![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsppc/ijsppc12.bht:"
@article{DBLP:journals/ijsppc/AdhikaryBKD20, author = {Kaushik Adhikary and Shashi Bhushan and Sunil Kumar and Kamlesh Dutta}, title = {Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {1--18}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100101}, doi = {10.4018/IJSPPC.2020100101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AdhikaryBKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/AggarwalDS20, author = {Alankrita Aggarwal and Kanwalvir Singh Dhindsa and P. K. Suri}, title = {Design for Software Risk Management Using Soft Computing and Simulated Biological Approach}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {44--54}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040104}, doi = {10.4018/IJSPPC.2020040104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/AggarwalDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/BajajP20, author = {Divij Bajaj and Dhanya Pramod}, title = {Conversational System, Intelligent Virtual Assistant {(IVA)} Named {DIVA} Using Raspberry Pi}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {38--52}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100104}, doi = {10.4018/IJSPPC.2020100104}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/BajajP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ChathaAK20, author = {Deepak Chatha and Alankrita Aggarwal and Rajender Kumar}, title = {Comparative Analysis of Proposed Artificial Neural Network {(ANN)} Algorithm With Other Techniques}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {29--35}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010103}, doi = {10.4018/IJSPPC.2020010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ChathaAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/FatnassiGB20, author = {Ahlem Fatnassi and Hamza Gharsellaoui and Sadok Bouamama}, title = {New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {30--43}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040103}, doi = {10.4018/IJSPPC.2020040103}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/FatnassiGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Gahlawat20, author = {Monica Gahlawat}, title = {Survey of Online Identity Management Techniques on Blockchain}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {19--28}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100102}, doi = {10.4018/IJSPPC.2020100102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Gahlawat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/GaoW20, author = {Terry Gao and Grace Ying Wang}, title = {Brain Signal Classification Based on Deep {CNN}}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {17--29}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040102}, doi = {10.4018/IJSPPC.2020040102}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/GaoW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/IdoughiA20, author = {Djilali Idoughi and Djeddi Abdelhakim}, title = {A User Centered Model Driven Service Oriented Ubiquitous Government Design Approach}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {17--28}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010102}, doi = {10.4018/IJSPPC.2020010102}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/IdoughiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KKM20, author = {Vijayaprabakaran K. and Sathiyamurthy K. and Ponniamma M.}, title = {Video-Based Human Activity Recognition for Elderly Using Convolutional Neural Network}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {36--48}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010104}, doi = {10.4018/IJSPPC.2020010104}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/KandpalP20, author = {Meetu Kandpal and Kalyani Ashesh Patel}, title = {Evaluation of the Dynamic Pricing Model in Cloud}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {20--29}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070102}, doi = {10.4018/IJSPPC.2020070102}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/KandpalP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/NC20, author = {Divyabharathi D. N. and Nagaraj G. Cholli}, title = {A Review on Identity and Access Management Server (KeyCloak)}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {46--53}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070104}, doi = {10.4018/IJSPPC.2020070104}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/NC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ReddyC20, author = {G. Sekhar Reddy and Suneetha Chittineni}, title = {UML-Based Data Warehouse Design Using Temporal Dimensional Modelling}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070101}, doi = {10.4018/IJSPPC.2020070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ReddyC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Shawky20, author = {Negm Eldin Mohamed Shawky}, title = {Accuracy Enhancement of {GPS} for Tracking Multiple Drones Based on {MCMC} Particle Filter}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020010101}, doi = {10.4018/IJSPPC.2020010101}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Shawky20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/VermaP20, author = {Nidhi Nigam Verma and Deepika Pathak}, title = {Linear Regression on Internet Banking Adoption Dataset Using {WEKA}}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {4}, pages = {29--37}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020100103}, doi = {10.4018/IJSPPC.2020100103}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/VermaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/Xu20, author = {Li Xu}, title = {Research on Ant Colony Optimization With Tabu Search Ability}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {2}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020040101}, doi = {10.4018/IJSPPC.2020040101}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsppc/Xu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsppc/ZhaiF20, author = {Weifang Zhai and Juan Feng}, title = {Research on Root Locus Correction Algorithm in Automatic Control System}, journal = {Int. J. Secur. Priv. Pervasive Comput.}, volume = {12}, number = {3}, pages = {30--45}, year = {2020}, url = {https://doi.org/10.4018/ijsppc.2020070103}, doi = {10.4018/IJSPPC.2020070103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsppc/ZhaiF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.