Search dblp for Publications

export results for "toc:db/journals/istr/istr16.bht:"

 download as .bib file

@article{DBLP:journals/istr/AbbadiM11,
  author       = {Imad M. Abbadi and
                  Andrew P. Martin},
  title        = {Trust in the Cloud},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {108--114},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.006},
  doi          = {10.1016/J.ISTR.2011.08.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AbbadiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadMDM11,
  author       = {Zaheer Ahmad and
                  Keith Mayes and
                  Song Dong and
                  Konstantinos Markantonakis},
  title        = {Considerations for mobile authentication in the Cloud},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {123--130},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.009},
  doi          = {10.1016/J.ISTR.2011.09.009},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadMDM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AtayM11,
  author       = {Serap Atay and
                  Marcelo Masera},
  title        = {Challenges for the security analysis of Next Generation Networks},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {1},
  pages        = {3--11},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2010.10.010},
  doi          = {10.1016/J.ISTR.2010.10.010},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AtayM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CleeffPWT11,
  author       = {Andr{\'{e}} van Cleeff and
                  Wolter Pieters and
                  Roel J. Wieringa and
                  Frits van Tiel},
  title        = {Integrated assessment and mitigation of physical and digital security
                  threats: Case studies on virtualization},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {142--149},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.003},
  doi          = {10.1016/J.ISTR.2011.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CleeffPWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Coles-KempRW11,
  author       = {Lizzie Coles{-}Kemp and
                  Joseph Reddington and
                  Patricia A. H. Williams},
  title        = {Looking at clouds from both sides: The advantages and disadvantages
                  of placing personal narratives in the cloud},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {115--122},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.001},
  doi          = {10.1016/J.ISTR.2011.09.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Coles-KempRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DoreyL11,
  author       = {Paul G. Dorey and
                  Armando Leite},
  title        = {Commentary: Cloud computing - {A} security problem or solution?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {89--96},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.004},
  doi          = {10.1016/J.ISTR.2011.08.004},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DoreyL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaP11,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  title        = {Socio-technological phishing prevention},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {67--73},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.003},
  doi          = {10.1016/J.ISTR.2011.09.003},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaPH11,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk and
                  Len Hamey},
  title        = {Bucket attack on numeric set watermarking model and safeguards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {59--66},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.002},
  doi          = {10.1016/J.ISTR.2011.09.002},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaPH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IslamWY11,
  author       = {Mofakharul Islam and
                  Paul Andrew Watters and
                  John Yearwood},
  title        = {Real-time detection of children's skin on social networking sites
                  using Markov random field modelling},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {51--58},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.004},
  doi          = {10.1016/J.ISTR.2011.09.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IslamWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LangS11,
  author       = {Ulrich Lang and
                  Rudolf Schreiner},
  title        = {Analysis of recommended cloud security controls to validate OpenPMF
                  "policy as a service"},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {131--141},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.001},
  doi          = {10.1016/J.ISTR.2011.08.001},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MazzarielloLL11,
  author       = {Claudio Mazzariello and
                  Paolo De Lutiis and
                  Dario Lombardo},
  title        = {Clustering {NGN} user behavior for anomaly detection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {1},
  pages        = {20--28},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2010.10.011},
  doi          = {10.1016/J.ISTR.2010.10.011},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MazzarielloLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QiE11,
  author       = {Man Qi and
                  Denis Edgar{-}Nevill},
  title        = {Social networking searching and privacy issues},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {74--78},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.005},
  doi          = {10.1016/J.ISTR.2011.09.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QiE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QuayleT11,
  author       = {Ethel Quayle and
                  Max Taylor},
  title        = {Social networking as a nexus for engagement and exploitation of young
                  people},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {44--50},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.006},
  doi          = {10.1016/J.ISTR.2011.09.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QuayleT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RebahiNMF11,
  author       = {Yacine Rebahi and
                  Mohamed Nassar and
                  Thomas Magedanz and
                  Olivier Festor},
  title        = {A survey on fraud and service misuse in voice over {IP} (VoIP) networks},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {1},
  pages        = {12--19},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2010.10.012},
  doi          = {10.1016/J.ISTR.2010.10.012},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RebahiNMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Teneyuca11,
  author       = {David Teneyuca},
  title        = {Internet cloud security: The illusion of inclusion},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {102--107},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.005},
  doi          = {10.1016/J.ISTR.2011.08.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Teneyuca11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Watters11,
  author       = {Paul A. Watters},
  title        = {Social networking threats},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {37},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.007},
  doi          = {10.1016/J.ISTR.2011.09.007},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Watters11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WattersLD11,
  author       = {Paul Andrew Watters and
                  Robert Layton and
                  Richard Dazeley},
  title        = {How much material on BitTorrent is infringing content? {A} case study},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {79--87},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.10.001},
  doi          = {10.1016/J.ISTR.2011.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WattersLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WeirTS11,
  author       = {George R. S. Weir and
                  Fergus Toolan and
                  Duncan N. Smeed},
  title        = {The threats of social networking: Old wine in new bottles?},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {2},
  pages        = {38--43},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.09.008},
  doi          = {10.1016/J.ISTR.2011.09.008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WeirTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wilson11,
  author       = {Piers Wilson},
  title        = {Positive perspectives on cloud security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {3-4},
  pages        = {97--101},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.08.002},
  doi          = {10.1016/J.ISTR.2011.08.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Wilson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wolthusen11,
  author       = {Stephen D. Wolthusen},
  title        = {Next generation networks},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.07.001},
  doi          = {10.1016/J.ISTR.2011.07.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Wolthusen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangR11,
  author       = {Ge Zhang and
                  Yacine Rebahi},
  title        = {Side effects of identity management in {SIP} VoIP environment},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {16},
  number       = {1},
  pages        = {29--35},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.istr.2011.07.002},
  doi          = {10.1016/J.ISTR.2011.07.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}