Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm9.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/AbaneDBBM20,
  author       = {Amar Abane and
                  Mehammed Daoui and
                  Samia Bouzefrane and
                  Soumya Banerjee and
                  Paul M{\"{u}}hlethaler},
  title        = {A Realistic Deployment of Named Data Networking in the Internet of
                  Things},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {1--46},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.911},
  doi          = {10.13052/JCSM2245-1439.911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbaneDBBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbdelwahabEZ20,
  author       = {Zakaria Hassan Abdelwahab and
                  Talaat A. Elgarf and
                  Abdelhalim Zekry},
  title        = {Analyzing {SNOW} and {ZUC} Security Algorithms Using {NIST} {SP} 800-22
                  and Enhancing their Randomness},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {535--576},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.943},
  doi          = {10.13052/JCSM2245-1439.943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbdelwahabEZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlwazzehKS20,
  author       = {Muneer Alwazzeh and
                  Sameer Karaman and
                  Mohammad Nur Shamma},
  title        = {Man in The Middle Attacks Against {SSL/TLS:} Mitigation and Defeat},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {449--468},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.933},
  doi          = {10.13052/JCSM2245-1439.933},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlwazzehKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Aseeri20,
  author       = {Ahmad O. Aseeri},
  title        = {Noise-Resilient Neural Network-Based Adversarial Attack Modeling for
                  {XOR} Physical Unclonable Functions},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {331--354},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.926},
  doi          = {10.13052/JCSM2245-1439.926},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Aseeri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/BejoyJ20,
  author       = {B. J. Bejoy and
                  S. Janakiraman},
  title        = {Enhanced {AIS} Based Intrusion Detection System Using Natural Killer
                  Cells},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {515--534},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.942},
  doi          = {10.13052/JCSM2245-1439.942},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/BejoyJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ChoSZ20,
  author       = {Joo Yeon Cho and
                  Andrew Sergeev and
                  Jim Zou},
  title        = {Securing Ethernet-based Optical Fronthaul for 5G Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {91--110},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.913},
  doi          = {10.13052/JCSM2245-1439.913},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ChoSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DamKS20,
  author       = {Tobias Dam and
                  Lukas Daniel Klausner and
                  Sebastian Schrittwieser},
  title        = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up
                  Scam},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {265--300},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.924},
  doi          = {10.13052/JCSM2245-1439.924},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DamKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DariBE20,
  author       = {El Yazid Dari and
                  Ahmed Bendahmane and
                  Mohamed Essaaidi},
  title        = {Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart
                  Grid},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {237--264},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.923},
  doi          = {10.13052/JCSM2245-1439.923},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/DariBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DoynikovaFK20,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {A Semantic Model for Security Evaluation of Information Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {301--330},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.925},
  doi          = {10.13052/JCSM2245-1439.925},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KourTK20,
  author       = {Ravdeep Kour and
                  Adithya Thaduri and
                  Ramin Karim},
  title        = {Railway Defender Kill Chain to Predict and Detect Cyber-Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {47--90},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.912},
  doi          = {10.13052/JCSM2245-1439.912},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KourTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/NagaRajuR20,
  author       = {Pamarthi NagaRaju and
                  Nallamothu Nagamalleswara Rao},
  title        = {{OB-MECC:} An Efficient Confidentiality and Security Enhancement for
                  Cloud Storage System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {577--600},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.944},
  doi          = {10.13052/JCSM2245-1439.944},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/NagaRajuR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OdumuyiwaC20,
  author       = {Victor Odumuyiwa and
                  Analogbei Chibueze},
  title        = {Automatic Detection of {HTTP} Injection Attacks using Convolutional
                  Neural Network and Deep Neural Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {489--514},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.941},
  doi          = {10.13052/JCSM2245-1439.941},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OdumuyiwaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PorwalM20,
  author       = {Shardha Porwal and
                  Sangeeta Mittal},
  title        = {A Privacy Preserving and Efficient Multi Authority - {CP-ABE} Scheme
                  for Secure Cloud Communication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {4},
  pages        = {601--626},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.945},
  doi          = {10.13052/JCSM2245-1439.945},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PorwalM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SaadehSSA20,
  author       = {Maha Saadeh and
                  Azzam Sleit and
                  Khair Eddin Sabri and
                  Wesam Almobaideen},
  title        = {Object Authentication in the Context of the Internet of Things: {A}
                  Survey},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {385--448},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.932},
  doi          = {10.13052/JCSM2245-1439.932},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SaadehSSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachLG20,
  author       = {Martin Steinebach and
                  Huajian Liu and
                  Karol Gotkowski},
  title        = {Fake News Detection by Image Montage Recognition},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {175--202},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.921},
  doi          = {10.13052/JCSM2245-1439.921},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachLL20,
  author       = {Martin Steinebach and
                  Sebastian Lutz and
                  Huajian Liu},
  title        = {Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {111--140},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.914},
  doi          = {10.13052/JCSM2245-1439.914},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachSKB20,
  author       = {Martin Steinebach and
                  Marcel Sch{\"{a}}fer and
                  Alexander Karakuz and
                  Katharina Brandl},
  title        = {Detection and Analysis of Tor Onion Services},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {1},
  pages        = {141--174},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.915},
  doi          = {10.13052/JCSM2245-1439.915},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachSKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TundisBSM20,
  author       = {Andrea Tundis and
                  Leon B{\"{o}}ck and
                  Victoria Stanilescu and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Experiencing the Detection of Radicalized Criminals on Facebook Social
                  Network and Data-related Issues},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {203--236},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.922},
  doi          = {10.13052/JCSM2245-1439.922},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TundisBSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Tweneboah-Koduah20,
  author       = {Samuel Tweneboah{-}Koduah and
                  Francis Atsu and
                  Ramjee Prasad},
  title        = {Reaction of Stock Volatility to Data Breach: an Event Study},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {3},
  pages        = {355--384},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.931},
  doi          = {10.13052/JCSM2245-1439.931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Tweneboah-Koduah20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics