Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm3.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/0014YXZS014,
  author       = {Yue Zhao and
                  Kenji Yoshigoe and
                  Mengjun Xie and
                  Suijian Zhou and
                  Remzi Seker and
                  Jiang Bian},
  title        = {Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {289--316},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.333},
  doi          = {10.13052/JCSM2245-1439.333},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0014YXZS014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Al-DoskiM14,
  author       = {Lava Al{-}Doski and
                  Seshadri Mohan},
  title        = {A Cached Registration Scheme for {IP} Multimedia Subsystem {(IMS)}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {317--338},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.334},
  doi          = {10.13052/JCSM2245-1439.334},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Al-DoskiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlzahraniSAG14,
  author       = {Abdullah J. Alzahrani and
                  Nataliav Stakhanoa and
                  Hugo Gonzalez and
                  Ali A. Ghorbani},
  title        = {Characterizing Evaluation Practicesof Intrusion Detection Methodsfor
                  Smartphones},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {89--132},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.321},
  doi          = {10.13052/JCSM2245-1439.321},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlzahraniSAG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BaligaBD14,
  author       = {Arati Baliga and
                  Jeffrey Bickford and
                  Neil Daswani},
  title        = {Triton: {A} Carrier-based Approach for Detecting and Mitigating Mobile
                  Malware},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {181--212},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.324},
  doi          = {10.13052/JCSM2245-1439.324},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BaligaBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Balogh14,
  author       = {Stefan Balogh},
  title        = {Memory Acquisition by Using Network Card},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {65--76},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.314},
  doi          = {10.13052/JCSM2245-1439.314},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Balogh14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JermynSZ14,
  author       = {Jill Jermyn and
                  Gabriel Salles{-}Loustau and
                  Saman A. Zonouz},
  title        = {An Analysis of DoS Attack Strategies Against the {LTE} {RAN}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {159--180},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.323},
  doi          = {10.13052/JCSM2245-1439.323},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/JermynSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JurneckaHK14,
  author       = {Peter Jurnecka and
                  Petr Han{\'{a}}cek and
                  Matej Kacic},
  title        = {Code Search API, Base of Parallel Code Refactoring System For Safety
                  Standards Compliance},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {47--66},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.313},
  doi          = {10.13052/JCSM2245-1439.313},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/JurneckaHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Knudsen14,
  author       = {Lars R. Knudsen},
  title        = {Dynamic Encryption},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {357--370},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.341},
  doi          = {10.13052/JCSM2245-1439.341},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Knudsen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KornemannOLF14,
  author       = {Stephan Kornemann and
                  Steffen Ortmann and
                  Peter Langend{\"{o}}rfer and
                  Alexandros G. Fragkiadakis},
  title        = {Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {133--158},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.322},
  doi          = {10.13052/JCSM2245-1439.322},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KornemannOLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KotenkoC14,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Fast Network Attack Modeling and Security Evaluation based on Attack
                  Graphs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {27--46},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.312},
  doi          = {10.13052/JCSM2245-1439.312},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LichtmanR14,
  author       = {Marc Lichtman and
                  Jeffrey H. Reed},
  title        = {Reinforcement Learning for Reactive Jamming Mitigation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {2},
  pages        = {213--230},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.325},
  doi          = {10.13052/JCSM2245-1439.325},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LichtmanR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Lokshina14,
  author       = {Izabella Lokshina},
  title        = {Study on Estimating Buffer Overflow Probabilities in High-Speed Communication
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {399--426},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.343},
  doi          = {10.13052/JCSM2245-1439.343},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Lokshina14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Markowsky14,
  author       = {George Markowsky},
  title        = {The Sad History of Random Bits},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {1--24},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.311},
  doi          = {10.13052/JCSM2245-1439.311},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Markowsky14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MillerGDB14,
  author       = {Cody Miller and
                  Dae Glendowne and
                  David A. Dampier and
                  Kendall Blaylock},
  title        = {Forensicloud: An Architecture for Digital Forensic Analysis in the
                  Cloud},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {231--262},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.331},
  doi          = {10.13052/JCSM2245-1439.331},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MillerGDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NollGFAA14,
  author       = {Josef Noll and
                  I{\~{n}}aki Garitano and
                  Seraj Fayyad and
                  Erik {\AA}sberg and
                  Habtamu Abie},
  title        = {Measurable Security, Privacy and Dependability in Smart Grids},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {4},
  pages        = {371--398},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.342},
  doi          = {10.13052/JCSM2245-1439.342},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NollGFAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PodhradskyLB14,
  author       = {Ashley L. Podhradsky and
                  Larry J. LeBlanc and
                  Michael R. Bartolacci},
  title        = {Personal Denial of Service Attacks {(PDOS)} and Online Misbehavior:
                  The Need for Cyber Ethics and Information Security Education on University
                  Campuses},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {339--356},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.335},
  doi          = {10.13052/JCSM2245-1439.335},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PodhradskyLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PomorovaI14,
  author       = {Oksana V. Pomorova and
                  Dmytro O. Ivanchyshyn},
  title        = {Making Static Code Analysis More Efficient},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {77--88},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.315},
  doi          = {10.13052/JCSM2245-1439.315},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PomorovaI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShenYTPH14,
  author       = {Ju Shen and
                  Jianjun Yang and
                  Sami Taha{-}abusneineh and
                  Bryson Payne and
                  Markus A. Hitz},
  title        = {Structure Preserving Large Imagery Reconstruction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {3},
  pages        = {263--288},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.332},
  doi          = {10.13052/JCSM2245-1439.332},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShenYTPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics