Search dblp for Publications

export results for "toc:db/journals/ijics/ijics18.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Amraoui22,
  author       = {Asma Amraoui},
  title        = {On a secured channel selection in cognitive radio networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {262--277},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050307},
  doi          = {10.1504/IJICS.2022.10050307},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Amraoui22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BadhaniM22,
  author       = {Shikha Badhani and
                  Sunil Kumar Muttoo},
  title        = {GENDroid - a graph-based ensemble classifier for detecting Android
                  malware},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {327--347},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10046938},
  doi          = {10.1504/IJICS.2022.10046938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BadhaniM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhandeB22,
  author       = {Premala Bhande and
                  Mohammed Bakhar},
  title        = {Enhanced ant colony-based {AODV} for analysis of black and gray hole
                  attacks in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {133--147},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122916},
  doi          = {10.1504/IJICS.2022.122916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhandeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ByamukamaN22,
  author       = {Duncan{-}Allan Byamukama and
                  John Ngubiri},
  title        = {DDoS amplification attacks and impacts on enterprise service-oriented
                  network infrastructures: {DNS} servers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {105--132},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122915},
  doi          = {10.1504/IJICS.2022.122915},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ByamukamaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChanderG22,
  author       = {Bhanu Chander and
                  Kumaravelan Gopalakrishnan},
  title        = {{RFID} tag-based mutual authentication protocol with improved security
                  for {TMIS}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {383--405},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10042827},
  doi          = {10.1504/IJICS.2022.10042827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChanderG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DammakGSG22,
  author       = {Salma Dammak and
                  Faiza Ghozzi and
                  Asma Sellami and
                  Fa{\"{\i}}ez Gargouri},
  title        = {Managing vulnerabilities during the development of a secure {ETL}
                  processes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {75--104},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122914},
  doi          = {10.1504/IJICS.2022.122914},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DammakGSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GaoZZW22,
  author       = {Jianqing Gao and
                  Haiyang Zou and
                  Fuquan Zhang and
                  Tsu{-}Yang Wu},
  title        = {An intelligent stage light-based actor identification and positioning
                  system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {204--218},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122920},
  doi          = {10.1504/IJICS.2022.122920},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GaoZZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeCC22,
  author       = {Gang Ke and
                  Ruey{-}Shun Chen and
                  Yeh{-}Cheng Chen},
  title        = {Research on intrusion detection method based on {SMOTE} and {DBN-LSSVM}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {300--312},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050309},
  doi          = {10.1504/IJICS.2022.10050309},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeCJY22,
  author       = {Gang Ke and
                  Ruey{-}Shun Chen and
                  Shanshan Ji and
                  Jyh{-}haw Yeh},
  title        = {Network traffic prediction based on least squares support vector machine
                  with simple estimation of Gaussian kernel width},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {1--11},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122910},
  doi          = {10.1504/IJICS.2022.122910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeCJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KisoreK22,
  author       = {N. Raghu Kisore and
                  K. Shiva Kumar},
  title        = {{FFRR:} a software diversity technique for defending against buffer
                  overflow attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {40--74},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122913},
  doi          = {10.1504/IJICS.2022.122913},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KisoreK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MistryGJ22,
  author       = {Nilay R. Mistry and
                  Krupa Gajjar and
                  S. O. Junare},
  title        = {Volatile memory forensics of privacy aware browsers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {313--326},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2020.10047607},
  doi          = {10.1504/IJICS.2020.10047607},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MistryGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NabouLO22,
  author       = {Abdellah Nabou and
                  My Driss Laanaoui and
                  Mohammed Ouzzif},
  title        = {Effect of black hole attack in different mobility models of {MANET}
                  using {OLSR} protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {219--235},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122921},
  doi          = {10.1504/IJICS.2022.122921},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NabouLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatilP22,
  author       = {Shravani Mahesh Patil and
                  B. R. Purushothama},
  title        = {{QC-PRE:} quorum controlled proxy re-encryption scheme for access
                  control enforcement delegation of outsourced data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {165--192},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122918},
  doi          = {10.1504/IJICS.2022.122918},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatilP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaniV22,
  author       = {S. Jamuna Rani and
                  S. Vagdevi},
  title        = {Auto-encoder-based technique for effective detection of frauds in
                  social networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {348--364},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10045346},
  doi          = {10.1504/IJICS.2022.10045346},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaniV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ReddyBG22,
  author       = {Punugu Vasudeva Reddy and
                  A. Ramesh Babu and
                  N. B. Gayathri},
  title        = {Pairing-based strong key-insulated signature scheme},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {148--164},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122917},
  doi          = {10.1504/IJICS.2022.122917},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/ReddyBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RenWZ22,
  author       = {Min Ren and
                  Zhihao Wang and
                  Peiying Zhao},
  title        = {A feature selection method based on neighbourhood rough set and genetic
                  algorithm for intrusion detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {278--299},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050308},
  doi          = {10.1504/IJICS.2022.10050308},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RenWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShanmugamR22,
  author       = {Dillibabu Shanmugam and
                  Jothi Rangasamy},
  title        = {Robust message authentication in the context of quantum key distribution},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {365--382},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10044643},
  doi          = {10.1504/IJICS.2022.10044643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShanmugamR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZ22,
  author       = {Jaryn Shen and
                  Qingkai Zeng},
  title        = {The count-min sketch is vulnerable to offline password-guessing attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {27--39},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122912},
  doi          = {10.1504/IJICS.2022.122912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThiteN22,
  author       = {Sandip Thite and
                  J. NaveenKumar},
  title        = {SecureAuthKey: design and evaluation of a lightweight key agreement
                  technique for smart home applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {406--424},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10042826},
  doi          = {10.1504/IJICS.2022.10042826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThiteN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TiCW22,
  author       = {Yen{-}Wu Ti and
                  Shang{-}Kuan Chen and
                  Wen{-}Cheng Wang},
  title        = {A hierarchical particle swarm optimisation algorithm for cloud computing
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {12--26},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122911},
  doi          = {10.1504/IJICS.2022.122911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TiCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TingGL22,
  author       = {Grace C.{-}W. Ting and
                  Bok{-}Min Goi and
                  Sze Wei Lee},
  title        = {Robustness attack on copyright protection scheme for {H.264/AVC} and
                  {SVC}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {1/2},
  pages        = {193--203},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.122919},
  doi          = {10.1504/IJICS.2022.122919},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TingGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangYWJ22,
  author       = {Mingyue Wang and
                  Shen Yan and
                  Wei Wang and
                  Jiwu Jing},
  title        = {Secure zero-effort two-factor authentication based on time-frequency
                  audio analysis},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {18},
  number       = {3/4},
  pages        = {237--261},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICS.2022.10050306},
  doi          = {10.1504/IJICS.2022.10050306},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangYWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics