![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm3.bht:"
@article{DBLP:journals/jcsm/0014YXZS014, author = {Yue Zhao and Kenji Yoshigoe and Mengjun Xie and Suijian Zhou and Remzi Seker and Jiang Bian}, title = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {289--316}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.333}, doi = {10.13052/JCSM2245-1439.333}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Al-DoskiM14, author = {Lava Al{-}Doski and Seshadri Mohan}, title = {A Cached Registration Scheme for {IP} Multimedia Subsystem {(IMS)}}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {317--338}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.334}, doi = {10.13052/JCSM2245-1439.334}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Al-DoskiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlzahraniSAG14, author = {Abdullah J. Alzahrani and Nataliav Stakhanoa and Hugo Gonzalez and Ali A. Ghorbani}, title = {Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {89--132}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.321}, doi = {10.13052/JCSM2245-1439.321}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/AlzahraniSAG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BaligaBD14, author = {Arati Baliga and Jeffrey Bickford and Neil Daswani}, title = {Triton: {A} Carrier-based Approach for Detecting and Mitigating Mobile Malware}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {181--212}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.324}, doi = {10.13052/JCSM2245-1439.324}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BaligaBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Balogh14, author = {Stefan Balogh}, title = {Memory Acquisition by Using Network Card}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {65--76}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.314}, doi = {10.13052/JCSM2245-1439.314}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Balogh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JermynSZ14, author = {Jill Jermyn and Gabriel Salles{-}Loustau and Saman A. Zonouz}, title = {An Analysis of DoS Attack Strategies Against the {LTE} {RAN}}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {159--180}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.323}, doi = {10.13052/JCSM2245-1439.323}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/JermynSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JurneckaHK14, author = {Peter Jurnecka and Petr Han{\'{a}}cek and Matej Kacic}, title = {Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {47--66}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.313}, doi = {10.13052/JCSM2245-1439.313}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/JurneckaHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Knudsen14, author = {Lars R. Knudsen}, title = {Dynamic Encryption}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {357--370}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.341}, doi = {10.13052/JCSM2245-1439.341}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KornemannOLF14, author = {Stephan Kornemann and Steffen Ortmann and Peter Langend{\"{o}}rfer and Alexandros G. Fragkiadakis}, title = {Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {133--158}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.322}, doi = {10.13052/JCSM2245-1439.322}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KornemannOLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KotenkoC14, author = {Igor V. Kotenko and Andrey Chechulin}, title = {Fast Network Attack Modeling and Security Evaluation based on Attack Graphs}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {27--46}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.312}, doi = {10.13052/JCSM2245-1439.312}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LichtmanR14, author = {Marc Lichtman and Jeffrey H. Reed}, title = {Reinforcement Learning for Reactive Jamming Mitigation}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {2}, pages = {213--230}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.325}, doi = {10.13052/JCSM2245-1439.325}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LichtmanR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Lokshina14, author = {Izabella Lokshina}, title = {Study on Estimating Buffer Overflow Probabilities in High-Speed Communication Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {399--426}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.343}, doi = {10.13052/JCSM2245-1439.343}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Lokshina14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Markowsky14, author = {George Markowsky}, title = {The Sad History of Random Bits}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {1--24}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.311}, doi = {10.13052/JCSM2245-1439.311}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Markowsky14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MillerGDB14, author = {Cody Miller and Dae Glendowne and David A. Dampier and Kendall Blaylock}, title = {Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {231--262}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.331}, doi = {10.13052/JCSM2245-1439.331}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MillerGDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NollGFAA14, author = {Josef Noll and I{\~{n}}aki Garitano and Seraj Fayyad and Erik {\AA}sberg and Habtamu Abie}, title = {Measurable Security, Privacy and Dependability in Smart Grids}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {4}, pages = {371--398}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.342}, doi = {10.13052/JCSM2245-1439.342}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NollGFAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PodhradskyLB14, author = {Ashley L. Podhradsky and Larry J. LeBlanc and Michael R. Bartolacci}, title = {Personal Denial of Service Attacks {(PDOS)} and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {339--356}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.335}, doi = {10.13052/JCSM2245-1439.335}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PodhradskyLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PomorovaI14, author = {Oksana V. Pomorova and Dmytro O. Ivanchyshyn}, title = {Making Static Code Analysis More Efficient}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {77--88}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.315}, doi = {10.13052/JCSM2245-1439.315}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PomorovaI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShenYTPH14, author = {Ju Shen and Jianjun Yang and Sami Taha{-}abusneineh and Bryson Payne and Markus A. Hitz}, title = {Structure Preserving Large Imagery Reconstruction}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {3}, pages = {263--288}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.332}, doi = {10.13052/JCSM2245-1439.332}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShenYTPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.