharing of personal health records in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {258--266}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.012}, doi = {10.1016/J.JISA.2019.05.012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiangZKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuRGXW19, author = {Yepeng Liu and Yongjun Ren and Chunpeng Ge and Jinyue Xia and Qirun Wang}, title = {A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {125--131}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.002}, doi = {10.1016/J.JISA.2019.05.002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuRGXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LohachabK19, author = {Ankur Lohachab and Bidhan Karambir}, title = {{ECC} based inter-device authentication and authorization scheme using {MQTT} for IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {1--12}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.005}, doi = {10.1016/J.JISA.2019.02.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LohachabK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MahatoYK19, author = {Susmita Mahato and Dilip Kumar Yadav and Danish Ali Khan}, title = {A novel information hiding scheme based on social networking site viewers' public comments}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {275--283}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.013}, doi = {10.1016/J.JISA.2019.05.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MahatoYK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MalikWCYKWCH19, author = {Asad Malik and Hongxia Wang and Tailong Chen and Tianlong Yang and Ahmad Neyaz Khan and Hanzhou Wu and Yanli Chen and Yi Hu}, title = {Reversible data hiding in homomorphically encrypted image using interpolation technique}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102374}, doi = {10.1016/J.JISA.2019.102374}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MalikWCYKWCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MandalaR19, author = {Jyothi Mandala and M. V. P. Chandra Sekhara Rao}, title = {Privacy preservation of data using crow search with adaptive awareness probability}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {157--169}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.005}, doi = {10.1016/J.JISA.2018.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MandalaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MansouriA19, author = {Azadeh Mansouri and Ahmad Mahmoudi Aznaveh}, title = {Toward a secure video watermarking in compressed domain}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102370}, doi = {10.1016/J.JISA.2019.102370}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MansouriA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MarksteinerVN19, author = {Stefan Marksteiner and Heribert Vallant and Kai Nahrgang}, title = {Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102389}, doi = {10.1016/J.JISA.2019.102389}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MarksteinerVN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Masoumi19, author = {Massoud Masoumi}, title = {A highly efficient and secure hardware implementation of the advanced encryption standard}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102371}, doi = {10.1016/J.JISA.2019.102371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Masoumi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McLarenBRT19, author = {Peter McLaren and William J. Buchanan and Gordon Russell and Zhiyuan Tan}, title = {Deriving ChaCha20 key streams from targeted memory analysis}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102372}, doi = {10.1016/J.JISA.2019.102372}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/McLarenBRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MeghrajaniDM19, author = {Yogesh K. Meghrajani and Laxmi S. Desai and Himanshu S. Mazumdar}, title = {Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {267--274}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.010}, doi = {10.1016/J.JISA.2019.05.010}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MeghrajaniDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MizherSAM19, author = {Manal A. Mizher and Riza Sulaiman and Ayman M. Abdalla and Manar Abduljabbar Ahmad Mizher}, title = {An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {390--409}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.06.005}, doi = {10.1016/J.JISA.2019.06.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MizherSAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohammadA19, author = {Rami Mustafa A. Mohammad and Mohammed Abdulrahman Alqahtani}, title = {A comparison of machine learning techniques for file system forensics analysis}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {53--61}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.009}, doi = {10.1016/J.JISA.2019.02.009}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MohammadA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MohammadiMAK19, author = {Sara Mohammadi and Hamid Mirvaziri and Mostafa Ghazizadeh Ahsaee and Hadis Karimipour}, title = {Cyber intrusion detection by combined feature selection algorithm}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {80--88}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.007}, doi = {10.1016/J.JISA.2018.11.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MohammadiMAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MondalSK19, author = {Bhaskar Mondal and Shrey Singh and Prabhakar Kumar}, title = {A secure image encryption scheme based on cellular automata and chaotic skew tent map}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {117--130}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.010}, doi = {10.1016/J.JISA.2019.01.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MondalSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoosazadehE19, author = {Mohammad Moosazadeh and Gholamhossein Ekbatanifard}, title = {A new DCT-based robust image watermarking method using teaching-learning-Based optimization}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {28--38}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.04.001}, doi = {10.1016/J.JISA.2019.04.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MoosazadehE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MwitondiSZ19, author = {Kassim S. Mwitondi and Raed A. Said and Shahrzad Zargari}, title = {A robust domain partitioning intrusion detection method}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102360}, doi = {10.1016/J.JISA.2019.102360}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MwitondiSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NajafiL19, author = {Esmaeil Najafi and Khaled Loukhaoukha}, title = {Hybrid secure and robust image watermarking scheme based on {SVD} and sharp frequency localized contourlet transform}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {144--156}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.002}, doi = {10.1016/J.JISA.2018.12.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NajafiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NasirAHF19, author = {Akhyari Nasir and Ruzaini Abdullah Arshah and Mohd Rashid Ab Hamid and Syahrul Fahmy}, title = {An analysis on the dimensions of information security culture concept: {A} review}, journal = {J. Inf. Secur. Appl.}, volume = {44}, pages = {12--22}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.11.003}, doi = {10.1016/J.JISA.2018.11.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NasirAHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NazerianMN19, author = {Fatemeh Nazerian and Homayun Motameni and Hossein Nematzadeh}, title = {Emergency role-based access control {(E-RBAC)} and analysis of model specifications with alloy}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {131--142}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.01.008}, doi = {10.1016/J.JISA.2019.01.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NazerianMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NesaGB19, author = {Nashreen Nesa and Tania Ghosh and Indrajit Banerjee}, title = {Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {320--328}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.05.017}, doi = {10.1016/J.JISA.2019.05.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NesaGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NunesBRRL19, author = {Matthew Nunes and Pete Burnap and Omer F. Rana and Philipp Reinecke and Kaelon Lloyd}, title = {Getting to the root of the problem: {A} detailed comparison of kernel and user level data for dynamic malware analysis}, journal = {J. Inf. Secur. Appl.}, volume = {48}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102365}, doi = {10.1016/J.JISA.2019.102365}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NunesBRRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Pakniat19, author = {Nasrollah Pakniat}, title = {Designated tester certificateless encryption with keyword search}, journal = {J. Inf. Secur. Appl.}, volume = {49}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.102394}, doi = {10.1016/J.JISA.2019.102394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Pakniat19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatroA19, author = {K. Abhimanyu Kumar Patro and Bibhudendra Acharya}, title = {An efficient colour image encryption scheme based on 1-D chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {23--41}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.02.006}, doi = {10.1016/J.JISA.2019.02.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatroA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.