default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr16.bht:"
@article{DBLP:journals/istr/AbbadiM11, author = {Imad M. Abbadi and Andrew P. Martin}, title = {Trust in the Cloud}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {108--114}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.006}, doi = {10.1016/J.ISTR.2011.08.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AbbadiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AhmadMDM11, author = {Zaheer Ahmad and Keith Mayes and Song Dong and Konstantinos Markantonakis}, title = {Considerations for mobile authentication in the Cloud}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {123--130}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.009}, doi = {10.1016/J.ISTR.2011.09.009}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AhmadMDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AtayM11, author = {Serap Atay and Marcelo Masera}, title = {Challenges for the security analysis of Next Generation Networks}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {1}, pages = {3--11}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2010.10.010}, doi = {10.1016/J.ISTR.2010.10.010}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AtayM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CleeffPWT11, author = {Andr{\'{e}} van Cleeff and Wolter Pieters and Roel J. Wieringa and Frits van Tiel}, title = {Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {142--149}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.003}, doi = {10.1016/J.ISTR.2011.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CleeffPWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-KempRW11, author = {Lizzie Coles{-}Kemp and Joseph Reddington and Patricia A. H. Williams}, title = {Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {115--122}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.001}, doi = {10.1016/J.ISTR.2011.09.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-KempRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DoreyL11, author = {Paul G. Dorey and Armando Leite}, title = {Commentary: Cloud computing - {A} security problem or solution?}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {89--96}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.004}, doi = {10.1016/J.ISTR.2011.08.004}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DoreyL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaP11, author = {Gaurav Gupta and Josef Pieprzyk}, title = {Socio-technological phishing prevention}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {67--73}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.003}, doi = {10.1016/J.ISTR.2011.09.003}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaPH11, author = {Gaurav Gupta and Josef Pieprzyk and Len Hamey}, title = {Bucket attack on numeric set watermarking model and safeguards}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {59--66}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.002}, doi = {10.1016/J.ISTR.2011.09.002}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaPH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IslamWY11, author = {Mofakharul Islam and Paul Andrew Watters and John Yearwood}, title = {Real-time detection of children's skin on social networking sites using Markov random field modelling}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {51--58}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.004}, doi = {10.1016/J.ISTR.2011.09.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IslamWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LangS11, author = {Ulrich Lang and Rudolf Schreiner}, title = {Analysis of recommended cloud security controls to validate OpenPMF "policy as a service"}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {131--141}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.001}, doi = {10.1016/J.ISTR.2011.08.001}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MazzarielloLL11, author = {Claudio Mazzariello and Paolo De Lutiis and Dario Lombardo}, title = {Clustering {NGN} user behavior for anomaly detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {1}, pages = {20--28}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2010.10.011}, doi = {10.1016/J.ISTR.2010.10.011}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MazzarielloLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QiE11, author = {Man Qi and Denis Edgar{-}Nevill}, title = {Social networking searching and privacy issues}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {74--78}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.005}, doi = {10.1016/J.ISTR.2011.09.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QiE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QuayleT11, author = {Ethel Quayle and Max Taylor}, title = {Social networking as a nexus for engagement and exploitation of young people}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {44--50}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.006}, doi = {10.1016/J.ISTR.2011.09.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QuayleT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RebahiNMF11, author = {Yacine Rebahi and Mohamed Nassar and Thomas Magedanz and Olivier Festor}, title = {A survey on fraud and service misuse in voice over {IP} (VoIP) networks}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {1}, pages = {12--19}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2010.10.012}, doi = {10.1016/J.ISTR.2010.10.012}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RebahiNMF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Teneyuca11, author = {David Teneyuca}, title = {Internet cloud security: The illusion of inclusion}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {102--107}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.005}, doi = {10.1016/J.ISTR.2011.08.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Teneyuca11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Watters11, author = {Paul A. Watters}, title = {Social networking threats}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {37}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.007}, doi = {10.1016/J.ISTR.2011.09.007}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Watters11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WattersLD11, author = {Paul Andrew Watters and Robert Layton and Richard Dazeley}, title = {How much material on BitTorrent is infringing content? {A} case study}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {79--87}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.10.001}, doi = {10.1016/J.ISTR.2011.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WattersLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WeirTS11, author = {George R. S. Weir and Fergus Toolan and Duncan N. Smeed}, title = {The threats of social networking: Old wine in new bottles?}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {2}, pages = {38--43}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.09.008}, doi = {10.1016/J.ISTR.2011.09.008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WeirTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wilson11, author = {Piers Wilson}, title = {Positive perspectives on cloud security}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {3-4}, pages = {97--101}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.08.002}, doi = {10.1016/J.ISTR.2011.08.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Wilson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wolthusen11, author = {Stephen D. Wolthusen}, title = {Next generation networks}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.07.001}, doi = {10.1016/J.ISTR.2011.07.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Wolthusen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangR11, author = {Ge Zhang and Yacine Rebahi}, title = {Side effects of identity management in {SIP} VoIP environment}, journal = {Inf. Secur. Tech. Rep.}, volume = {16}, number = {1}, pages = {29--35}, year = {2011}, url = {https://doi.org/10.1016/j.istr.2011.07.002}, doi = {10.1016/J.ISTR.2011.07.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.