Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm7.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/ChattopadhyayST18,
  author       = {Ankur Chattopadhyay and
                  Michael J. Schulz and
                  Katie Turkiewicz and
                  Eli Hughes},
  title        = {A Novel Visual Recognition-basedAuthentication Model Using a Hybrid
                  TrustTheme to Verify Provider Profilesfor Enhancing Information Assurancein
                  Online Healthcare},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--46},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.733},
  doi          = {10.13052/JCSM2245-1439.733},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChattopadhyayST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/FathimaM18,
  author       = {A. Jainul Fathima and
                  G. Murugaboopathi},
  title        = {A Novel Customized Big Data Analytics Framework for Drug Discovery},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {145--160},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7111},
  doi          = {10.13052/JCSM2245-1439.7111},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/FathimaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GeorgeD18,
  author       = {Sam George and
                  K. David},
  title        = {Security Strategies for Safe Dataand Content Access in OperationalModules
                  of Product DataManagement Software},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {87--94},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.717},
  doi          = {10.13052/JCSM2245-1439.717},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GeorgeD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GopalakrishnanV18,
  author       = {Aswin Gopalakrishnan and
                  Emanuele Vineti and
                  Ashok Kumar Mohan and
                  M. Sethumadhavan},
  title        = {The Art of Piecewise Hashing: {A} StepToward Better Evidence Provability},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {109--130},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.719},
  doi          = {10.13052/JCSM2245-1439.719},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GopalakrishnanV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GuptaSK18,
  author       = {Sanchit Gupta and
                  Harshit Sharma and
                  Sarvjeet Kaur},
  title        = {Malware Characterization Using WindowsAPI Call Sequences},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {363--378},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.741},
  doi          = {10.13052/JCSM2245-1439.741},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/GuptaSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KadirSG18,
  author       = {Andi Fitriah Abdul Kadir and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Understanding Android Financial MalwareAttacks: Taxonomy, Characterization,
                  and Challenges},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--52},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.732},
  doi          = {10.13052/JCSM2245-1439.732},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KadirSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaratasA18,
  author       = {G{\"{o}}zde Karatas and
                  Akhan Akbulut},
  title        = {Survey on Access Control Mechanisms in Cloud Computing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--36},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.731},
  doi          = {10.13052/JCSM2245-1439.731},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaratasA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaruppasamyB18,
  author       = {M. Karuppasamy and
                  S. P. Balakannan},
  title        = {Energy Saving from Cloud Resourcesfor a Sustainable Green Cloud ComputingEnvironment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {95--108},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.718},
  doi          = {10.13052/JCSM2245-1439.718},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaruppasamyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/LeSD18,
  author       = {Dac{-}Nhuong Le and
                  Bijeta Seth and
                  Surjeet Dalal},
  title        = {A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin
                  Cloud Environment for SecuringOutsourced Medical Database: {A} Revolutionary
                  Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {379--408},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.742},
  doi          = {10.13052/JCSM2245-1439.742},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/LeSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MaragatharajanB18,
  author       = {M. Maragatharajan and
                  S. P. Balakannan},
  title        = {A Secured {MANET} Using Multicast Routing Protocols and Semi Markov
                  Process},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {53--68},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.715},
  doi          = {10.13052/JCSM2245-1439.715},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MaragatharajanB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RajeswariS18,
  author       = {S. Rajeswari and
                  K. Suthendran},
  title        = {Chi-Square MapReduce Model for Agricultural Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {13--24},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.712},
  doi          = {10.13052/JCSM2245-1439.712},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RajeswariS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RevathyS18,
  author       = {C. Revathy and
                  G. Sekar},
  title        = {Analytic Hierarchy Process for ResourceAllocation in Cloud Environment},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {25--38},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.713},
  doi          = {10.13052/JCSM2245-1439.713},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/RevathyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SebastianS18,
  author       = {A. Sebastian and
                  Shanmugam Sivagurunathan},
  title        = {Multi DODAGs in {RPL} for Reliable Smart City IoT},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {69--86},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.716},
  doi          = {10.13052/JCSM2245-1439.716},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SebastianS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SubburajS18,
  author       = {T. Subburaj and
                  K. Suthendran},
  title        = {DigitalWatering Hole Attack DetectionUsing Sequential Pattern},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {1--12},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.711},
  doi          = {10.13052/JCSM2245-1439.711},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SubburajS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SureshAMK18,
  author       = {Meenakshi Suresh and
                  P. P. Amritha and
                  Ashok Kumar Mohan and
                  V. Anil Kumar},
  title        = {An Investigation on {HTTP/2} Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {161--189},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7112},
  doi          = {10.13052/JCSM2245-1439.7112},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SureshAMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SuvarnaP18,
  author       = {B. Suvarna and
                  T. Maruthi Padmaja},
  title        = {Enhanced Matrix Chain Multiplication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {4},
  pages        = {409--420},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.743},
  doi          = {10.13052/JCSM2245-1439.743},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SuvarnaP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ThilagavathiS18,
  author       = {B. Thilagavathi and
                  K. Suthendran},
  title        = {Boosting Based Implementationof Biometric Authentication in IoT},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {131--144},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.7110},
  doi          = {10.13052/JCSM2245-1439.7110},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ThilagavathiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YaminiKT18,
  author       = {K. Anish Pon Yamini and
                  Suthendran Kannan and
                  Arivoli Thangadurai},
  title        = {Handling Selfishness over Collaborative Mechanism in a MobileAd hoc
                  Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {1-2},
  pages        = {39--52},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.714},
  doi          = {10.13052/JCSM2245-1439.714},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/YaminiKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics