Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijtmcc/ijtmcc1.bht:"
@article{DBLP:journals/ijtmcc/BabuPJ13, author = {Korra Sathya Babu and Rajesh Pillelli and Sanjay Kumar Jena}, title = {Enhanced t-closeness for balancing utility and privacy}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {230--242}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056427}, doi = {10.1504/IJTMCC.2013.056427}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/BabuPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/BalarengaduraiS13, author = {C. Balarengadurai and S. Saraswathi}, title = {Fuzzy logic-based detection of DDoS attacks in {IEEE} 802.15.4 low rate wireless personal area network}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {243--260}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056424}, doi = {10.1504/IJTMCC.2013.056424}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/BalarengaduraiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/BediAS13, author = {Punam Bedi and V. Aakanksha and Richa Sharma}, title = {Trust and context view-based knowledge sharing in MANets}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {85--103}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052527}, doi = {10.1504/IJTMCC.2013.052527}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/BediAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/CambiasoPCA13, author = {Enrico Cambiaso and Gianluca Papaleo and Giovanni Chiola and Maurizio Aiello}, title = {Slow DoS attacks: definition and categorisation}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {300--319}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056440}, doi = {10.1504/IJTMCC.2013.056440}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/CambiasoPCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/ChakrabortyJB13, author = {Soumendu Chakraborty and Anand Singh Jalal and Charul Bhatnagar}, title = {An efficient bit plane {X-OR} algorithm for irreversible image steganography}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {2}, pages = {140--155}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.053263}, doi = {10.1504/IJTMCC.2013.053263}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/ChakrabortyJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/DuttK13, author = {Varun Dutt and Amanjot Kaur}, title = {Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {261--273}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056428}, doi = {10.1504/IJTMCC.2013.056428}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/DuttK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/GaoPLLL13, author = {Ying Gao and Lingxi Peng and Fufang Li and Miao Liu and Waixi Liu}, title = {Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {200--211}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056430}, doi = {10.1504/IJTMCC.2013.056430}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/GaoPLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/KherouaMM13, author = {Leila Kheroua and Samira Moussaoui and Louiza Mansour}, title = {{EDARD:} efficient data access based on rumour dissemination in wireless sensor networks}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {73--84}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052526}, doi = {10.1504/IJTMCC.2013.052526}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/KherouaMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/KonorskiPKKCS13, author = {Jerzy Konorski and Piotr Pacyna and Grzegorz Kolaczek and Zbigniew Kotulski and Krzysztof Cabaj and Pawel Szalachowski}, title = {Theory and implementation of a virtualisation level Future Internet defence in depth architecture}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {274--299}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056431}, doi = {10.1504/IJTMCC.2013.056431}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/KonorskiPKKCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/KumarAT13, author = {K. Senthil Kumar and Debi Prasanna Acharjya and Arunkumar Thangavelu}, title = {Trust evaluation using fuzzy proximity relation with ordering for {MANET}}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {2}, pages = {105--120}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.053259}, doi = {10.1504/IJTMCC.2013.053259}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/KumarAT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/NepalPBS13, author = {Surya Nepal and C{\'{e}}cile Paris and Sanat Kumar Bista and Wanita Sherchan}, title = {A trust model-based analysis of social networks}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {3--22}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052522}, doi = {10.1504/IJTMCC.2013.052522}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/NepalPBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/NusratV13, author = {Sabrina Nusrat and Julita Vassileva}, title = {Simulating a trust-based service recommender system for decentralised user modelling environment}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {2}, pages = {121--139}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.053262}, doi = {10.1504/IJTMCC.2013.053262}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/NusratV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/OdeluDG13, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {A novel linear polynomial-based dynamic key management scheme for hierarchical access control}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {2}, pages = {156--174}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.053278}, doi = {10.1504/IJTMCC.2013.053278}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/OdeluDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/PearsonW13, author = {Siani Pearson and Nick Wainwright}, title = {An interdisciplinary approach to accountability for future internet service provision}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {52--72}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052524}, doi = {10.1504/IJTMCC.2013.052524}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/PearsonW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/PurushothamaA13, author = {B. R. Purushothama and B. B. Amberker}, title = {Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {2}, pages = {175--198}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.053279}, doi = {10.1504/IJTMCC.2013.053279}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/PurushothamaA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/RizkGM13, author = {Rawya Rizk and Marwa Gamal and Mahmoud Mariee}, title = {Selective opportunistic routing based on QoS in wireless mesh network}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {212--229}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056425}, doi = {10.1504/IJTMCC.2013.056425}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/RizkGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/SainiAMK13, author = {Mukesh Kumar Saini and Pradeep K. Atrey and Sharad Mehrotra and Mohan S. Kankanhalli}, title = {Privacy aware publication of surveillance video}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {1}, pages = {23--51}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.052523}, doi = {10.1504/IJTMCC.2013.052523}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/SainiAMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/ZebbaneCB13, author = {Bahia Zebbane and Manel Chenait and Nadjib Badache}, title = {{GTC:} a geographical topology control protocol to conserve energy in wireless sensor networks}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {320--340}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056446}, doi = {10.1504/IJTMCC.2013.056446}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/ZebbaneCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.