Search dblp for Publications

export results for "toc:db/journals/ijsppc/ijsppc12.bht:"

 download as .bib file

@article{DBLP:journals/ijsppc/AdhikaryBKD20,
  author       = {Kaushik Adhikary and
                  Shashi Bhushan and
                  Sunil Kumar and
                  Kamlesh Dutta},
  title        = {Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {1--18},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100101},
  doi          = {10.4018/IJSPPC.2020100101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AdhikaryBKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/AggarwalDS20,
  author       = {Alankrita Aggarwal and
                  Kanwalvir Singh Dhindsa and
                  P. K. Suri},
  title        = {Design for Software Risk Management Using Soft Computing and Simulated
                  Biological Approach},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {44--54},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040104},
  doi          = {10.4018/IJSPPC.2020040104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/AggarwalDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/BajajP20,
  author       = {Divij Bajaj and
                  Dhanya Pramod},
  title        = {Conversational System, Intelligent Virtual Assistant {(IVA)} Named
                  {DIVA} Using Raspberry Pi},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {38--52},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100104},
  doi          = {10.4018/IJSPPC.2020100104},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/BajajP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ChathaAK20,
  author       = {Deepak Chatha and
                  Alankrita Aggarwal and
                  Rajender Kumar},
  title        = {Comparative Analysis of Proposed Artificial Neural Network {(ANN)}
                  Algorithm With Other Techniques},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {29--35},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010103},
  doi          = {10.4018/IJSPPC.2020010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ChathaAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/FatnassiGB20,
  author       = {Ahlem Fatnassi and
                  Hamza Gharsellaoui and
                  Sadok Bouamama},
  title        = {New Hybrid Proposed Solution for Video Steganography Based on Clustering
                  Algorithm},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {30--43},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040103},
  doi          = {10.4018/IJSPPC.2020040103},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/FatnassiGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Gahlawat20,
  author       = {Monica Gahlawat},
  title        = {Survey of Online Identity Management Techniques on Blockchain},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {19--28},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100102},
  doi          = {10.4018/IJSPPC.2020100102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Gahlawat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/GaoW20,
  author       = {Terry Gao and
                  Grace Ying Wang},
  title        = {Brain Signal Classification Based on Deep {CNN}},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {17--29},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040102},
  doi          = {10.4018/IJSPPC.2020040102},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/GaoW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/IdoughiA20,
  author       = {Djilali Idoughi and
                  Djeddi Abdelhakim},
  title        = {A User Centered Model Driven Service Oriented Ubiquitous Government
                  Design Approach},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {17--28},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010102},
  doi          = {10.4018/IJSPPC.2020010102},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/IdoughiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KKM20,
  author       = {Vijayaprabakaran K. and
                  Sathiyamurthy K. and
                  Ponniamma M.},
  title        = {Video-Based Human Activity Recognition for Elderly Using Convolutional
                  Neural Network},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {36--48},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010104},
  doi          = {10.4018/IJSPPC.2020010104},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/KandpalP20,
  author       = {Meetu Kandpal and
                  Kalyani Ashesh Patel},
  title        = {Evaluation of the Dynamic Pricing Model in Cloud},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {20--29},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070102},
  doi          = {10.4018/IJSPPC.2020070102},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/KandpalP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/NC20,
  author       = {Divyabharathi D. N. and
                  Nagaraj G. Cholli},
  title        = {A Review on Identity and Access Management Server (KeyCloak)},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {46--53},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070104},
  doi          = {10.4018/IJSPPC.2020070104},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/NC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ReddyC20,
  author       = {G. Sekhar Reddy and
                  Suneetha Chittineni},
  title        = {UML-Based Data Warehouse Design Using Temporal Dimensional Modelling},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070101},
  doi          = {10.4018/IJSPPC.2020070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ReddyC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Shawky20,
  author       = {Negm Eldin Mohamed Shawky},
  title        = {Accuracy Enhancement of {GPS} for Tracking Multiple Drones Based on
                  {MCMC} Particle Filter},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {1},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020010101},
  doi          = {10.4018/IJSPPC.2020010101},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Shawky20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/VermaP20,
  author       = {Nidhi Nigam Verma and
                  Deepika Pathak},
  title        = {Linear Regression on Internet Banking Adoption Dataset Using {WEKA}},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {4},
  pages        = {29--37},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020100103},
  doi          = {10.4018/IJSPPC.2020100103},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/VermaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/Xu20,
  author       = {Li Xu},
  title        = {Research on Ant Colony Optimization With Tabu Search Ability},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {2},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020040101},
  doi          = {10.4018/IJSPPC.2020040101},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsppc/Xu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsppc/ZhaiF20,
  author       = {Weifang Zhai and
                  Juan Feng},
  title        = {Research on Root Locus Correction Algorithm in Automatic Control System},
  journal      = {Int. J. Secur. Priv. Pervasive Comput.},
  volume       = {12},
  number       = {3},
  pages        = {30--45},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsppc.2020070103},
  doi          = {10.4018/IJSPPC.2020070103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsppc/ZhaiF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics