Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm7.bht:"
@article{DBLP:journals/jcsm/ChattopadhyayST18, author = {Ankur Chattopadhyay and Michael J. Schulz and Katie Turkiewicz and Eli Hughes}, title = {A Novel Visual Recognition-basedAuthentication Model Using a Hybrid TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein Online Healthcare}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--46}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.733}, doi = {10.13052/JCSM2245-1439.733}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ChattopadhyayST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/FathimaM18, author = {A. Jainul Fathima and G. Murugaboopathi}, title = {A Novel Customized Big Data Analytics Framework for Drug Discovery}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {145--160}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7111}, doi = {10.13052/JCSM2245-1439.7111}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/FathimaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GeorgeD18, author = {Sam George and K. David}, title = {Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {87--94}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.717}, doi = {10.13052/JCSM2245-1439.717}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GeorgeD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GopalakrishnanV18, author = {Aswin Gopalakrishnan and Emanuele Vineti and Ashok Kumar Mohan and M. Sethumadhavan}, title = {The Art of Piecewise Hashing: {A} StepToward Better Evidence Provability}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {109--130}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.719}, doi = {10.13052/JCSM2245-1439.719}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GopalakrishnanV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GuptaSK18, author = {Sanchit Gupta and Harshit Sharma and Sarvjeet Kaur}, title = {Malware Characterization Using WindowsAPI Call Sequences}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {363--378}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.741}, doi = {10.13052/JCSM2245-1439.741}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/GuptaSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KadirSG18, author = {Andi Fitriah Abdul Kadir and Natalia Stakhanova and Ali A. Ghorbani}, title = {Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--52}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.732}, doi = {10.13052/JCSM2245-1439.732}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KadirSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaratasA18, author = {G{\"{o}}zde Karatas and Akhan Akbulut}, title = {Survey on Access Control Mechanisms in Cloud Computing}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {3}, pages = {1--36}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.731}, doi = {10.13052/JCSM2245-1439.731}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KaratasA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaruppasamyB18, author = {M. Karuppasamy and S. P. Balakannan}, title = {Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {95--108}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.718}, doi = {10.13052/JCSM2245-1439.718}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KaruppasamyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/LeSD18, author = {Dac{-}Nhuong Le and Bijeta Seth and Surjeet Dalal}, title = {A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: {A} Revolutionary Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {379--408}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.742}, doi = {10.13052/JCSM2245-1439.742}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/LeSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MaragatharajanB18, author = {M. Maragatharajan and S. P. Balakannan}, title = {A Secured {MANET} Using Multicast Routing Protocols and Semi Markov Process}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {53--68}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.715}, doi = {10.13052/JCSM2245-1439.715}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MaragatharajanB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RajeswariS18, author = {S. Rajeswari and K. Suthendran}, title = {Chi-Square MapReduce Model for Agricultural Data}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {13--24}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.712}, doi = {10.13052/JCSM2245-1439.712}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RajeswariS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RevathyS18, author = {C. Revathy and G. Sekar}, title = {Analytic Hierarchy Process for ResourceAllocation in Cloud Environment}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {25--38}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.713}, doi = {10.13052/JCSM2245-1439.713}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/RevathyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SebastianS18, author = {A. Sebastian and Shanmugam Sivagurunathan}, title = {Multi DODAGs in {RPL} for Reliable Smart City IoT}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {69--86}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.716}, doi = {10.13052/JCSM2245-1439.716}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SebastianS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SubburajS18, author = {T. Subburaj and K. Suthendran}, title = {DigitalWatering Hole Attack DetectionUsing Sequential Pattern}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {1--12}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.711}, doi = {10.13052/JCSM2245-1439.711}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SubburajS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SureshAMK18, author = {Meenakshi Suresh and P. P. Amritha and Ashok Kumar Mohan and V. Anil Kumar}, title = {An Investigation on {HTTP/2} Security}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {161--189}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7112}, doi = {10.13052/JCSM2245-1439.7112}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SureshAMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SuvarnaP18, author = {B. Suvarna and T. Maruthi Padmaja}, title = {Enhanced Matrix Chain Multiplication}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {4}, pages = {409--420}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.743}, doi = {10.13052/JCSM2245-1439.743}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SuvarnaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ThilagavathiS18, author = {B. Thilagavathi and K. Suthendran}, title = {Boosting Based Implementationof Biometric Authentication in IoT}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {131--144}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.7110}, doi = {10.13052/JCSM2245-1439.7110}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ThilagavathiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YaminiKT18, author = {K. Anish Pon Yamini and Suthendran Kannan and Arivoli Thangadurai}, title = {Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network}, journal = {J. Cyber Secur. Mobil.}, volume = {7}, number = {1-2}, pages = {39--52}, year = {2018}, url = {https://doi.org/10.13052/jcsm2245-1439.714}, doi = {10.13052/JCSM2245-1439.714}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/YaminiKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.